网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Assuming you build networks to exact specifications, what is the recommended maximum length a 10BaseT cable can be before it has to be segmented or repeated?()

  • A、100 meters
  • B、100 feet
  • C、100 yards
  • D、200 meters

参考答案

更多 “Assuming you build networks to exact specifications, what is the recommended maximum length a 10BaseT cable can be before it has to be segmented or repeated?()A、100 metersB、100 feetC、100 yardsD、200 meters” 相关考题
考题 (b) Assuming that the acquisition proceeds, what steps will Datum Paper Products need to take to build a sharedculture in the two companies? (10 marks)

考题 You need subnet a Ezonexam network segment. How many subnetworks and hosts are available per subnet if you apply a /28 mask to the 210.10.2.0 class C network?A. 30 networks and 6 hosts.B. 6 networks and 30 hosts.C. 8 networks and 32 hosts.D. 32 networks and 18 hosts.E. 16 networks and 14 hosts.F. None of the above

考题 Assuming we had a continuous feed of data that was being piped intosite, and it needed to distributed to up to 10 different machines inreal time. Describe at least one method you would use?

考题 You have been asked to use a 30 bit subnet mask to segment the following network block: 108.12.5.0. How many useable subnetworks and usable hosts could be created?() A.32 networks with 8 hostsB.62 networks with 2 hostsC.30 networks with 16 hostsD.32 networks with 14 hosts

考题 Which of the following IP hosts would be valid for PC users, assuming that a /27 network mask was used for all of the networks?() A.15.234.118.63B.83.121.178.93C.134.178.18.56D.192.168.19.37E.201.45.116.159F.217.63.12.192

考题 You are the Cisco Network Designer in Cisco.com. Which of these practices should you follow when designing a Layer 3 routing protocol?() A. Never peer on transit links.B. Build squares for deterministic convergence.C. Build inverted U designs for deterministic convergence.D. Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.

考题 If you don't promise to help build more houses, ordinary people()A、will not be nefitB、would not be nefitC、should not be nefitD、couldnot be nefit

考题 Which of the following IP hosts would be valid for PC users, assuming that a /27 network mask was used for all of the networks?()A、15.234.118.63B、83.121.178.93C、134.178.18.56D、192.168.19.37E、201.45.116.159F、217.63.12.192

考题 How many subnetworks and hosts are available per subnet if you apply a /28 mask to the 210.10.2.0 class C network?()A、30 networks and 6 hosts.B、6 networks and 30 hosts.C、8 networks and 32 hosts.D、32 networks and 18 hosts.E、14 networks and 14 hosts.F、None of the above

考题 You are the Cisco Network Designer in Cisco.com. Which of these practices should you follow when designing a Layer 3 routing protocol?()A、Never peer on transit links.B、Build squares for deterministic convergence.C、Build inverted U designs for deterministic convergence.D、Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.

考题 ou perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:///data.cap file.You create a scheduled task. You add a new Start a program action to the task. You need to add theapplication name and the application arguments to the new action. What should you do?()A、Add nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap /stopwhen /timeafter 11hours line as arguments.B、Add netmon.exe as the application name. Add the /networks */capture LDAP /file e:/data.cap /stopwhen /timeafter 11hours line as arguments.C、Add nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:/data.cap /stopwhen /timeafter 11hours line as arguments.D、Add nmconfig.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap /stopwhen /timeafter 11hours line as arguments.

