A. It is a globally unique IP address.
B. It is a globally unique 48 bit address
C. It is provided by the manufacturer of the NIC.
D. It is used as part of the IPX/SPX configuration.
E. It is a logical address.
您可能感興趣的試卷
你可能感興趣的試題
A. Packet switching
B. Collision prevention on a LAN segment.
C. Packet filtering
D. Broadcast domain enlargement
E. Broadcast forwarding
F. Internetwork communication
A. Bridges are faster than switches because they have fewer ports.
B. A switch is a multiport bridge,
C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame received.
D. A bridge will forward a broadcast but a switch will not.
E. Bridges and switches increase the size of a collision domain.
F. None of the above statements are true.
A. Transparent bridging
B. Cut-through switching
C. Fragment-free switches
D. Virtual LANs
E. Store-and-forward switching
A. Hubs can have their ports be configured with VLANs
B. Using hubs is costly with regard to bandwidth availability.
C. Switches can not forward broadcasts.
D. Switches are more efficient than hubs in processing frames.
E. Switches increase the number of collision domains in the network.
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network.
Which of the following would allow you accomplish this?()
A.STP
B.GVRP
C.SNMP
D.VTP
E.DHCP
最新試題
Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()
A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()
What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
What feature of a networks switch allows an administrative to create separate broadcast domains?()
A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()
Which of the following contribute to congestion on an Ethernet network?()
What is the subnetwork address for a host with IP address 201.100.5.68/28?()
Which characteristics are representative of a link-state routing protocol?()
Which of the following host addresses are member of networks that can be routed across the public Internet? ()