The connection between two networks to from an internet is handled by a machine known as a ( ). A.bridge B.server C.router D.switch

The connection between two networks to from an internet is handled by a machine known as a ( ).

A.bridge
B.server
C.router
D.switch

参考解析

解析:连接两个网络使其互联的设备称为路由器(router)。
A.网桥 B.服务器 C.路由器 D.交换机

相关考题:

The connection between two networks from an intemet is handled by a machine known as a() A.bridgeB.serverC.routerD.switch

● The connection between two networks to form. an internet is handled by a machine known as a (71) .(71)A.bridgeB.clientC.routerD.switch

The connection between two networks to form. an internet is handled by a machine known as a ______.A.bridgeB.clientC.routerD.switch

●Networks can be interconnected by different devices.In the physical layer,networks can be connected by (66) or Hubs,which just move the bits from one network to an identical network.One layer up we find bridgas and swiehes,which operate at data link layer.They can accept (67) ,examine the MAC address,and forward the frames to a different network while doing minor protocol translation in the process.In the network layer,we have routers that can connect two netwoks.If two networks have (68) network layer,the router may be able to translate between the packet formats.In the transport layer we find transport gateway,which can interface between the two transport connections.Finally,in the application layer,application gateways translate message (69) .As an example,gateways between Internet e-mail and X.400 e-mail must (70) the e-mail message and change various header fields.(66) A.reapersB.relaysC.connectsD.modems(67) A.framesB.bytesC.packagesD.cells(68) A.specialB.dependentC.similarD.dissimilar(69) A.syntaxB.semanticsC.languagesD.format(70) A.analyzeB.pairsC.deleteD.create

Networks can be interconnected by different devices in the physical layer networks can be connected by (71) or hubs.which just move the bits from one network to an identical network.One layer up we find bridges and switches which operate at data link layer.They can accept (72) ,examine the MAC address and forward the frames to a different network while doing minor protocol translation in the process in me network layer,we have routers that can connect two networks,If two networks have (73) network layer,the router may be able to translate betweenthe packer formats.In the transport layer we find transport gateway,which can interface between two transport connections Finally,in the application layer,application gateways translate message (74) .As an example,gateways between Internet e-mail and X,400 e-mail must (75) thee-mail message and change various header fields.(68)A.reapersB.relaysC.packagesD.modems

Networks can be interconnected by different devices. In the physical layer, networks can be connected by(66)or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches, which operate at data link layer. They can accept(67), examine the MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have(68)network layer, the router may be able to translate between the packet formats. In the transport layer we fmd transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message(69). As an example, gateways between Internet e-mail and X.400 e-mail must(70)the e-mail message and change various header fields.A.repeatersB.relaysC.connectorsD.modems

Which of the following describes a secure connection over the Internet between two sites?() A. FTPB. VLANC. VPND. HTTP

There are two networks sharing the same office space. One network already has an 802.11g accesspoint. The second network acquires one as well. If known, which of the following would help keep the two networks from interfering with each other?()A.ChannelB.WEP keyC.Pre-shared keyD.Encryption type

A customer has two separate storage networks and is planning to implement an SVC to provide for FlashCopy between the two networks. What is the minimum number of ISL ports required?() A.0B.1C.2D.4

Refer to the exhibit. A Boston company bought th e assets of a New York company and is trying to route traffic between the two data networks using EIGRP. The show command output shows that traffic will not flow between the networks. As a network consultant, you were asked to modify the configuration a nd certify the interoperability of the two networks. For traffic to flow from subnet 172.16.8.0/24 to the 172.16.16.0/24 subnet, which configuration change do you recommend?()A. Turn off autosummarization on routers N1 and B1.B. Add IP summary addre sses to the Internet - pointing interfaces of routers N1 and B1.C. Turn off autosummarization on routers N2 and B2.D. Add wildcard masks to the network commands on routers N2 and B2.

● Networks can be interconnected by different devices. In the physical layer,networks can be connected by(1)or hubs,which just move the bits from one network to an identical network. One layer up we find bridges and switches,which operate at data link layer. They can accept(2),examine the MAC address,and forward the frames to a different network while doing minor protocol translation in the process. In the network layer,we have routers that can connect two networks. If two networks have(3)network layer, the router may be able to translate between the packet formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally,in the application layer, application gateways translate message(4).As an example, gateways between Internet e-mail and X.400 e-mail must (5)the e-mail message and change various header fields.(1)A.reapersB.relaysC.connectorsD.modems(2)A.framesB.packetsC.packagesD.cells(3)A.specia lB.dependentC.similarD.dissimilar(4)A.syntaxB.semanticsC.languageD.format(5)A.analyzeB.parseC.deleteD.create

IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]B.private]C.personalD.proper

