单选题Which of the following protocols would be used in order to log into a router to configure a VLAN?()ARDPBSMTPCTELNETDFTP

单选题
Which of the following protocols would be used in order to log into a router to configure a VLAN?()
A

RDP

B

SMTP

C

TELNET

D

FTP


参考解析

解析: 暂无解析

相关考题:

Which of the following protocols would be used in order to log into a router to configure a VLAN?() A.RDPB.SMTPC.TELNETD.FTP

Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?() A. AESB. TKIPC. 802.1qD. ISAKMP

Which of the following protocols should be used to monitor network performance?() A.SNTPB.SMTPC.HTTPD.SNMP

Which of the following cables would a technician make in order to identify a physical interfaceproblem?()A、SerialB、LoopbackC、RolloverD、Console

Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A、RIPB、0S:FC、STPD、EGP

Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、 AES B、 TKIPC、 802.1qD、 ISAKMP

Which of the following protocols is used by thin clients?()A、IPXB、NetBIOSC、RDPD、UDP

Which of the following protocols is commonly used for VoIP technology?()A、TelnetB、SMTPC、SIPD、SNMP

Which of the following would BEST optimize a computer that is heavily used? ()A、ScandiskB、DefragC、IndexingD、Chkdsk

Which of the following storage protocols would be suitable for transport across an IP network?()A、 SASB、 SCSIC、 iSCSID、 SATA

Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP

Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP

Which of the following protocols would a multilayer switch use to learn the IP address of a directly connected device?()A、ARPB、BOOTPC、Inverse-ARPD、DNS

Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、AESB、TKIPC、802.1qD、ISAKMP

Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()A、BridgeB、FirewallC、Port replicatorD、Gateway

Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP

Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig

单选题Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()ARIPB0S:FCSTPDEGP

单选题Which of the following storage protocols would be suitable for transport across an IP network?()A SASB SCSIC iSCSID SATA

单选题In MPLS traffic engineering, which one of the following protocols is used for Path Setup?()ABGPBOSPFCISISDRSVP

单选题Which of the following commands should be used to report statistics on network protocols used by the system?()A lsattrB pstatC netstatD ifconfig

单选题Which of the following protocols is used to encrypt data between web servers and web browsers?()ASMTPBSIPCHTTPDSSL

单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A AES B TKIPC 802.1qD ISAKMP