A.BSS
B.ESS
C.IBSS
D.SSID
您可能感興趣的試卷
你可能感興趣的試題
A.Because of damaged flash memory, the router will fail the POST
B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialog.
C.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM
D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog.
E.It will attempt to locate the configuration file from a TFTP server. If this fails, it will load a limited configuration from ROM
A.the summarized address for all of the internal subnetted addresses
B.the MAC address of the router used by inside hosts to connect to the Internet
C.a globally unique, private IP address assigned to a host on the inside network
D.a registered address that represents an inside host to an outside network
A.VTP allows routing between VLANs.
B.VTP allows a single port to carry information to more than one VLAN
C.VTP allows physically redundant links while preventing switching loops.
D.VTP allows switches to share VLAN configuration information.
A.point-to-point and multiaccess
B.point-to-multipoint and multiaccess
C.point-to-point and point-to-multipoint
D.nonbroadcast and broadcast multipoint
E.nonbroadcast and broadcast multiaccess
A.to prevent unauthorized Telnet access to a switch port
B.to limit the number of Layer 2 broadcasts on a particular switch port
C.to prevent unauthorized hosts from accessing the LAN
D.to protect the IP and MAC address of the switch and associated ports
E.to block unauthorized access to the switch management interfaces over common TCP ports
最新試題
Which statement is true, as relates to classful or classless routing?()
At which layer of the OSI model is RSTP used to prevent loops?()
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
Which command encrypts all plaintext passwords?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()
Which command displays the CHAP authentication process as it occurs between two routers?()
When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()