Gateway is a device used to connect two separate network that use(2)communication protocol.A.same kind ofB.similarC.differentD.same

Gateway is a device used to connect two separate network that use(2)communication protocol.

A.same kind of

B.similar

C.different

D.same


相关考题:

根据下面的文字资料回答 72~76 题 ( 1 )is a one-way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string.( 2 )is a protocol that most USENET machines nOW use it to allow news articles to propagate from one machine to another over a reliable connection.( 3 )is an approach preferred by cable TV providers.In this solution the fiber terminates at an optoelectrical converter and the final segment is a shared coaxial cable.( 4 )is a device used to connect two separate network that use different communication protocol.( 5 )is a digital-to-digital polar encoding method in which the signal level is always either positive or negative.第6题:文中( 1 )处正确的答案是( )。A.MDB.RSAC.DESD.MIB

● (71) is a one-way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string.(72) is a protocol that most USENET machines now use it to allow news articles to propagate from one machine to another over a reliable connection.(73) is an approach preferred by cable TV providers .In this solution the fiber terminates at an optoelectrical converter and the final segment is a shared coaxial cable.(74) is a device used to connect two separate network that use different communication protocol.(75) is a digital-to-digital polar encoding method in which the signal level is always either positive or negative.(71) A. MDB.RSAC.DESD.MIB(72)A.RTPB.RTTPC FTPD.NNTP(73) A. ADSLB.FTTCC.HFCD.FTTH(74)A .RouterB.GatewayC.BridgeD.hub(75)A .NNIB.NRZC.NAKD.NVT

CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)A. To determine the status of network services on a remote deviceB. To obtain the IP Address of a connected device in order to telnet to the deviceC. To verify the type of cable interconnecting two devicesD. To verify Layer 2 connectivity between two devices when Layer 3 failsE. To obtain VLAN information from directly connected swticehsF. To determine the status of the routing protocols between directly connected routersG. To support automatic network failover during outages

● Computer(75) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.(75)A. storage B. device C. network D. processor

You are the network administrator for Ezonexam.com. You configure a shared printer on a Windows 2000 Server computer. The printer connects to a Hewlett Packard JetDirect print device that uses DLC. This print device is on the same network segment as the server.Six months later, you relocate the print device to a different network segment. Users report that they are able to send print jobs to the printer but that their print jobs no longer print.You need to ensure that the printer and the print device are working properly. What should you do?A.Configure the JetDirect print device to use DHCP.B.Uninstall and reinstall the DLC protocol from the server.C.Configure the printer and the JetDirect print device to use the LPR printing protocol.D.Delete the printer. Re-create the printer by using DLC to connect to the JetDirect print device.

is a one-way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string.(67)is a protocol that most USENET machines how use it to allow news articles to propagate from one machine to another over a reliable connection.(68)is an approach preferred by cable TV providers. In this solution the fiber terminates at an optoelectrical converter and the final segment is a shared coaxial cable.(69)is a device used to connect two separate network that use different communication protocol.(70)js a digitalA.MDB.RSAC.DESD.MIB

is a one -way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string.(72) is a protocol that most USENET machines now use it to allow news articles to propagate from one machine to another over a reliable connection.(73) is an approach preferred by cable TV providers. In this solution the fiber terminates at an optoelectrical converter and the final segment is a shared coaxial cable.(74) is a device used to connect two separate network that use different communication protocol.(75) is a digital-to-digital polar encoding method in which the signal level is always either positive or negative.A.MDB.RSAC.DESD.MIB

A socket is basically an end point of a communication link between two applications. Sockets that extend over a network connect two or more applications running on(61)computers attached to the network. A socket(62)two addresses:(63). Sockets provide a(64)communication channel between one or more systems.There are(65)sockets separately using TCP and UDP.A.uniqueB.separateC.sameD.dependent

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。 A.Allow unrestricted access to the console or VTY portsB.Use a firewall to restrict access from the outside to the network devicesC.Always use Telnet to access the device command line because its data is automatically encryptedD.Use SSH or another encrypted and authenticated transport to access device configurationsE.Prevent the loss of passwords by disabling password encryption

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。A、Allow unrestricted access to the console or VTY portsB、Use a firewall to restrict access from the outside to the network devicesC、Always use Telnet to access the device command line because its data is automatically encryptedD、Use SSH or another encrypted and authenticated transport to access device configurationsE、Prevent the loss of passwords by disabling password encryption

A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()A、For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.B、For the two vlans to communicate, a network statement for each subinterface needs to be  added  to the OSPF configuration.C、Direct inter-vlan communication does not require OSPFD、OSPF cannot be used if router-on-a-stick is configured on the router

What is a static packet-filtering firewall used for ?()A、It validates the fact that a packet is either a connection request or a data packet belonging to a connectionB、It evaluates network packets for valid data at the application layer before allowing connectionsC、It analyzes network traffic at the network and transport protocol layersD、It keeps track of the actual communication process through the use of a state table

Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()A、ARPB、SSHC、TelnetD、WEPE、SNMPv1F、SNMPv2

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()A、Allow unrestricted access to the console or VTY ports.B、Use a firewall to restrict access from the outside to the network devices.C、Always use Telnet to access the device command line because its data is automatically encrypted.D、Use SSH or another encrypted and authenticated transport to access device configurations.E、Prevent the loss of passwords by disabling password encryption.

