单选题Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()AStarBHybridCMeshDRing
单选题
Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()
A
Star
B
Hybrid
C
Mesh
D
Ring
参考解析
解析:
暂无解析
相关考题:
Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?() A. StarB. HybridC. MeshD. Ring
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A.WormB.SmurfC.Logic BombD.Man-in-the-middle
Which of the following network media types uses laser light to carry the information?() A. IEEE 1394B. STPC. RG-6D. Fiber
Which of the following configuration management documentation types would an administrator useto know how and when to property install new network devices on the LAN?() A. Baseline configurationB. Logical network diagramC. Network policyD. Wiring schematic
When configured. MPLS can increase routing redundancy by providing which of the following network topology types?() A.BusB.MeshC.MultipathD.Ring
Which of the following cable types can cause interference on the network when disconnecting any one machine?()A、CoaxialB、Cat 1 UTPC、Cat 3 UTPD、Cat 5 UTP
When updated, which of the following will allow network access to new users?()A、Route listsB、ACLsC、FirmwareD、Definitions
A remote user is attempting to install a new external storage device on their computer. The user reports they only have one port open on the back of the device and the port is similar to the USB port their mouse is connected to. The port has a bevel on one side and is slightly larger than the USB port. Which of the following connector types is MOST likely being described?()A、IEEE 1394B、USB 2.0C、PCMCIAD、Parallel
Which of the following is being described when using a single physical server to host multiple logical servers to more effectively utilize hardware resources?()A、Application virtualizationB、Multicore processingC、Server virtualizationD、Hyper threading
Which of the following network appliances can BEST be described as allowing multiple servers toshare requests for a website through the same public IP address?()A、VPN concentratorB、Content filterC、Load balancerD、Proxy server
When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()A、BusB、MeshC、MultipathD、Ring
Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()A、StarB、HybridC、MeshD、Ring
Which of the following network media types uses laser light to carry the information?()A、IEEE 1394B、STPC、RG-6D、Fiber
Which of the following configuration management documentation types would an administrator useto know how and when to property install new network devices on the LAN?()A、Baseline configurationB、Logical network diagramC、Network policyD、Wiring schematic
An administrator has found interference on a network. Which of the following cable types is thenetwork MOST likely composed of?()A、UTPB、FiberC、RG-6D、STP
Which of the following traffic types would a network layer firewall be unable to filter?()A、SMTP trafficB、ICMP messagesC、HTTP trafficD、Email sender verification
Which of the following are advantages of using Dynamic Host Configuration Protocol?()A、IP addresses can be managed from a central pointB、Computers can automatically get new addressing when moved to a different network segmentC、Media Access Control addresses can be changed automaticallyD、The network speed can automatically adjust based on the type of traffic being generatedE、The HOSTS file on the computer can be validated for proper entries
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A、WormB、SmurfC、Logic BombD、Man-in-the-middle
Which of the following commands identifies all network adapter types that are installed in a machine?()A、lsdevB、lsattrC、ifconfigD、netstat
When the length of the run queues, process or thread dispatches interrupts, and lock contention metrics and statistics are analyzed for performance, which of the following resources is being analyzed?()A、 CPUB、 MemoryC、 Disk I/OD、 Network I/O
In a TCP/IP network, which of the following protocols is involved when a user issues a ping command?()A、TCPB、UDPC、ICMPD、SMTP
单选题When the length of the run queues, process or thread dispatches interrupts, and lock contention metrics and statistics are analyzed for performance, which of the following resources is being analyzed?()A CPUB MemoryC Disk I/OD Network I/O
单选题A new asynchronous connection is being installed in your network. Which pair of WAN encapsulations types is suitable for asynchronous lines?()APPP and ATMBPPP and SDLCCATM and HDLCDSDLC and HDLC
单选题Which of the following configuration management documentation types would an administrator useto know how and when to property install new network devices on the LAN?()ABaseline configurationBLogical network diagramCNetwork policyDWiring schematic
多选题Based on the following items, which two types of interfaces are found on all network-based IPS sensors?()ALoopback interfaceBCommand and control interfaceCMonitoring interfaceDManagement interface
单选题When operating with a negative suction head, which of the following types of pumps will require priming?()AReciprocatingBCentrifugalCRotaryDGear
单选题When performing a backup, which of the following media types would have no moving parts?()A TapeB FlashC WORMD Optical