单选题What does a router do?()ARoutes traffic down alternative paths and connects the local-area network (LAN) to the wide- area network (WAN)BReads Media Access Control (MAC) addresses to forward messages to the correct location and connects the local-area network (LAN) to the wide-area network (WAN)CStores data on the network and connects the local-area network (LAN) to the wide-area network (WAN)DBroadcasts data to all devices that are connected to it across the local-area network (LAN) and wide-area network (WAN)

单选题
What does a router do?()
A

Routes traffic down alternative paths and connects the local-area network (LAN) to the wide- area network (WAN)

B

Reads Media Access Control (MAC) addresses to forward messages to the correct location and connects the local-area network (LAN) to the wide-area network (WAN)

C

Stores data on the network and connects the local-area network (LAN) to the wide-area network (WAN)

D

Broadcasts data to all devices that are connected to it across the local-area network (LAN) and wide-area network (WAN)


参考解析

解析: 暂无解析

相关考题:

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode

An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A. Router routes traffic between different networks and a switch does notB. The new switch is faulty and needs to be replaced and configured correctlyC. The firewall needs to be setup to allow traffic to reach the InternetD. The switch needs to be setup to forward data traffic to the Internet

A( ) is a computer commtuucation network in a local area, which connects various computers.A.IntemetB.MANC.WAND.LAN

What does a router do?() A.Routes traffic down alternative paths and connects the local-area network (LAN) to the wide- area network (WAN)B.Reads Media Access Control (MAC) addresses to forward messages to the correct location and connects the local-area network (LAN) to the wide-area network (WAN)C.Stores data on the network and connects the local-area network (LAN) to the wide-area network (WAN)D.Broadcasts data to all devices that are connected to it across the local-area network (LAN) and wide-area network (WAN)

What does a router do if it has no EIGRP feasible successor route to a destination network and the successor route to that destination network is inactive status?() A. It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.B. It sends a copy of its neighbor table to all adjacent routers.C. It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.D. It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.

The local area network also connects to a wide area network that allow a message ______ across the country or to other countries.A.is sentB.to be sentC.sendingD.send

The local area network also connects to a wide area network that allow a message ___ across the country or to other countries.A.sendB.sendingC.to be sentD.is sent

Which of the following storage technologies connects by TCP/IP and can slow down network traffic?()A、SANB、Optical jukeboxC、NASD、Tape library

What is A WAN?()A、A network that connects client devices wirelessly using radio wavesB、A network that crosses metropolitan, regional, or national boundariesC、A network that is restricted.to a single building ,a group of buildings, or even a single roomD、A network that encompasses an entire city or metropolitanared. and. connects multiple LANs

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

What does a router do?()A、Routes traffic down alternative paths and connects the local-area network (LAN) to the wide- area network (WAN)B、Reads Media Access Control (MAC) addresses to forward messages to the correct location and connects the local-area network (LAN) to the wide-area network (WAN)C、Stores data on the network and connects the local-area network (LAN) to the wide-area network (WAN)D、Broadcasts data to all devices that are connected to it across the local-area network (LAN) and wide-area network (WAN)

How does a switch respond when it receives a message?()A、It reads the Layer-5 information and sends the message directly to the intended computer.B、It reads the Media Access Control (MAC) address and broadcasts the message to all the computers that are connected to the switch.C、It reads the Media Access Control (MAC) address and sends the message directly to the intended computer.D、It reads the Layer-5 information and broadcasts the message to all the computers that are connected to the switch.

What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router  B、to control broadcast traffic through a router  C、to filter traffic as it passes through a router  D、to filter traffic that originates from the router  E、to replace passwords as a line of defense against security incursions

What is A WAN?()A、A network that is restricted.to A single building ,A group of buildings, or even A single room.B、A network that encompasses an entire city or metropolitanared and connects multiple LANs.C、A network that connects client devices wirelessly using radio waves.D、A network that crosses metropolitan, regional, or national boundaries.

Wide Area Network (WAN) is a computer network that covers a broad areA. Which statement is correct for wide-area network (WAN)?()A、Connects client devices wireless protocolB、Crosses metropolitan, regional, or national boundariesC、Limited in a single building, a group of buildings, or even a single roomD、Encompasses an entire city or metropolitan area and connects multiple local-area networks (LANs)

An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A、Router routes traffic between different networks and a switch does notB、The new switch is faulty and needs to be replaced and configured correctlyC、The firewall needs to be setup to allow traffic to reach the InternetD、The switch needs to be setup to forward data traffic to the Internet

You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

单选题Which of the following storage technologies connects by TCP/IP and can slow down network traffic?()ASANBOptical jukeboxCNASDTape library

单选题Wide Area Network (WAN) is a computer network that covers a broad areA. Which statement is correct for wide-area network (WAN)?()ALimited in a single building, a group of buildings, or even a single roomBCrosses metropolitan, regional, or national boundariesCEncompasses an entire city or metropolitan area and connects multiple local-area networks (LANs)DConnects client devices wireless protocol

单选题What does a router do if it has no EIGRP feasible successor route to a destination network and the successor route to that destination network is inactive status?()AIt routes all traffic that is addresses to the destination network to the interface indicates in the routing table.BIt sends a copy of its neighbor table to all adjacent routers.CIt sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.DIt broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.

单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()AConfigure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesBConfigure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useCCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksDCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

单选题At Layer 2 of the OSI model, which component connects a host to the network media?()AHubBSwitchCBridgeDNICETransceiver

单选题What does a router do?()AStores data on the network and connects the local-area network (LAN) to the wide-area network (WAN)BRoutes traffic down alternative paths and connects the local-area network (LAN) to the wide- area network (WAN)CBroadcasts data to all devices that are connected to it across the local-area network (LAN) and wide-area network (WAN)DReads Media Access Control (MAC) addresses to forward messages to the correct location and connects the local-area network (LAN) to the wide-area network (WAN)

单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()ABPDUBPort securityCRSTPDSTPEVTPFBlocking mode

单选题An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()ARouter routes traffic between different networks and a switch does notBThe new switch is faulty and needs to be replaced and configured correctlyCThe firewall needs to be setup to allow traffic to reach the InternetDThe switch needs to be setup to forward data traffic to the Internet

单选题What is A WAN?()AA network that connects client devices wirelessly using radio wavesBA network that crosses metropolitan, regional, or national boundariesCA network that is restricted.to a single building ,a group of buildings, or even a single roomDA network that encompasses an entire city or metropolitanared. and. connects multiple LANs

单选题How does a switch respond when it receives a message?()AIt reads the Layer-5 information and sends the message directly to the intended computer.BIt reads the Media Access Control (MAC) address and broadcasts the message to all the computers that are connected to the switch.CIt reads the Media Access Control (MAC) address and sends the message directly to the intended computer.DIt reads the Layer-5 information and broadcasts the message to all the computers that are connected to the switch.

单选题What is A WAN?()AA network that is restricted.to A single building ,A group of buildings, or even A single room.BA network that encompasses an entire city or metropolitanared and connects multiple LANs.CA network that connects client devices wirelessly using radio waves.DA network that crosses metropolitan, regional, or national boundaries.