单选题When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()A RingB MeshC StarD Hybrid

题目
单选题
When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()
A

Ring

B

Mesh

C

Star

D

Hybrid


相似考题
参考答案和解析
正确答案: B
解析: 暂无解析
更多“单选题When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()A RingB MeshC StarD Hybrid”相关问题
  • 第1题:

    A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()

    A.Worm

    B.Smurf

    C.Logic Bomb

    D.Man-in-the-middle


    参考答案:B

  • 第2题:

    An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway? 空白(2)处应选择()

    • A、user
    • B、host
    • C、city
    • D、destination

    正确答案:D

  • 第3题:

    Which of the following BEST describes a hub?()

    • A、Determines the best route to transmit data
    • B、Inspects traffic and accepts or declines transmission
    • C、Broadcasts data to specific network devices
    • D、Broadcasts data to all network devices

    正确答案:D

  • 第4题:

    Which of the following network cable types is MOST often used in environments where physicalsecurity of the data is the top priority?()

    • A、UTP
    • B、Coaxial
    • C、Fiber optic
    • D、STP

    正确答案:C

  • 第5题:

    Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()

    • A、Star
    • B、Hybrid
    • C、Mesh
    • D、Ring

    正确答案:D

  • 第6题:

    A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()

    • A、Worm
    • B、Smurf
    • C、Logic Bomb
    • D、Man-in-the-middle

    正确答案:B

  • 第7题:

    A host is to be part of a very small private network, which will never be connected to any other networks.  Which of the following name resolution schemes would be the easiest to implement?()

    • A、DNS
    • B、NIS
    • C、DHCP
    • D、etc/hosts file

    正确答案:D

  • 第8题:

    单选题
    Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()
    A

    Star

    B

    Hybrid

    C

    Mesh

    D

    Ring


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()
    A

    Star

    B

    Ring

    C

    Bus

    D

    Mesh


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following terms is used when printing data on both the front and the back of paper?()
    A

    Scaling

    B

    Copying

    C

    Duplex

    D

    Simplex


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()
    A

    Ring

    B

    Mesh

    C

    Star

    D

    Hybrid


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()
    A

    Worm

    B

    Smurf

    C

    Logic Bomb

    D

    Man-in-the-middle


    正确答案: D
    解析: 暂无解析

  • 第13题:

    When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()

    A.Bus

    B.Mesh

    C.Multipath

    D.Ring


    参考答案:B

  • 第14题:

    An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway? 空白(1)处应选择()

    • A、modems
    • B、routers
    • C、switcher
    • D、computers

    正确答案:B

  • 第15题:

    When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()

    • A、Ring
    • B、Mesh
    • C、Star
    • D、Hybrid

    正确答案:C

  • 第16题:

    When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()

    • A、Bus
    • B、Mesh
    • C、Multipath
    • D、Ring

    正确答案:B

  • 第17题:

    Which of the following are advantages of using Dynamic Host Configuration Protocol?()

    • A、IP addresses can be managed from a central point
    • B、Computers can automatically get new addressing when moved to a different network segment
    • C、Media Access Control addresses can be changed automatically
    • D、The network speed can automatically adjust based on the type of traffic being generated
    • E、The HOSTS file on the computer can be validated for proper entries

    正确答案:A,B

  • 第18题:

    Which of the following terms is used when printing data on both the front and the back of paper?()

    • A、Scaling
    • B、Copying
    • C、Duplex
    • D、Simplex

    正确答案:C

  • 第19题:

    You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()

    • A、Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). 
    • B、Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).
    • C、Add a script to the users' desktops that changes the IP configuration between dynamic and manual.
    • D、Configure the IP properties of the portable computers so that they have an alternate configuration. 

    正确答案:D

  • 第20题:

    单选题
    An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway? 空白(2)处应选择()
    A

    user

    B

    host

    C

    city

    D

    destination


    正确答案: D
    解析: 互联网是由不同的网络通过路由器互联起来的。当数据包从源地发往目的地时,在到达目的地网络之前它可能经过多个路由器。路由器从一个网络接收到数据包之后就转发到另外一个网络。然而,一个路由器往往与几个网络连接,当路由器接收到一个数据时,它应该将数据包传向哪个网络呢?这将基于路径最优化决策。

  • 第21题:

    单选题
    Which of the following network cable types is MOST often used in environments where physicalsecurity of the data is the top priority?()
    A

    UTP

    B

    Coaxial

    C

    Fiber optic

    D

    STP


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()
    A

    Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). 

    B

    Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).

    C

    Add a script to the users' desktops that changes the IP configuration between dynamic and manual.

    D

    Configure the IP properties of the portable computers so that they have an alternate configuration. 


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following BEST describes a hub?()
    A

    Determines the best route to transmit data

    B

    Inspects traffic and accepts or declines transmission

    C

    Broadcasts data to specific network devices

    D

    Broadcasts data to all network devices


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    A host is to be part of a very small private network, which will never be connected to any other networks.  Which of the following name resolution schemes would be the easiest to implement?()
    A

    DNS

    B

    NIS

    C

    DHCP

    D

    etc/hosts file


    正确答案: B
    解析: 暂无解析