單項選擇題You and a co-worker have established wireless communication directly between your wireless laptops. What type of wireless topology has been created?()

A.BSS
B.ESS
C.IBSS
D.SSID


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題During startup, the router displays the following error message: boot: cannot open "flash:" What will the router do next?()

A.Because of damaged flash memory, the router will fail the POST
B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialog.
C.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM
D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog.
E.It will attempt to locate the configuration file from a TFTP server. If this fails, it will load a limited configuration from ROM

2.單項選擇題What does the "Inside Global" address represent in the configuration of NAT?()

A.the summarized address for all of the internal subnetted addresses
B.the MAC address of the router used by inside hosts to connect to the Internet
C.a globally unique, private IP address assigned to a host on the inside network
D.a registered address that represents an inside host to an outside network

3.單項選擇題Which statement accurately describes a benefit provided by VTP?()

A.VTP allows routing between VLANs.
B.VTP allows a single port to carry information to more than one VLAN
C.VTP allows physically redundant links while preventing switching loops.
D.VTP allows switches to share VLAN configuration information.

4.單項選擇題On which types of network will OSPF elect a backup designated router?()

A.point-to-point and multiaccess
B.point-to-multipoint and multiaccess
C.point-to-point and point-to-multipoint
D.nonbroadcast and broadcast multipoint
E.nonbroadcast and broadcast multiaccess

5.單項選擇題Why would a network administrator configure port security on a switch?()

A.to prevent unauthorized Telnet access to a switch port
B.to limit the number of Layer 2 broadcasts on a particular switch port
C.to prevent unauthorized hosts from accessing the LAN
D.to protect the IP and MAC address of the switch and associated ports
E.to block unauthorized access to the switch management interfaces over common TCP ports

最新試題

Which command is used to display the collection of OSPF link states?()

題型:單項選擇題

Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()

題型:單項選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項選擇題

At which layer of the OSI model dose PPP perform?()

題型:單項選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:單項選擇題

An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()

題型:單項選擇題

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

題型:單項選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:單項選擇題

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

題型:單項選擇題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項選擇題