单选题Which of the following protocols is used by thin clients?()AIPXBNetBIOSCRDPDUDP
单选题
Which of the following protocols is used by thin clients?()
A
IPX
B
NetBIOS
C
RDP
D
UDP
参考解析
解析:
暂无解析
相关考题:
Which of the following computers are used for basic applications and meets the MINIMUMrequirements for running Windows?() A. Virtualization workstationB. Home server PCC. CAD workstationD. Thin client
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?() A. AESB. TKIPC. 802.1qD. ISAKMP
Which of the following protocols should be used to monitor network performance?() A.SNTPB.SMTPC.HTTPD.SNMP
When selecting a Network Interface Card (NIC), which of the following factors need to be considered?() A. The type of application used on the networkB. The type of system bus used by the computersC. The type of memory installed in each computerD. The type of media used in the network topologyE. The type of protocols used in the networkF. The physical layout of the network hosts
A corporation plans to replace older office PCs with energy efficient personal computers in their 24 hour help desk department. Which of the following would be the BEST choice?()A、Tablet notebooks with LCD monitorsB、Thin clients with LCD monitorsC、Thin clients with CRT monitorsD、Notebook computers with LCD monitors
When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()A、The type of application used on the networkB、The type of system bus used by the computersC、The type of memory installed in each computerD、The type of media used in the network topologyE、The type of protocols used in the networkF、The physical layout of the network hosts
Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A、RIPB、0S:FC、STPD、EGP
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、 AES B、 TKIPC、 802.1qD、 ISAKMP
Which of the following computers are used for basic applications and meets the MINIMUMrequirements for running Windows?()A、Virtualization workstationB、Home server PCC、CAD workstationD、Thin client
Which of the following protocols is commonly used for VoIP technology?()A、TelnetB、SMTPC、SIPD、SNMP
Which of the following protocols define the rules and processes used to transmit and receive block storage applications over TCP/IP?()A、iSCSIB、VoIPC、Distributed Applications over IPD、HTTPS
A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?()A、IPv6B、RIPC、IGRPD、RIPv2
A large company would like to roll out thin clients to all retail terminals on its next upgrade. Which of the following are potential risks of this IT plan?()A、Power consumption;thin clients use more energy than comparable workstations and therefore have a larger energy footprint.B、Single point of failure;if the thin client server goes down all machines are without functionality.C、Centralized administration;IT staff cannot rely on localized group policy settings.D、High cost of terminals;compared to traditional workstations,thin clients are very expensive and require more maintenance.
Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP
Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP
Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP
Which communication protocols are valid between the NIM master and standalone clients?() A、shell and ldapB、shell and nimshC、shell and kerberosD、shell, nimsh and ldap
Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig
单选题Which of the following commands should be used to report statistics on network protocols used by the system?()A lsattrB pstatC netstatD ifconfig
多选题When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()AThe type of application used on the networkBThe type of system bus used by the computersCThe type of memory installed in each computerDThe type of media used in the network topologyEThe type of protocols used in the networkFThe physical layout of the network hosts
多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP
单选题Which of the following protocols is used to encrypt data between web servers and web browsers?()ASMTPBSIPCHTTPDSSL
单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A AES B TKIPC 802.1qD ISAKMP
单选题A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?()AIPv6BRIPCIGRPDRIPv2