网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Identify the link efficiency mechanism?()
A
LFI
B
LLQ
C
RSVP
D
WFO
E
WRED
参考答案
参考解析
解析:
暂无解析
更多 “单选题Identify the link efficiency mechanism?()A LFIB LLQC RSVPD WFOE WRED” 相关考题
考题
Microsoft's COM is a software(146)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(147)standard developed by Microsoft. OLE makes it possible to create(148)with one application and link or embed them in a second application. Embedded objects retain their original format and(149)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(150)compound document standard developed mainly by Apple and IBM is called OpenDoc.A.architectureB.protocolC.procedureD.structure
考题
VLAN Tagging, also known as Frame Tagging, is a method developed by Cisco to help identify packets travelling through trunk links. When an Ethernet frame traverses a trunk link, a special VLAN tag is added to the frame and sent across the trunk link .How does ERS use the VLAN tag?()A. provide service internetworkingB. support transparency for Layer 2 framesC. indicate destination as a connection identifierD. map to the DLCI in service internetworking
考题
What is the purpose of the cisco Vlan Trunking protocol?()
A. to provide a mechanism to dynamically assign vlan membership to switch portsB. to allow traffic to be carried from multiple vlans over a single link between switchesC. to allow native vlan information to be carried over a trunk linkD. to provide a mechanism to manually assign vlan membership to switch portsE. to allow for managing the additions,deletions,and changes of vlans between switchs
考题
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
A.CHAP uses a two-way handshakeB.CHAP authentication periodically occurs after link establishmentC.CHAP has no protection from playback attacksD.CHAP authentication is performed only upon link establishmentE.CHAP uses a three-way handshakeF.CHAP authentication passwords are sent in plaintext
考题
Microsoffs COM is a software(66)that allows applications to be built from binary software components. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(67)standard developed by Microsoft. OLE makes it possible to create(68)with one application and link or embed them in a second application. Embedded objects retain their original format and(69)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(70)compound document standard developed mainly by Apple and IBM is called OpenDoc.A.architectureB.protocolC.procedureD.structure
考题
In the context of configuring dial-on-demand routing using ISDN, what is the purpose of the dialer-list command?()A、to identify valid numbers for incoming callsB、to define the type of ISDN switch at the central officeC、to specify the list of outgoing phone numbers used by the routerD、to associate a dial configuration with a physical interfaceE、to define interesting traffic that will enable the link
考题
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()A、CHAP uses a two-way handshakeB、CHAP authentication periodically occurs after link establishmentC、CHAP has no protection from playback attacksD、CHAP authentication is performed only upon link establishmentE、CHAP uses a three-way handshakeF、CHAP authentication passwords are sent in plaintext
考题
Which two statements correctly identify considerations to take into account when deciding on Campus QoS Design elements?()A、Voice needs to be assigned to the hardware priority queue.B、Voice needs to be assigned to the software priority queue.C、Call signaling must have guaranteed bandwidth service.D、Strict-priority queuing should be limited to 50 percent of the capacity of the link.E、At least 33 percent of the link bandwidth should be reserved for default best-effort class.
考题
VLAN Tagging, also known as Frame Tagging, is a method developed by Cisco to help identify packets travelling through trunk links. When an Ethernet frame traverses a trunk link, a special VLAN tag is added to the frame and sent across the trunk link .How does ERS use the VLAN tag?()A、provide service internetworkingB、support transparency for Layer 2 framesC、indicate destination as a connection identifierD、map to the DLCI in service internetworking
考题
What is the purpose of the cisco Vlan Trunking protocol?()A、to provide a mechanism to dynamically assign vlan membership to switch portsB、to allow traffic to be carried from multiple vlans over a single link between switchesC、to allow native vlan information to be carried over a trunk linkD、to provide a mechanism to manually assign vlan membership to switch portsE、to allow for managing the additions,deletions,and changes of vlans between switchs
考题
Which mechanism can you use to achieve sub-second failover for link failure detection when a switched Ethernet media is used and loss of signal is not supported by the link provider?()A、OSPF standard hellosB、Cisco Discovery Protocol link detectionC、Bidirectional Forwarding DetectionD、Fast Link PulseE、autonegotiation
考题
Which of the following abilities does a view NOT provide?()A、Change which columns showB、Open a view from another databaseC、Contain custom controlsD、Identify a column to act as a link
考题
Which four are true regarding the Workspace Manager in Oracle9i? ()A、Automatically versions all tables.B、Automatically installed with Oracle9i.C、Merges changes with parent rows or discard changes.D、Provides mechanism to identify and resolve conflicts.E、Allows for version enabling tables by use of a packages procedure.