考题 You have been asked to use a 30 bit subnet mask to segment the following network block: 108.12.5.0. How many useable subnetworks and usable hosts could be created?()A、32 networks with 8 hostsB、62 networks with 2 hostsC、30 networks with 16 hostsD、32 networks with 14 hosts

考题 You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1. You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the e:/data.cap file. You create a scheduled task. You add a new Start a program action to the task. You need to add the application name and the application arguments to the new action. What should you do?() A、 Add nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap / stopwhen /timeafter 11hours line as argumentsB、 Add netmon.exe as the application name. Add the /networks */capture LDA /file e:/data.cap /stopwhen / T.imeafter 11hours line as argumentsC、 Add nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:/data.cap /stopwhen /timeafter 11hours line as argumentsD、 Add nmconfig.exe as the application name. Add the /networks */capture LDAP /file e:/data.cap / stopwhen /timeafter 11hours line as arguments

考题 If you choose Typical Settings, which of the following configurations are made during the Network Settings component of the Windows 2000 Professional installation?()A、Network connections for Client for Microsoft Networks.B、File and Print Sharing for Microsoft Networks.C、NetBEUI protocol with automatic addressing.D、TCP/IP protocol with automatically assigned IP address.E、Network connections for Client for Netware Networks.

考题 You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:/data.cap file.You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action.What should you do?()A、Add nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.B、Add netmon.exe as the application name. Add the /networks */capture LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.C、Add nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.D、Add nmconfig.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.

考题 单选题You are working on a debug build of an application.You need to find the line of code that caused an exception to be thrown. Which property of the Exception class should you use to achieve this goal?()A DataB MessageC Stack TraceD Source

考题 单选题You need to recommend a server build for the Web servers. Which server build should you recommend?()A Class 1B Class 2C Class 3D Class 4

考题 单选题If you don't promise to help build more houses, ordinary people()A will not be nefitB would not be nefitC should not be nefitD couldnot be nefit

考题 单选题The Cisco MDS 9000 Series Multilayer SAN Switches can help lower the total cost of ownership ofthe most demanding storage environments. By combining a robust and flexible hardwarearchitecture with multiple layers of network and storage-management intelligence, the Cisco MDS 9000 Series helps you build highly available, scalable storage networks with advanced securityand unified management. What method does the Cisco MDS 9000 Series use to support trunking?()A  ISLB  VLAN TrunkC  VoQD  Enhanced ISL

考题 单选题Assuming you build networks to exact specifications, what is the recommended maximum length a 10BaseT cable can be before it has to be segmented or repeated?()A 100 metersB 100 feetC 100 yardsD 200 meters

考题 单选题You have been asked to use a 30 bit subnet mask to segment the following network block: 108.12.5.0. How many useable subnetworks and usable hosts could be created?()A 32 networks with 8 hostsB 62 networks with 2 hostsC 30 networks with 16 hostsD 32 networks with 14 hosts

考题 单选题The Cisco MDS 9000 Series Multilayer SAN Switches can help lower the total cost of ownership of the most demanding storage environments. By combining a robust and flexible hardware architecture with multiple layers of network and storage-management intelligence, the Cisco MDS 9000 Series helps you build highly available, scalable storage networks with advanced security and unified management.What method does the Cisco MDS 9000 Series use to support trunking?()A ISLB VLAN TrunkC VoQD Enhanced ISL

考题 单选题You connect your computer to a wireless network. You discover that this new connection fails to show in the Connect to a network window.  You need to view this connection in the Connect to a network window.  What should you do?()A Click the Diagnose and repair link.B Enable the Turn on notification of new networks option.C Configure the Connect to a network window to show all networks.D Disable the Connect automatically when this network is in range option, and then enable the Connect even if the network is not broadcasting option.

考题 多选题Which of the following IP hosts would be valid for PC users, assuming that a /27 network mask was used for all of the networks?()A15.234.118.63B83.121.178.93C134.178.18.56D192.168.19.37E201.45.116.159F217.63.12.192

考题 单选题You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D Configure the IP properties of the portable computers so that they have an alternate configuration. 

考题 单选题How many subnetworks and hosts are available per subnet if you apply a /28 mask to the 210.10.2.0 class C network?()A 30 networks and 6 hosts.B 6 networks and 30 hosts.C 8 networks and 32 hosts.D 32 networks and 18 hosts.E 14 networks and 14 hosts.F None of the above

考题 单选题What should you do if you are making changes to your house?A Check 700 plans to build new buildings.B Think carefully about those living near you.C Give enough details to the people next door.