A.The command is accepted and the respective VLAN is added to vlan dat.
B.The command is rejected.
C.The command is accepted and you must configure the VLAN manually.
D.The port turns amber.
您可能感興趣的試卷
你可能感興趣的試題
A.防止敏感用戶和應(yīng)用暴露于不受信任的用戶前
B.網(wǎng)絡(luò)性能提升
C.凈化協(xié)議流量,防止暴露協(xié)議漏洞
D.正確的配置防火墻后,使得安全策略的實現(xiàn)更簡單、可擴展、更健壯
A.RIP is an example of distance vector routing protocols.
B.Updates are periodic and include the entire routing table.
C.Routing updates are sent only after topology changes
D.The protocol can be useful in hub-and-spoke and hierarchical networks.
E.Convergence is usually faster than with link state protocols
F.Each router has its own view of the topology
A.10.10.0.0/18 subnetted with mask 255.255.255.252
B.10.10.0.0/25 subnetted with mask 255.255.255.252
C.10.10.0.0/24 subnetted with mask 255.255.255.252
D.10.10.0.0/23 subnetted with mask 255.255.255.252
E.10.10.0.0/16 subnetted with mask 255.255.255.252
A.ICMP消息
B.Traceroute
C.DOS TCP SYN
D.DOS smurf
A.Addresses are allocated after a negotiation between the server and the host to determine the length ofthe agreement.
B.Addresses are assigned for a fixed period of time.At the end of period,a newquest for an address mustbe made ,and another address is then assigned.
C.Addresses are leased to host.A host will usually keep the same address by periodicallycontacting theDHCP sever to renew the lease.
D.Addresses are permanently assigned so that the host uses the same address at all times.
A.spanning-tree backbonefast
B.spanning-tree uplinkfast
C.spanning-tree portfast
D.spanning-tree cost512
A.拒絕服務(wù)器攻擊
B.IP地址欺騙
C.DOS TCP SYN攻擊
D.DOS smurf攻擊
A.802.3ad
B.802.1w
C.802.1Q
D.802.1d
A.每個用戶的挑戰(zhàn)驗證機制
B.簡化路由器對ACL的處理
C.降低網(wǎng)絡(luò)黑客對網(wǎng)絡(luò)的攻擊機會
D.在不損害其他安全配置的前提下,可以動態(tài)的讓用戶穿越防火墻
A.data integrity
B.encryption
C.key exchange
D.authentication
最新試題
請參見圖示。主機A 正在訪問多臺服務(wù)器。結(jié)合使用什么端口號和地址即可唯一識別特定服務(wù)器上運行的特定進程?()
在路由器上使用Router#copy running-config startup-config 命令會產(chǎn)生什么效果?()
請參見圖示。主機B 嘗試與主機C 建立TCP/IP 會話。在嘗試期間,San Francisco 器由器的FastEthernet 接口fa0/1捕獲到一個幀。捕獲的幀中包含源IP 地址為10.10.1.2而目的IP 地址為10.31.1.20的數(shù)據(jù)包。捕獲該幀時,它的目的MAC 地址是什么?()
何時必須使用clock rate 命令配置路由器串行接口?()
請參見圖示。網(wǎng)絡(luò)技術(shù)人員使用圖中所示的連接將主機A 連接到路由器以創(chuàng)建初始配置。下列有關(guān)此連接的陳述中哪一項正確?()
請參見圖示。RouterB 已經(jīng)過正確配置。RouterA 的以太網(wǎng)接口Fa0/0已使用如圖所示的命令進行配置。但是,從RouterA 的Fa0/0接口無法成功ping 通RouterB 的Fa0/0接口。應(yīng)在RouterA 上采取什么措施來解決此問題?()
請參見圖示。哪種邏輯拓撲是對圖示網(wǎng)絡(luò)的準確描述?()
請參見圖示。從主機X 發(fā)出的到主機Y 的tracert 命令已成功。下列哪一項正確地反映了追蹤列表中顯示的中間網(wǎng)絡(luò)設(shè)備的順序?()
請參見圖示。網(wǎng)絡(luò)技術(shù)人員試圖確定主機A 的正確IP 地址配置。以下哪一項是主機A 的有效配置?()
請參見圖示。一臺主機正使用NAT 連接到Internet。下列哪三項IP 地址可實現(xiàn)此連接?()