A.standardization
B.conversion
C.encapsulation
D.synchronization
第1题:
第2题:
第3题:
Which OSI layer header contains the address of a destination host that is another network?()
第4题:
Which of the following correctly describe steps in the OSI data encapsulation process?()
第5题:
A technician wants to decrease the overall attack surface of the servers in a data center through decreasing the number of open network ports on each server. Which of the following could the technician implement to increase security?()
第6题:
Why is QoS important in a converged network?()
第7题:
When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()
第8题:
You deploy a Hyper-V host and you convert the Web servers to VMs. You discover that when users transfer large data files from the Web servers, the CPU utilization of the host exceeds acceptable limits. You need to recommend a solution to reduce the CPU utilization associated to network traffic. The solution must meet the company’s business requirements. What should you recommend implementing?()
第9题:
application
presentation
session
transport
network
data link
physical
第10题:
Drop the data.
Send the data frames to the default gateway.
Create an ARP request to get a MAC address for the receiving host.
Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.
第11题:
RARP request
Show Network Address request
Proxy ARP request
ARP request
Show Hardware Address request
第12题:
Backs up data
Less expensive than software RAID
Vendor neutral implementation
Accessible through a BIOS interface
More host CPU usage than software RAID
Accessible through a system utility after the OS has been loaded
May retain data in the event of a power outage
第13题:
第14题:
At which OSI layer is a logical path created between two host systems()。
第15题:
Which is the main difference between host-based and network-based intrusion prevention?()
第16题:
A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()
第17题:
Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()
第18题:
When a host transmits data across a network to another host, which process does the data go through?()
第19题:
A customer has two locations that host their pSeries servers. Traffic is being routed through the public Internet. The customer needs to exchange confidential financial data between the servers. Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()
第20题:
Transport layer divides a data stream into segments & adds reliability & flow control information
Data link layer adds physical source & destination address & an FCS to the segment
Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information
Packets are created when the network layers adds layers 3 address & control information to a segment
The presentation layer translated bits into bits into voltages for transmission across the physical link
第21题:
network
application
session
data link
第22题:
The transport layer divides a data stream into segments and may add reliability and flow control information.
The data link layer adds physical source and destination addresses and an FCS to the segment.
Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
The presentation layer translates bits into voltages for transmission across the physical link.
第23题:
A session key value is exchanged across the network.
A session key never passes across the network.
A session key is used as the key for asymmetric data encryption.
A session key is used as the key for symmetric data encryption.