For what two purposes does the Ethernet protocol use physical addresses?()A、to uniquely identify devices at Layer 2B、to allow communication with devices on a different networkC、to differentiate a Layer 2 frame from a Layer 3 packetD、to establish a priority system to determine which device gets to transmit firstE、to allow communication between different devices on the same networkF、to allow detection of a remote device when its physical address is unknown

You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company’s main office is in Barcelona, and it has branch offices in Paris and London. The company has no immediate plans to expand or relocate the offices.   The company wants to connect the office networks by using a frame relay WAN connection and Routing and Remote Access servers that are configured with frame relay WAN adapters. Computers in each office will be configured to use the local Routing and Remote Access server as a default gateway. You are planning the routing configuration for the Routing and Remote Access servers.   You need to allow computers in Barcelona, Paris, and London to connect to computers in any office. You want to minimize routing traffic on the WAN connection.   What should you do?  ()A、 At each office, add the OSPF routing protocol to Routing and Remote Access, add the WAN adapter to the OSPF routing protocol, and deploy OSPF as a single-area internetwork.B、 At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 broadcast and the incoming packet protocol as RIP version 1 and 2.C、 At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 multicast and the incoming packet protocol as RIP version 2 only.D、 At each office, configure the Routing and Remote Access server with static routes to the local networks at the other two offices.

Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS).   The Network Policy Server has a certificate installed.   Client computers are unable to connect to the wireless access points.    You need to enable client computers to connect to the wireless network.   What should you do?()A、Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).B、Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).C、Install a certificate in the Trusted Root Certification Authorities certificate store.D、Install a certificate in the Third-Party Root Certification Authorities certificate store.

You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. The company has many remote users One of the servers on the network calledServer01 has the Terminal Services Gateway (TS Gateway) role installed on it. The remote users of thecompany need to connect remotely to desktop computers located in their offices through the gateway. Toensure secure connection to the gateway, you created a security group named RemoteUsersGrp1 for theremote users who need to connect to computers in their offices. Which of the following options would youchoose to enable the remote users to connect to the TS Gateway? ()A、Create a resource authorization policy.B、Create a client authorization policy.C、Create a Group Policy object enable the Set TS Gateway authentication method properties to Ask forcredentials,use Basic protocol.D、Add the RemoteUsersGrp1 security group and enable Device redirection.

You have a server that runs the Terminal Services Gateway (TS Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices.  You create a security group named Remote1 for the users who need to connect to computers in their offices.  You need to enable the users to connect to the TS Gateway. What should you do?()A、Add the Remote1 security group to the local remote desktop users group on the TS Gateway server.B、Create a client authorization policy. Add the Remote1 security group and enable Device redirection.C、Create a resource authorization policy. Add the Remote1 security group and enable Users to connect to any resource.D、Create a Group Policy object and enable the Set TS Gateway authentication method properties to Ask for credentials, use Basic protocol. Apply the policy to the TS Gateway server.

Network topology exhibit: You are the administrator at ExamSheet.net.  You use TCP/IP as the only protocol on your network. The network is configured as in the network topology exhibit. All existing computers and devices use 255.255.240.0 as the subnet mask. You install Windows 2000 Professional on a computer named ExamSheet2. You configure ExamSheet2 to have a TCP/IP address of 10.10.20.234, a default gateway of 10.10.20.1, a subnet mask of 255.255.0.0 and a WINS server address of 10.10.13.10. You cannot connect to  shared resources on ExamSheetB by using its UNC name. You want ExamSheet2 to be able to connect to ExamSheetB. What should you do? ()A、Install a WINS server on the same segment as Company2B、Install and configure a DNS server and configure Company2 to use the DNS Server service.C、Configure Company2 with a default gateway address 10.10.13.1.D、Configure Company2 with a default gateway address of 10.10.30.1.E、Configure Company2 with a TCP/IP address of 10.10.20.234.

You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.

单选题What is a static packet-filtering firewall used for ?()AIt validates the fact that a packet is either a connection request or a data packet belonging to a connectionBIt evaluates network packets for valid data at the application layer before allowing connectionsCIt analyzes network traffic at the network and transport protocol layersDIt keeps track of the actual communication process through the use of a state table

多选题For what two purposes does the Ethernet protocol use physical addresses?()Ato uniquely identify devices at Layer 2Bto allow communication with devices on a different networkCto differentiate a Layer 2 frame from a Layer 3 packetDto establish a priority system to determine which device gets to transmit firstEto allow communication between different devices on the same networkFto allow detection of a remote device when its physical address is unknown

单选题Rewrite rules are used in which CoS scenario?()AWhen a single device is configured to provide differentiated services.BWhen multiple devices in a network are configured to use CoS to provide differentiated services.CWhen a device is used to connect to another autonomous system.DWhen CoS is used to classifiy traffic as low priority.

多选题Which two statements accurately describe a broadcast domain?()ABroadcast domains consist of devices that connect to a common switch or hub.BBroadcast domains consist of a group of devices that can be reached by sending a frame addressed to the Layer 2 broadcast address.CBroadcast domains require a gateway device such as a router.DBroadcast domains consist of devices that reside on the same sub-network.

单选题Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()AARPBSSHCTelnetDWEPESNMPv1FSNMPv2

单选题You have a server named Server2 that runs Windows Server 2003 Service Pack 2 (SP2). The server has two network connections named Local Area Connection and Internet Connection.You configure network address translation (NAT) on Server2 as shown in the exhibit. (Click the Exhibit button.) You configure all client computers to use Server2 as their default gateway.Users report that they cannot connect to the Internet. You successfully connect to the Internet from Server2.You need to ensure that client computers can access Internet resources.  What should you do?()AChange the Internet Connection interface type to Basic firewall only. BChange the Internet Connection interface type to Private interface connected to private network. CAdd Local Area Connection as a new interface for the NAT protocol and set the interface as a Public interface connected to the Internet. DAdd Local Area Connection as a new interface for the NAT protocol and set the new interface as a Private interface connected to private network.