更多“单选题Which of the following network hardware allows the MOST network traffic collisions?()A WAPB HubC SwitchD Router”相关问题
  • 第1题:

    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

    A.IDS

    B.VPN

    C.NIPS

    D.HIDS


    参考答案:C

  • 第2题:

    Which one of the following is the most commonly used layer 2 network device?()

    A. Hub

    B. Bridge

    C. Switch

    D. Router

    E. Repeaters

    F. None of the above


    参考答案:C

  • 第3题:

    Which of the following network hardware allows the MOST network traffic collisions?()

    • A、WAP
    • B、Hub
    • C、Switch
    • D、Router

    正确答案:B

  • 第4题:

    You need to decide on the best router redundancy protocol to use in the Company network.  Which  two statements are true about HSRP, VRRP, and GLBP?()

    • A、 GLBP and VRRP allow for MD5 authentication, whereas HSRP does not.
    • B、 HSRP allows for multiple upstream active links being simultaneously used, whereas GLBP  does not.
    • C、 GLBP allows for router load balancing of traffic from a network segment without the different  host IP configurations required to achieve the same results with HSRP.
    • D、 Unlike HSRP and VRRP, GLBP allows automatic selection and simultaneous use of multiple  available gateways.
    • E、 GLBP allows for router load balancing of traffic from a network segment by utilizing the creation  of multiple standby groups.

    正确答案:C,D

  • 第5题:

    Which one of the following is the most commonly used layer 2 network device?()

    • A、Hub
    • B、Bridge
    • C、Switch
    • D、Router
    • E、Repeaters
    • F、None of the above

    正确答案:C

  • 第6题:

    Which of the following is BEST for providing network security?()

    • A、Firewall
    • B、DMZ
    • C、Switch
    • D、IDS

    正确答案:A

  • 第7题:

    Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()

    • A、Switch
    • B、Repeater
    • C、Hub
    • D、WAP

    正确答案:A

  • 第8题:

    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

    • A、IDS
    • B、VPN
    • C、NIPS
    • D、HIDS

    正确答案:C

  • 第9题:

    Which of the following devices would MOST likely integrate a DHCP server?()

    • A、Router
    • B、Hub
    • C、Switch
    • D、Bridge

    正确答案:A

  • 第10题:

    单选题
    Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()
    A

    Switch

    B

    Repeater

    C

    Hub

    D

    WAP


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()
    A

    Inadequate RAM

    B

    Slow processor

    C

    PCI bus

    D

    Excessive network traffic


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following network hardware allows the MOST network traffic collisions?()
    A

    WAP

    B

    Hub

    C

    Switch

    D

    Router


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which of the following network hardware allows the MOST network traffic collisions?()

    A.WAP

    B.Hub

    C.Switch

    D.Router


    参考答案:B

  • 第14题:

    Router R1 sits at an Enterprise branch office, using both the Internet and a leased line to another Enterprise router for its two connectivity options back into the rest of the Enterprise network. The engineer planning for this branch decided to use the leased line for all Enterprise traffic, unless it fails, in which case the Internet connection should be used to pass traffic to the Enterprise. Which of the following is most likely to be useful on the branch router?()

    • A、IPsec tunnel
    • B、GRE tunnel
    • C、Floating stati c route
    • D、An IGP

    正确答案:A,C

  • 第15题:

    A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network.  Which of the following options is the most probable cause?()

    • A、A large FTP job is in process. 
    • B、A network interface was misconfigured. 
    • C、The ping command is being used excessively. 
    • D、A bad network interface card and/or network cable is in use. 

    正确答案:C

  • 第16题:

    Layer 3 (the network layer) provides connectivity and path selection between two host systems that may be located on geographically separated networks. Which two devices operate at the network layer?()

    • A、 application
    • B、 hub
    • C、 switch
    • D、 bridge
    • E、 router

    正确答案:E

  • 第17题:

    Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()

    • A、Inadequate RAM
    • B、Slow processor
    • C、PCI bus
    • D、Excessive network traffic

    正确答案:A

  • 第18题:

    Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()

    • A、Switch
    • B、Hub
    • C、Modem
    • D、Repeater

    正确答案:B

  • 第19题:

    Which of the following is a layer 3 device that separates broadcast domains?()

    • A、Network Interface Card
    • B、Hub
    • C、Bridge
    • D、Router

    正确答案:D

  • 第20题:

    On which of the following network devices would an administrator configure an ACL?()

    • A、Router
    • B、Hub
    • C、Repeater
    • D、NIC

    正确答案:A

  • 第21题:

    单选题
    Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()
    A

     Inadequate RAM

    B

     Slow processor

    C

     PCI bus

    D

     Excessive network traffic


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Layer 3 (the network layer) provides connectivity and path selection between two host systems that may be located on geographically separated networks. Which two devices operate at the network layer?()
    A

     application

    B

     hub

    C

     switch

    D

     bridge

    E

     router


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network.  Which of the following options is the most probable cause?()
    A

    A large FTP job is in process. 

    B

    A network interface was misconfigured. 

    C

    The ping command is being used excessively. 

    D

    A bad network interface card and/or network cable is in use. 


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
    A

    IDS

    B

    VPN

    C

    NIPS

    D

    HIDS


    正确答案: A
    解析: 暂无解析