单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()AVLANBPeer to PeerCVTPDVPN

单选题
Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
A

VLAN

B

Peer to Peer

C

VTP

D

VPN


参考解析

解析: 暂无解析

相关考题:

Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?() A.VLANB.Peer to PeerC.VTPD.VPN

Physical and logical network diagrams are used for which of the following configuration management goals?() A. Track DHCP distributionB. Compare MAC and IP addressesC. Document Internet access historyD. Identity network devices

In which of the following topologies could the failure of one machine cause the entire network tostop functioning?() A. MeshB. Token ringC. StarD. Spanning tree

Which of the following network topologies BEST describes a VPN? ()(Select TWO) A. Point to PointB. Point to MultipointC. VLAND. RingE. Bus

Which of the following network protocols is used to ensure consistent time across network devices on the domain?() A.NTPB.FTPC.RTPD.IGMP

Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()A、 ARPB、 DMZC、 VLAND、 VPN

Which of the following network topologies BEST describes a VPN? ()(Select TWO)A、Point to PointB、Point to MultipointC、VLAND、RingE、Bus

In which of the following topologies could the failure of one machine cause the entire network tostop functioning?()A、MeshB、Token ringC、StarD、Spanning tree

Physical and logical network diagrams are used for which of the following configuration management goals?()A、Track DHCP distributionB、Compare MAC and IP addressesC、Document Internet access historyD、Identity network devices

Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()A、StarB、BusC、MeshD、Ring

Which of the following configuration management documentation types would an administrator useto know how and when to property install new network devices on the LAN?()A、Baseline configurationB、Logical network diagramC、Network policyD、Wiring schematic

Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP

Which of the following would help a new administrator quickly determine if a network had a VLANfor its publicly accessible servers?()A、BaselinesB、RegulationsC、Logical network diagramsD、Wiring schematics

Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP

Which of the following tools is used to report the location of logical partitions of a file system on a physical volume?()A、 lsfsB、 iostatC、 lslv -pD、 lsvg -p

Which of the following tools should be used to analyze the placement of file fragments on a mirrored logical volume?()A、 dfB、 lslvC、 filemonD、 fileplace

Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A、 netpmonB、 netstatC、 nfsstatD、 vmstat

Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig

Which of the following commands should be used to show how much data is read from or written to a particular logical volume, given there are several other logical volumes on the same disk?()A、 sarB、 lslvC、 iostatD、 filemon

单选题Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A netpmonB netstatC nfsstatD vmstat

单选题Which of the following network topologies offers the greatest protection against network outages due to a single line break?()ABusBStarCMeshDRing

单选题Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()AMeshBBusCRingDStar

多选题Which of the following network topologies BEST describes a VPN? ()(Select TWO)APoint to PointBPoint to MultipointCVLANDRingEBus

单选题Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()A ARPB DMZC VLAND VPN

单选题Which of the following is the term used to describe the aggregation of multiple components to formone logical component?()ABondingBCircuit switchingCCSMA/CDDChannelization

单选题Which of the following commands should be used to determine whether a logical volume is contiguous across a disk?()A lslvB lsfsC lspvD fileplace

单选题Which of the following OSI model layers is used for logical addressing?()APhysicalBTransportCNetworkDData link