单选题Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()AStarBRingCBusDMesh

单选题
Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()
A

Star

B

Ring

C

Bus

D

Mesh


参考解析

解析: 暂无解析

相关考题:

When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?() A.RingB.MeshC.StarD.Hybrid

Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?() A.StarB.RingC.BusD.Mesh

When configured. MPLS can increase routing redundancy by providing which of the following network topology types?() A.BusB.MeshC.MultipathD.Ring

A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?() A. Unmanaged switchB. Hardware firewallC. HubD. Managed switch

Which of the following network protocols is used to ensure consistent time across network devices on the domain?() A.NTPB.FTPC.RTPD.IGMP

Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()A、Building schematicB、IGP community elementsC、Listing of interconnectionsD、Physical topology diagramE、Logical topology diagramF、Inventory of network equipment

A host is to become part of a hierarchical naming topology.  Which of the following services are required?()A、DHCPB、Domain Name ServiceC、Network Information ServiceD、A hosts file

When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()A、RingB、MeshC、StarD、Hybrid

When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()A、The type of application used on the networkB、The type of system bus used by the computersC、The type of memory installed in each computerD、The type of media used in the network topologyE、The type of protocols used in the networkF、The physical layout of the network hosts

Which one of the following answer choices below is true regarding the OSPF topology database?()A、All entries in the topology database will be included on each router.B、All routers in the same OSPF area will have one topology database.C、The Dijkstra algorithm is used in the creation of the topology database.D、LSA packets are used to update and maintain the topology database.

Which two of these are characteristics of the 802.1Q protocol?()A、it is a layer 2 messaging protocol which maintains vlan configurations across network.B、it includes an 8-bit field which specifies the priority of a frame.C、it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.D、it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.E、it is a trunking protocol capable of carring untagged frames.

When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()A、BusB、MeshC、MultipathD、Ring

Which of the following is used to identify active hosts along with their network addresses?()A、Port scanB、Ping sweepC、IDSD、NIPS

Which of the following tools can be used to identify the location of a network outage?()A、tracerouteB、netstatC、nslookupD、ping

A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()A、Unmanaged switchB、Hardware firewallC、HubD、Managed switch

Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP

Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP

Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A、 netpmonB、 netstatC、 nfsstatD、 vmstat

Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig

单选题Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A netpmonB netstatC nfsstatD vmstat

单选题Which of the following commands should be used to report statistics on network protocols used by the system?()A lsattrB pstatC netstatD ifconfig

单选题Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()AStarBRingCBusDMesh

多选题Which two of these are characteristics of the 802.1Q protocol?()Ait is a layer 2 messaging protocol which maintains vlan configurations across network.Bit includes an 8-bit field which specifies the priority of a frame.Cit is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.Dit modifies the 802.3 frame header,and thus requires that the FCS be recomputed.Eit is a trunking protocol capable of carring untagged frames.

多选题Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()ABuilding schematicBIGP community elementsCListing of interconnectionsDPhysical topology diagramELogical topology diagramFInventory of network equipment

单选题Which one of the following answer choices below is true regarding the OSPF topology database?()AAll entries in the topology database will be included on each router.BAll routers in the same OSPF area will have one topology database.CThe Dijkstra algorithm is used in the creation of the topology database.DLSA packets are used to update and maintain the topology database.