考题
You are an administrator at Certkiller .com. Certkiller has a network of 5 member servers acting as file servers. It has an Active Directory domain. You have installed a software application on the servers. As soon as the application is installed, one of the member servers shuts down itself. To trace and rectify the problem, you create a Group Policy Object (GPO). You need to change the domain security settings to trace the shutdowns and identify the cause of it. What should you do to perform this task()A、Link the GPO to the domain and enable System Events optionB、Link the GPO to the domain and enable Audit Object Access optionC、Link the GPO to the Domain Controllers and enable Audit Object Access optionD、Link the GPO to the Domain Controllers and enable Audit Process tracking optionE、Perform all of the above actions
考题
多选题Which two statements correctly identify considerations to take into account when deciding on Campus QoS Design elements?()AVoice needs to be assigned to the hardware priority queue.BVoice needs to be assigned to the software priority queue.CCall signaling must have guaranteed bandwidth service.DStrict-priority queuing should be limited to 50 percent of the capacity of the link.EAt least 33 percent of the link bandwidth should be reserved for default best-effort class.
考题
多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext
考题
单选题In the context of configuring dial-on-demand routing using ISDN, what is the purpose of the dialer-list command?()A
to identify valid numbers for incoming callsB
to define the type of ISDN switch at the central officeC
to specify the list of outgoing phone numbers used by the routerD
to associate a dial configuration with a physical interfaceE
to define interesting traffic that will enable the link
考题
多选题You are the network administrator tasked with designing a switching solution for the Company network. Which of the following statements describing trunk links are INCORRECT?()AThe trunk link belongs to a specific VLAN.BMultiple trunk links are used to connect multiple end user devices.CA trunk link only supports native VLAN.DTrunk links use 802.10 to identify a VLAN.EThe native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets.
考题
单选题Which of the following statements is true concerning the overall efficiency of air compressors?()A
High pressure compressors are more efficient than low pressure compressorsB
Mechanical efficiency divided by compressor efficiency will equal the overall efficiency of the compressor unitC
Two stage compressors are generally more efficient than single stage compressorsD
The volumetric efficiency is decreased in multistage compressors
考题
多选题Which three statements about classification marking of traffic at Layer 2 are true? ()Aa Frame Relay header includes a 1-bit discard eligible (DE) bit to provide the class of service (CoS)Ban ATM header includes a 1-bit DE field to provide the CoSCan MPLS EXP field is inserted in the Layer 3 IP precedence field to identify the CoSDthe CoS field only exists inside Ethernet frames when 802.1Q or Inter-Switch Link (ISL) trunking is usedEin the IEEE 802.1p standard, three bits are used to identify the user priority bits for the CoSFin the IEEE 802.1q standard, six bits are used to identify the user priority bits for the CoS
考题
单选题What happens to the efficiency of an anchor when it is moved from sand to mud?()A
The efficiency increasesB
The efficiency decreasesC
The efficiency remains the sameD
The efficiency cannot be determined.
考题
单选题Which mechanism can you use to achieve sub-second failover for link failure detection when a switched Ethernet media is used and loss of signal is not supported by the link provider?()A
OSPF standard hellosB
Cisco Discovery Protocol link detectionC
Bidirectional Forwarding DetectionD
Fast Link PulseE
autonegotiation
考题
多选题In the design of a QoS solution, which two factors should be taken into consideration?()AOn congested links, all forms of traffic will require some form of QoS.BAll traffic types and requirements should be examined to determine the number of traffic classes required.CIn the implementation of link efficiency mechanisms on links that typically transport relatively large packets, header compression will be most efficient.DIn the implementation of link efficiency mechanisms on links that typically transport relatively small packets, header compression will be most efficient.EIn the implementation of link efficiency mechanisms on links that typically transport relatively small packets, payload compression will be most efficient.FPayload compression provides more available bandwidth and reduces processing delay time.
考题
单选题Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE.COM defines a binary standard for function calling between components,a way for components to dynamically discover the interfaces implemented by other components,and a mechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft.OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them.Support for OLE is built into the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoC.
空白(4)处应选择()A
characteristicsB
addressC
pageD
links
考题
单选题What is the purpose of the cisco Vlan Trunking protocol?()A
to provide a mechanism to dynamically assign vlan membership to switch portsB
to allow traffic to be carried from multiple vlans over a single link between switchesC
to allow native vlan information to be carried over a trunk linkD
to provide a mechanism to manually assign vlan membership to switch portsE
to allow for managing the additions,deletions,and changes of vlans between switchs
考题
多选题Which four are true regarding the Workspace Manager in Oracle9i? ()AAutomatically versions all tables.BAutomatically installed with Oracle9i.CMerges changes with parent rows or discard changes.DProvides mechanism to identify and resolve conflicts.EAllows for version enabling tables by use of a packages procedure.
热门标签
最新试卷