As the Ezonexam network administrator, you are required to have a firm understanding of the OSI model. Why does the data communication industry use the layered OSI reference model? (Choose two)A.It enables equipment from different vendors to use the same electronic components, thus saving research and development fundsB.It encourages industry standardization by defining what functions occur at each layer of the modelC.It divides the network communication process into smaller and simpler components; thus aiding component development, design and troubleshootingD.It provides a means by which changes in functionality in one layer require changes in other layersE.It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers

As the Ezonexam network administrator, you are required to have a firm understanding of the OSI model. Why does the data communication industry use the layered OSI reference model? (Choose two)

A.It enables equipment from different vendors to use the same electronic components, thus saving research and development funds

B.It encourages industry standardization by defining what functions occur at each layer of the model

C.It divides the network communication process into smaller and simpler components; thus aiding component development, design and troubleshooting

D.It provides a means by which changes in functionality in one layer require changes in other layers

E.It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers


相关考题:

CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)A. To determine the status of network services on a remote deviceB. To obtain the IP Address of a connected device in order to telnet to the deviceC. To verify the type of cable interconnecting two devicesD. To verify Layer 2 connectivity between two devices when Layer 3 failsE. To obtain VLAN information from directly connected swticehsF. To determine the status of the routing protocols between directly connected routersG. To support automatic network failover during outages

As a CCNA candidate, you will be expected to know the OSI model very well. Which of the following are associated with the application layer (layer 7) of the OSI model? (Choose two)A. TCPB. TelnetC. FTPD. PingE. IPF. UDP

You are the administrator of a Windows 2000 Server network at Ezonexam.You configure a server named print10.marketing.Ezonexam.com.local as a print server at the Los Angeles office. You create and share printers on the server for use by employees in the marketing,Ezonexam.local domain.You want to review the configured properties of all of the shared printers on the print10.marketing.Ezonexam.local server. You want to perform. this review from a Windows 2000 Professional computer at the London office of Ezonexam.What can you do? (Each correct answer presents a complete solution. Choose two)A. Use your Web browser to connect to http://print10.london.Ezonexam.local/printers/.B. Use your Web browser to connect to http://print10.marketing.Ezonexam.local/printers/.C. Run the net view \\print10 command.D. Run the net view \\print10.marketing.Ezonexam.com command.E. Browse to \\print10.marketing.Ezonexam.local and open the Printers folder.F. Browse to \\print10.london.Ezonexam.local and open the Printers folder.

As a CCNA candidate, you must know the various layers of the OSI model. At which layers of the OSI Model do Wide Area Networks operate in? (Choose two)A. Physical LayerB. Datalink LayerC. Network LayerD. Session LayerE. Transport LayerF. Presentation LayerG. Application Layer

● OSI is a theoretical model that shows how any two different systems can communicate with each other.Router, as a networking device, operate at the (71) layer of the OSI model.(71)A.transportB.applicationC.networkD.physical

The Ezonexam network administrator has issued the "VTP password ezonexam" command on a Cisco device. What is the purpose of this command?A.It allows two VTP servers to exists in the same domain, each configured with different passwordsB.It is the password required when promoting a switch from VTP client mode to VTP server modeC.It is used to access the VTP server to make changes to the VTP configurationD.It is used to validate the sources of VTP advertisements sent between switchesE.None of the above

is the 4th layer of the OSI reference model responsible for reliable network communication between end nodes.A.Data link layerB.Session layerC.Transport layerD.Application layer

In which three cases would you use the USING clause?() A.You want to create a nonequijoin.B.The tables to be joined have multiple NULL columns.C.The tables to be joined have columns of the same name and different data types.D.The tables to be joined have columns with the same name and compatible data types.E.You want to use a NATURAL join, but you want to restrict the number of columns in the join condition.

The TCP/IP stack is a complete set of networking protocols. The OSI Model was meantto be a standardized way of connecting devices together. and most protocols have some directcorrelation to the OSI Model. The OSI Model has 7 layers. the foruth layer is called(75)A. physical layerB. data link IayerC.application layerD.transport layer

In the communications industry, what are the features and benefits of using the layered OSI model?() A. It encourages industry standardization by defining what functions occur at each layer of the model.B. It necessitates changes in functionality in one layer to other layers.C. It enables equipment efficiency from different vendors to use the same electronic components.D. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.E. It supports the evolution of multiple competing standards, and thus enhances business equipment manufacturing opportunities.

