多項(xiàng)選擇題Why does the data communication industry use the layered OSI reference model? (Choose two.)()

A.It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
B.It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.
C.It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers.
D.It encourages industry standardization by defining what functions occur at each layer of the model.
E.It provides a means by which changes in functionality in one layer require changes in other layers.


您可能感興趣的試卷

你可能感興趣的試題

2.多項(xiàng)選擇題Which two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch and make changes to the device configuration? (Choose two.)()

A.console password
B.vty password
C.aux password
D.tty password
E.enable secret password
F.username password

3.多項(xiàng)選擇題The OSPF Hello protocol performs which of the following tasks? (Choose two.)()

A.It provides dynamic neighbor discovery.
B.It detects unreachable neighbors in 90 second intervals.
C.It maintains neighbor relationships.
D.It negotiates correctness parameters between neighboring interfaces.
E.It uses timers to elect the router with the fastest links as the designated router.
F.It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF

4.多項(xiàng)選擇題A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()

A.Configure port Fa0/1 to accept connections only from the static IP address of the server.
B.Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C.Configure the MAC address of the server as a static entry associated with port Fa0/1.
D.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F.Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

5.多項(xiàng)選擇題At which layers of the OSI model do WANs operate? (Choose two.)()

A.application layer
B.session layer
C.transport layer
D.network layer
E.datalink layer
F.physical layer

最新試題

What is the purpose of the cisco Vlan Trunking protocol?()

題型:單項(xiàng)選擇題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項(xiàng)選擇題

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

題型:單項(xiàng)選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:單項(xiàng)選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:單項(xiàng)選擇題

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

題型:單項(xiàng)選擇題

Which statement is true, as relates to classful or classless routing?()

題型:單項(xiàng)選擇題

Which statement describes the rule of split horizon?()

題型:單項(xiàng)選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:單項(xiàng)選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項(xiàng)選擇題