Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()A、StarB、HybridC、MeshD、Ring

Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()

  • A、Star
  • B、Hybrid
  • C、Mesh
  • D、Ring

相关考题:

Which of the following tools would allow an administrator to push out a software update to allswitches on the network?() A. Network managementB. Protocol analyzerC. Network monitoringD. System diagnostic

Which of the following network hardware allows the MOST network traffic collisions?() A.WAPB.HubC.SwitchD.Router

Which three of the following basic network services are provided by the Cisco IOS?()A、Defines the network topologyB、Access to network resourcesC、Routing and switching functionsD、Content FilteringE、Intrusion Detection

Which of the following network hardware allows the MOST network traffic collisions?()A、WAPB、HubC、SwitchD、Router

Which of the following network connections would use a standard POTS line to both send andreceive Internet packets?()A、Dial-upB、DSLC、SatelliteD、OC3E、T1

Which of the following Class A networks is reserved for "private networks" use only?()A、network 10.0.0.0B、network 127.0.0.0C、network 129.135.0.0D、network 192.168.0.0

Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS

Which of the following server roles synchronizes time throughout the network?()A、DNSB、NTPC、DHCPD、SMTP

Which of the following tools can be used to identify the location of a network outage?()A、tracerouteB、netstatC、nslookupD、ping

Which of the following is an advantage of a 100Base-T network card versus an 802.11g wireless network card?()A、Flexibility in relocating the computerB、Ability to provide secure data communicationsC、Faster data speedD、Ability to setup P2P networking

Which of the following devices can be installed on individual computers throughout the network?()A、NIPSB、Network-based firewallC、VPN concentratorD、Host-based firewall

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA

Which of the following network cable types requires grounding?()A、STPB、UTPC、FiberD、Serial

Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic

Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP

Which of the following commands will display the active heartbeat sensitivity of network interface modules(NIMs)?()A、cllsnim aB、lssrc -ls grpsvcsC、lssrc ls topsvcsD、cllstopsvcs -G -t dhb

Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A、 netpmonB、 netstatC、 nfsstatD、 vmstat

单选题Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()AMPLS TE FRBMPLS VPNCBFDDRSVPEVPLSFSNMP

单选题Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()AMeshBBusCRingDStar

多选题Which three of the following basic network services are provided by the Cisco IOS?()ADefines the network topologyBAccess to network resourcesCRouting and switching functionsDContent FilteringEIntrusion Detection

单选题Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()AStarBRingCBusDMesh

单选题Which of the following defines access for a network?()AACLBRDFCRASDARP

单选题Which of the following is true as the size of people’s social network grows?APeople spend less time with each network member.BCommunicate more in all forms of contact except email.CThe number of members contacted by email doesn’t decline.DThe percentage of the network contacted by email remains almost the same.