● The connection between two networks to form. an internet is handled by a machine known as a (71) .(71)A.bridgeB.clientC.routerD.switch

题目

● The connection between two networks to form. an internet is handled by a machine known as a (71) .

(71)

A.bridge

B.client

C.router

D.switch


相似考题
参考答案和解析
正确答案:C
试题(71)分析
    答案C路由,是用来链接两个网络,并使其实现互联的设备。
参考答案
    (71)c
更多“● The connection between two networks to form. an internet is handled by a machine known as a (71) .(71)A.bridgeB.clientC.routerD.switch”相关问题
  • 第1题:

    The connection between two networks to form. an internet is handled by a machine known as a ______.

    A.bridge

    B.client

    C.router

    D.switch


    正确答案:C
    解析:答案C路由,是用来链接两个网络,并使其实现互联的设备。

  • 第2题:

    For (71) service, we need a virtual-circuit subnet. Let us see how that works. The idea behind virtual circuits is to avoid having to choose a new (72) for every packet sent. Instead, when a connection is established, a route from the (73)machine to the destination machine is chosen as part of the connection setup and stored in tables inside the (74) That route is used for all traffic flowing over the connection, exactly the same way that the telephone system works. When the connection is released, the virtual circuit is also terminated. With connection-oriented service, each packet carries an (75) telling which virtual circuit it belongs to.

    A.connectionless

    B.connection-oriented

    C.datagram

    D.telegram


    正确答案:B

  • 第3题:

    Networks can be interconnected by different devices in the physical layer networks can be connected by (71) or hubs.which just move the bits from one network to an identical network.One layer up we find bridges and switches which operate at data link layer.They can accept (72) ,examine the MAC address and forward the frames to a different network while doing minor protocol translation in the process in me network layer,we have routers that can connect two networks,If two networks have (73) network layer,the router may be able to translate betweenthe packer formats.In the transport layer we find transport gateway,which can interface between two transport connections Finally,in the application layer,application gateways translate message (74) .As an example,gateways between Internet e-mail and X,400 e-mail must (75) thee-mail message and change various header fields.

    (68)

    A.reapers

    B.relays

    C.packages

    D.modems


    正确答案:A

  • 第4题:

    The presentation layer is concerned with the(71) and semantics of the information exchanged between two systems.The processes in two systems are usually exchanging information in the form. of character (72) numbers, and so on.The information should be changed to bit (73) before being transmitted.Because different computers use different encoding systems, the presentation layer is responsible for (74) between these different encoding methods.The presentation layer at the sender changes the information from its sender-dependent format into a common format. The presentation layer at the receiving machine changes the common format into its (75) dependent format.

    (71)

    A.frequency

    B.syntax

    C.dialog

    D.format

    (72)

    A.numbers

    B.unctions

    C.strings

    D.codes

    (73)

    A.systems

    B.characters

    C.layers

    D. streams

    (74)

    A.capability

    B.interoperability

    C.reliability

    D.dependability

    (75)

    A.receiver

    B.user

    C.server

    D. customer


    正确答案:B,C,D,B,A
    表示层关注的是系统间语法和语义的信息交换。两系统间交换信息的形式主要有字符串形式等。信息都是被转换成比特流进行传递的。由于不同的计算机采用了不同的编码系统,需要表示层来负责这些不同编码方法间能互相操作。在发送端,表示层将信息从其本身的发送格式转换为一种通用格式。而在接收端,又将这种通用格式的数据转换为接收端本身使用的数据格式。

  • 第5题:

    Which of the following describes a secure connection over the Internet between two sites?()

    A. FTP

    B. VLAN

    C. VPN

    D. HTTP


    参考答案:C

  • 第6题:

    The(71) program is generally translated to an object program, which is in a form. directly understandably by the computer。

    A.transfer

    B.assemble

    C.source

    D.compile


    正确答案:C
    解析:源程序通常要翻译成目标程序,这才是计算机直接可理解的形式。

  • 第7题:

    ●The presentation layer is concerned with the _(71) and semantics of the informationexchanged between two systems. The processes in two systems are usually exchanginginformation in the form. of character (72)-,numbers, and so on. The information should be changed to bit (73) before .being transmitted. Because different computers use different encoding systems, the presentation layer is responsible for (74) between these different encoding methods. The presentation layer at the sender changes the information from its sender-dependent format into a common format. The presentation layer at the receiving machine changes the common format into its (75) dependent format.

    (71)A.frequency B.syntax C.dialog D.format

    (72)A.numbers B.functions C.strings D. codes

    (73)A.systems B.characters C.layers D. streams

    (74)A.capability B.interoperability C.reliability D.dependability

    (75)A.receiver B.user C.server D. customer


    正确答案:B,C,D,B,A

  • 第8题:

    An Intranet is (71) the application of Internet technology within an internal or closed user group.Internets are company and not do not have a (72) connection to the Internet.Usedproperly an Internet is highly effective corporate tool,capable of regularly (73) information toempower the workforce with the information needed to perform. their roles.Used in this Way,Internet represent a step towards the (74) office.

    (84)

    A.simple

    B.simply

    C.singlc

    D.singly


    正确答案:B

  • 第9题:

    A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.

