单选题When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()ARingBMeshCStarDHybrid
单选题
When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()
A
Ring
B
Mesh
C
Star
D
Hybrid
参考解析
解析:
暂无解析
相关考题:
● An internet is a combination of networks connected by (71) . When a datagram goes from a source to a (72) , it will probably pass many (73) until it reaches the router attached to the destination network. A router receives a (74) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (75) is the optimum pathway?(71)A. modemsB. routersC. switchesD. computers(72)A. userB. hostC. cityD. destination(73)A. destinationsB. routersC. packetsD. computers(74)A. destinationB. resourceC. packetD. source(75)A. pathwaysB. routersC. diagramsD. calls
An internet is a combination of networks connected by (71) .When a datagram goes from a source to a (72) ,it will probably pass many (73) until it reaches the router attached to the destination network.A router receives a (74) from a network and passes it to another network.A router is usually attached to several networks.When it receives a packet,to which network should it pass the packet? The decision is based on optimization: Which of the available (75) is the optimum pathway?A.modemsB.routersC.switchesD.computers
When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?() A.RingB.MeshC.StarD.Hybrid
Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?() A. StarB. HybridC. MeshD. Ring
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A.WormB.SmurfC.Logic BombD.Man-in-the-middle
When configured. MPLS can increase routing redundancy by providing which of the following network topology types?() A.BusB.MeshC.MultipathD.Ring
An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway?空白(2)处应选择()A、userB、hostC、cityD、destination
An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway? 空白(1)处应选择()A、modemsB、routersC、switcherD、computers
Which of the following BEST describes a hub?()A、Determines the best route to transmit dataB、Inspects traffic and accepts or declines transmissionC、Broadcasts data to specific network devicesD、Broadcasts data to all network devices
When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()A、RingB、MeshC、StarD、Hybrid
Which of the following network cable types is MOST often used in environments where physicalsecurity of the data is the top priority?()A、UTPB、CoaxialC、Fiber opticD、STP
When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()A、BusB、MeshC、MultipathD、Ring
Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()A、StarB、HybridC、MeshD、Ring
Which of the following are advantages of using Dynamic Host Configuration Protocol?()A、IP addresses can be managed from a central pointB、Computers can automatically get new addressing when moved to a different network segmentC、Media Access Control addresses can be changed automaticallyD、The network speed can automatically adjust based on the type of traffic being generatedE、The HOSTS file on the computer can be validated for proper entries
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A、WormB、SmurfC、Logic BombD、Man-in-the-middle
Which of the following terms is used when printing data on both the front and the back of paper?()A、ScalingB、CopyingC、DuplexD、Simplex
A host is to be part of a very small private network, which will never be connected to any other networks. Which of the following name resolution schemes would be the easiest to implement?()A、DNSB、NISC、DHCPD、etc/hosts file
You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A、Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B、Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C、Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D、Configure the IP properties of the portable computers so that they have an alternate configuration.
单选题Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()AStarBHybridCMeshDRing
单选题An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway?空白(2)处应选择()AuserBhostCcityDdestination
单选题Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()AStarBRingCBusDMesh
单选题Which of the following network cable types is MOST often used in environments where physicalsecurity of the data is the top priority?()AUTPBCoaxialCFiber opticDSTP
单选题Which of the following terms is used when printing data on both the front and the back of paper?()AScalingBCopyingCDuplexDSimplex
单选题You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()AConfigure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). BConfigure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).CAdd a script to the users' desktops that changes the IP configuration between dynamic and manual.DConfigure the IP properties of the portable computers so that they have an alternate configuration.
单选题Which of the following BEST describes a hub?()ADetermines the best route to transmit dataBInspects traffic and accepts or declines transmissionCBroadcasts data to specific network devicesDBroadcasts data to all network devices
单选题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()AWormBSmurfCLogic BombDMan-in-the-middle
单选题A host is to be part of a very small private network, which will never be connected to any other networks. Which of the following name resolution schemes would be the easiest to implement?()ADNSBNISCDHCPDetc/hosts file