單項選擇題When a router is connected to a Frame Relay WAN link using a serial DTE interface, how is the interface clock rate determined()。

A.It is supplied by the CSU/DSU.
B.It is supplied by the far end router.
C.It is determined by the clock rate command.
D.It is supplied by the Layer 1 bit stream timing.


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題

Refer to the diagram. Which three statements describe the router port configuration and the switch port configuration as shown in the topology? ()

A.The Router1 WAN port is configured as a trunking port.
B.The Router1 port connected to Switch1 is configured using subinterfaces.
C.The Router1 port connected to Switch1 is configured as 10 Mbps.
D.The Switch1 port connected to Router1 is configured as a trunking port.
E.The Switch1 port connected to Host B is configured as an access port.
F.The Switch1 port connected to Hub1 is configured as full duplex.

2.多項選擇題

Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network?()

A.The subnet mask in use is 255.255.255.192.
B.The subnet mask in use is 255.255.255.128.
C.The IP address 172.16.1.25 can be assigned to hosts in VLAN1
D.The IP address 172.16.1.205 can be assigned to hosts in VLAN1
E.The LAN interface of the router is configured with one IP address.
F.The LAN interface of the router is configured with multiple IP addresses.

4.多項選擇題Which statements are true about EIGRP successor routes? ()

A.A successor route is used by EIGRP to forward traffic to a destination.
B.Successor routes are saved in the topology table to be used if the primary route fails.
C.Successor routes are flagged as "active" in the routing table.
D.A successor route may be backed up by a feasible successor route.
E.Successor routes are stored in the neighbor table following the discovery process.

5.單項選擇題What is one reason that WPA encryption is preferred over WEP()。

A.A WPA key is longer and requires more special characters than the WEP key.
B.The access point and the client are manually configured with different WPA key values.
C.WPA key values remain the same until the client configuration is changed.
D.The values of WPA keys can change dynamically while the system is used.