The TCP/IP network model differs from the more popular OSI model. Which of the layers below belong to the TCP/IP model?() A. application layerB. session layerC. transport layerD. internet layerE. network layerF. data link layerG. physical layer

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。A、Allow unrestricted access to the console or VTY portsB、Use a firewall to restrict access from the outside to the network devicesC、Always use Telnet to access the device command line because its data is automatically encryptedD、Use SSH or another encrypted and authenticated transport to access device configurationsE、Prevent the loss of passwords by disabling password encryption

You enabled CDP on two Cisco Routers which are connected to each other. The Line and Protocol statusfor the interfaces on both routers show as UP but the routers do not see each other a CDP neighbors.Which layer of the OSI model does the problem most likely exist?()A、PhysicalB、SessionC、ApplicationD、Data-LinkE、Network

A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()A、 networkB、 applicationC、 sessionD、 data link

You are the network administrator for All network servers run Windows Server 2003. Recently, another network administrator create a scheduled task to perform a normal backup of Microsoft Exchange Server 2003 compuer every Saturday night. You need to perform maintenance tasks on the Exchange server on this Saturday night only. If the backup starts while you are performing the maintenance tasks,data might be corrupted. You need to ensure that the backup task does not start while you perform the maintenance tasks. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.()Choose two.)A、In the Backup utility, clear the Enabled (scheduled tasks runs at specified time) check box.B、In Control Panel, use Scheduled Tasks to pause Task Scheduler.C、Run the Schtasks command with the /end /p parameters.D、Use the Services snap-in to change the startup type of the Task Scheduler service from Automatic to Manual.

Which description about asymmetric encryption algorithms is correct?()A、They use the same key for encryption and decryption of data.B、They use different keys for decryption but the same key for encryption of data.C、They use different keys for encryption and decryption of data.D、They use the same key for decryption but different keys for encryption of data.

You need to decide on the best router redundancy protocol to use in the Company network.  Which  two statements are true about HSRP, VRRP, and GLBP?()A、 GLBP and VRRP allow for MD5 authentication, whereas HSRP does not.B、 HSRP allows for multiple upstream active links being simultaneously used, whereas GLBP  does not.C、 GLBP allows for router load balancing of traffic from a network segment without the different  host IP configurations required to achieve the same results with HSRP.D、 Unlike HSRP and VRRP, GLBP allows automatic selection and simultaneous use of multiple  available gateways.E、 GLBP allows for router load balancing of traffic from a network segment by utilizing the creation  of multiple standby groups.

The TCP/IP network model differs from the more popular OSI model. Which of the layers below belong to the TCP/IP model?()A、application layerB、session layerC、transport layerD、internet layerE、network layerF、data link layerG、physical layer

Why does the data communication industry use the layered OSI reference model? (Choose two.)()A、It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.B、It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.C、It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers.D、It encourages industry standardization by defining what functions occur at each layer of the model.E、It provides a means by which changes in functionality in one layer require changes in other layers.

A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)A、Use the custom application feature.B、Configure static NAT for the host.C、Use port address translation (PAT).D、Use the address-persistent option.

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing printer pooling.Which of the following is TRUE with regards to printer pooling?()A、Printers in a pool must be of the same model, and use the same printer driverB、Each printer in the pool must have a different printer driver.C、Printer ports used in the pool must be of the same typeD、The types of printer ports used in the pool must be mixed.E、Pooled printers appear to workstations as a single printer.F、A minimum of three printers are required to configure a printer pool.

多选题The TCP/IP network model differs from the more popular OSI model. Which of the layers below belong to the TCP/IP model?()Aapplication layerBsession layerCtransport layerDinternet layerEnetwork layerFdata link layerGphysical layer

多选题In which three cases would you use the USING clause?()AYou want to create a nonequijoin.BThe tables to be joined have multiple NULL columns.CThe tables to be joined have columns of the same name and different data types.DThe tables to be joined have columns with the same name and compatible data types.EYou want to use a NATURAL join, but you want to restrict the number of columns in the join condition.

多选题What are three common reasons why customers are saying that they need to evolve their data center?( )Aarchitectures that is inflexible and inefficientBdesire to use the same vender for desktop and server deploymentsCselecting best-performing vendors for each individual componentDexisting equipment has reached and of lifeEincreasing operational costs of managing data centersFdemand among users for access to information anytime, anywhere

单选题A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()A networkB applicationC sessionD data link

多选题Why does the data communication industry use the layered OSI reference model (Choose two.)()。AIt divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.BIt enables equipment from different vendors to use the same electronic components, thus saving research and development funds.CIt supports theevolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers.DIt encourages industry standardization by defining what functions occur at each layer of the model.EIt provides a means by which changes in functionality in one layer require changes in other layers.

多选题In the communications industry, what are the features and benefits of using the layered OSI model?()AIt encourages industry standardization by defining what functions occur at each layer of the model.BIt necessitates changes in functionality in one layer to other layers.CIt enables equipment efficiency from different vendors to use the same electronic components.DIt divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.EIt supports the evolution of multiple competing standards, and thus enhances business equipment manufacturing opportunities.