单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()AVLANBPeer to PeerCVTPDVPN
单选题
Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
A
VLAN
B
Peer to Peer
C
VTP
D
VPN
参考解析
解析:
暂无解析
相关考题:
Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?() A.VLANB.Peer to PeerC.VTPD.VPN
Physical and logical network diagrams are used for which of the following configuration management goals?() A. Track DHCP distributionB. Compare MAC and IP addressesC. Document Internet access historyD. Identity network devices
In which of the following topologies could the failure of one machine cause the entire network tostop functioning?() A. MeshB. Token ringC. StarD. Spanning tree
Which of the following network topologies BEST describes a VPN? ()(Select TWO) A. Point to PointB. Point to MultipointC. VLAND. RingE. Bus
Which of the following network protocols is used to ensure consistent time across network devices on the domain?() A.NTPB.FTPC.RTPD.IGMP
Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()A、 ARPB、 DMZC、 VLAND、 VPN
Which of the following network topologies BEST describes a VPN? ()(Select TWO)A、Point to PointB、Point to MultipointC、VLAND、RingE、Bus
In which of the following topologies could the failure of one machine cause the entire network tostop functioning?()A、MeshB、Token ringC、StarD、Spanning tree
Physical and logical network diagrams are used for which of the following configuration management goals?()A、Track DHCP distributionB、Compare MAC and IP addressesC、Document Internet access historyD、Identity network devices
Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()A、StarB、BusC、MeshD、Ring
Which of the following configuration management documentation types would an administrator useto know how and when to property install new network devices on the LAN?()A、Baseline configurationB、Logical network diagramC、Network policyD、Wiring schematic
Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP
Which of the following would help a new administrator quickly determine if a network had a VLANfor its publicly accessible servers?()A、BaselinesB、RegulationsC、Logical network diagramsD、Wiring schematics
Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP
Which of the following tools is used to report the location of logical partitions of a file system on a physical volume?()A、 lsfsB、 iostatC、 lslv -pD、 lsvg -p
Which of the following tools should be used to analyze the placement of file fragments on a mirrored logical volume?()A、 dfB、 lslvC、 filemonD、 fileplace
Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A、 netpmonB、 netstatC、 nfsstatD、 vmstat
Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig
Which of the following commands should be used to show how much data is read from or written to a particular logical volume, given there are several other logical volumes on the same disk?()A、 sarB、 lslvC、 iostatD、 filemon
单选题Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A netpmonB netstatC nfsstatD vmstat
单选题Which of the following network topologies offers the greatest protection against network outages due to a single line break?()ABusBStarCMeshDRing
单选题Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()AMeshBBusCRingDStar
多选题Which of the following network topologies BEST describes a VPN? ()(Select TWO)APoint to PointBPoint to MultipointCVLANDRingEBus
单选题Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()A ARPB DMZC VLAND VPN
单选题Which of the following is the term used to describe the aggregation of multiple components to formone logical component?()ABondingBCircuit switchingCCSMA/CDDChannelization
单选题Which of the following commands should be used to determine whether a logical volume is contiguous across a disk?()A lslvB lsfsC lspvD fileplace
单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()AVLANBPeer to PeerCVTPDVPN
单选题Which of the following OSI model layers is used for logical addressing?()APhysicalBTransportCNetworkDData link