單項選擇題You and a co-worker have established wireless communication directly between your wireless laptops. What type of wireless topology has been created?()

A.BSS
B.ESS
C.IBSS
D.SSID


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題During startup, the router displays the following error message: boot: cannot open "flash:" What will the router do next?()

A.Because of damaged flash memory, the router will fail the POST
B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialog.
C.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM
D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog.
E.It will attempt to locate the configuration file from a TFTP server. If this fails, it will load a limited configuration from ROM

2.單項選擇題What does the "Inside Global" address represent in the configuration of NAT?()

A.the summarized address for all of the internal subnetted addresses
B.the MAC address of the router used by inside hosts to connect to the Internet
C.a globally unique, private IP address assigned to a host on the inside network
D.a registered address that represents an inside host to an outside network

3.單項選擇題Which statement accurately describes a benefit provided by VTP?()

A.VTP allows routing between VLANs.
B.VTP allows a single port to carry information to more than one VLAN
C.VTP allows physically redundant links while preventing switching loops.
D.VTP allows switches to share VLAN configuration information.

4.單項選擇題On which types of network will OSPF elect a backup designated router?()

A.point-to-point and multiaccess
B.point-to-multipoint and multiaccess
C.point-to-point and point-to-multipoint
D.nonbroadcast and broadcast multipoint
E.nonbroadcast and broadcast multiaccess

5.單項選擇題Why would a network administrator configure port security on a switch?()

A.to prevent unauthorized Telnet access to a switch port
B.to limit the number of Layer 2 broadcasts on a particular switch port
C.to prevent unauthorized hosts from accessing the LAN
D.to protect the IP and MAC address of the switch and associated ports
E.to block unauthorized access to the switch management interfaces over common TCP ports

最新試題

Which statement is true, as relates to classful or classless routing?()

題型:單項選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項選擇題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項選擇題

Which command encrypts all plaintext passwords?()

題型:單項選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項選擇題

If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()

題型:單項選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:單項選擇題

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

題型:單項選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:單項選擇題

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

題型:單項選擇題