A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted

You need to design a migration strategy to migrate the Exchange Server 5.5 mailboxes. What should you do?()A、Create and configure a one-way recipient connection agreement from Active Directory to Exchange Server 5.5B、Create and configure a configuration connection agreement between Exchange Server 5.5 and Active DirectoryC、Create and configure an inter-organizational recipient connection agreement from Exchange Server 5.5 to Active DirectoryD、Create and configure a two-way recipient connection agreement between Exchange Server 5.5 to Active DirectoryE、Use Microsoft Identity Integration Server (MIIS) to synchronize objects between Exchange Server 5.5 and Active Directory

A customer has two separate storage networks and is planning to implement an SVC to provide for FlashCopy between the two networks. What is the minimum number of ISL ports required?()A、0B、1C、2D、4

Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potential differences between the two buildings. Which media type should be used for the connection()。A、UTP cableB、STP cableC、coaxial cableD、fiber optic cable

The connection between two networks from an intemet is handled by a machine known as a()A、bridgeB、serverC、routerD、switch

A machine must have the most direct access possible to two different networks.  However, it cannot act as a router between the networks.  Which of the following arrangements is most appropriate to facilitate the machine’s accessibility?()A、ipforwarding turned on and two adaptersB、One adapter, with a route to a default gatewayC、An adapter in each network, and ipforwarding offD、An adapter in each network, with a route only to the default gateway

You need to design a connection agreement for Active Directory Connector to synchronize directory information with the subsidiary location. Which two actions should you perform?()A、Configure a one-way connection agreement that replicates from the subsidiary’s Exchange 5.5 organization to Active DirectoryB、Configure a one-way connection agreement that replicates from Active Directory to the subsidiary’s Exchange 5.5 organizationC、Configure two one-way connection agreements that replicate between the subsidiary’s Exchange 5.5 organization and Active DirectoryD、Configure the connection agreement to replicate all objectsE、Configure the connection agreement to replicate only mailboxesF、Configure the connection agreement to save deletions in an LDAP Data Interchange Format file

单选题A customer has two separate storage networks and is planning to implement an SVC to provide for FlashCopy between the two networks. What is the minimum number of ISL ports required?()A0B1C2D4

单选题You have a server that runs Windows Server 2008 and has the Windows Server Virtualization (WSv) server role installed. You create a new virtual machine.  You need to configure the virtual machine to meet the following requirements: Allow network communications between the virtual machine and the host system. Prevent communications with other network servers. What should you do first?()AInstall the Microsoft Loopback Adapter.BCreate a new Virtual Network Switch.CEnable Internet Connection Sharing (ICS).DSet the Connection to None for the network interface card.

单选题As observed from the Earth,the angle between lines from the Earth to the Sun and the Earth to an inferior planet is known as().AelongationBconjunctionCoppositionDquadrature

单选题There are two networks sharing the same office space. One network already has an 802.11g accesspoint. The second network acquires one as well. If known, which of the following would help keep the two networks from interfering with each other?()AChannelBWEP keyCPre-shared keyDEncryption type

单选题Which of the following describes a secure connection over the Internet between two sites?()AFTPBVLANCVPNDHTTP

单选题You need to design a migration strategy to migrate the Exchange Server 5.5 mailboxes. What should you do?()ACreate and configure a one-way recipient connection agreement from Active Directory to Exchange Server 5.5BCreate and configure a configuration connection agreement between Exchange Server 5.5 and Active DirectoryCCreate and configure an inter-organizational recipient connection agreement from Exchange Server 5.5 to Active DirectoryDCreate and configure a two-way recipient connection agreement between Exchange Server 5.5 to Active DirectoryEUse Microsoft Identity Integration Server (MIIS) to synchronize objects between Exchange Server 5.5 and Active Directory

单选题A machine must have the most direct access possible to two different networks.  However, it cannot act as a router between the networks.  Which of the following arrangements is most appropriate to facilitate the machine’s accessibility?()Aipforwarding turned on and two adaptersBOne adapter, with a route to a default gatewayCAn adapter in each network, and ipforwarding offDAn adapter in each network, with a route only to the default gateway

多选题You need to design a connection agreement for Active Directory Connector to synchronize directory information with the subsidiary location. Which two actions should you perform?()AConfigure a one-way connection agreement that replicates from the subsidiary’s Exchange 5.5 organization to Active DirectoryBConfigure a one-way connection agreement that replicates from Active Directory to the subsidiary’s Exchange 5.5 organizationCConfigure two one-way connection agreements that replicate between the subsidiary’s Exchange 5.5 organization and Active DirectoryDConfigure the connection agreement to replicate all objectsEConfigure the connection agreement to replicate only mailboxesFConfigure the connection agreement to save deletions in an LDAP Data Interchange Format file