    A.encoded
    B.encrypted
    C.stored
    D.transmitted

    答案:D
    解析:

  • 第10题:

    Which of the following describes a secure connection over the Internet between two sites?()

    • A、FTP
    • B、VLAN
    • C、VPN
    • D、HTTP

    正确答案:C

  • 第11题:

    A machine must have the most direct access possible to two different networks.  However, it cannot act as a router between the networks.  Which of the following arrangements is most appropriate to facilitate the machine’s accessibility?()

    • A、ipforwarding turned on and two adapters
    • B、One adapter, with a route to a default gateway
    • C、An adapter in each network, and ipforwarding off
    • D、An adapter in each network, with a route only to the default gateway

    正确答案:C

  • 第12题:

    单选题
    A machine must have the most direct access possible to two different networks.  However, it cannot act as a router between the networks.  Which of the following arrangements is most appropriate to facilitate the machine’s accessibility?()
    A

    ipforwarding turned on and two adapters

    B

    One adapter, with a route to a default gateway

    C

    An adapter in each network, and ipforwarding off

    D

    An adapter in each network, with a route only to the default gateway


    正确答案: C
    解析: 暂无解析

  • 第13题:

    ● The Internet is the worlds largest computer (71) .

    (71)

    A.network

    B.device

    C.display

    D.disk


    正确答案:A

  • 第14题:

    ● A glue that holds the whole Internet together is the network layer protocol,(71). Unlike most older network layer protocols, it was designed from the beginning with internetworking in mind. Its job is to provide a -(72) way to transport datagrams from source to destination, without regard to whether these machines are on the same network or whether there are other networks in between them.

    Communication in the Internet works as follows. The (73)layer takes data streams and breaks them up into datagrams. Each datagram is transmitted through the Internet, possibly being fragmented into smaller units as it goes. When all the pieces finally get to the destination machine, they are reassembled by the

    (74) layer into the original datagram. This datagram is then handed to the transport layer, which inserts it into the receiving process' input stream.

    An IP datagram consists of a header part and a text part. The header has a (75) part and a variable length optional part.

    (71) A. IP (Internet Protocol)

    B. IP (Interworking Protocol)

    C. TCP (Transport Control Protocol)

    D. TCP (Transfer Communication Protocol)

    (72) A. best-quality

    B. quality-guaranteed

    C. connection-oriented

    D. best-efforts

    (73) A. data link

    B. transport

    C. network

    D. application

    (74) A. data link

    B. transport

    C. network

    D. application

    (75) A. 40-byte fixed

    B. 64-byte fixed

    C. 20~64 bytes variable

    D. 20-byte fixed


    正确答案:A,D,B,C,D

  • 第15题:

    An Intranet is(71)the application of Internet technology within an internal or closed user group.Internets are company(72)and do not have a(73)connection to the Internet.Used properly an Internet is highly effective corporate tool,capable of regularly(74)information to empower the workforce with the information needed to perform. their roles.Used in this way,Internet represent a step towards the(75)office.

    (58)

    A.simple

    B.simply

    C.single

    D.singly


    正确答案:B

  • 第16题:

    While the Internet is inherently insecure, businesses still need to preserve the privacy of data as it travels over the network. To help do that, the Internet Engineering Task Force an international group of network designers, operators, vendors, and researchers concerned with the evolution of(71)has developed a suite of(72)called Internet Protocol Security(IPSec).

    IPSec creates a standard platform. to develop secure networks and electronic(73)between two machines. Secure tunneling via IPSec creates(74)connections in a network through which data packets can move. It creates these tunnels between remote users and within a local network. It also(75)each data packet in a new packet that contains the information neccessary to set up, maintain and tear down the tunnel when it's no longer needed.

    A.channels

    B.Web browser

    C.Internet data

    D.Internet architecture


    正确答案:A

  • 第17题:

    A customer has two separate storage networks and is planning to implement an SVC to provide for FlashCopy between the two networks. What is the minimum number of ISL ports required?()

    A.0

    B.1

    C.2

    D.4


    参考答案:A

  • 第18题:

    The part of the computer that runs the program is known as(71)

    A.sofiware

    B.memory

    C.CPU

    D.storage


    正确答案:C
    计算机中运行程序的部件就是CPU。

  • 第19题:

    ●(71) devices are interface of man and machine.

    (71) A. I/O

    B.Memory

    C.Disk

    D.Printer


    正确答案:A

  • 第20题:

    The TCP protocolis a (71) layer protocol. Each connection connects two TCPs that may be just one physical network apart or located on opposite sides ofthe globe.

    A.physical
    B.network
    C.transport
    D.application

    答案:C
    解析:
    网络工程师

  • 第21题:

    The connection between two networks to from an internet is handled by a machine known as a ( ).

    A.bridge
    B.server
    C.router
    D.switch

    答案:C
    解析:
    连接两个网络使其互联的设备称为路由器(router)。
    A.网桥 B.服务器 C.路由器 D.交换机

  • 第22题:

    The connection between two networks from an intemet is handled by a machine known as a()

    • A、bridge
    • B、server
    • C、router
    • D、switch

    正确答案:C

  • 第23题:

    You have a server that runs Windows Server 2008 and has the Windows Server Virtualization (WSv)server role installed. You create a new virtual machine. You need to configure the virtual machine to meet the following requirements: Allow network communications between the virtual machine and the host system. Prevent communications with other network servers. What should you do first?()

    • A、Install the Microsoft Loopback Adapter.
    • B、Create a new Virtual Network Switch.
    • C、Enable Internet Connection Sharing (ICS).
    • D、Set the Connection to None for the network interface card.

    正确答案:B