网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
The purpose of a network( )is to provide a shell around the network which will protect the system connected to the network from various threats.


A. firewall
B.switch
C. router
D. gateway

参考答案

参考解析
解析:网络防火墙的任务是提供一个网络保护壳,保护系统连接网络的时候不受到各种各种的威胁
更多 “The purpose of a network( )is to provide a shell around the network which will protect the system connected to the network from various threats. A. firewall B.switch C. router D. gateway ” 相关考题
考题 An internet is a combination of networks connected by (71) .When a datagram goes from a source to a (72) ,it will probably pass many (73) until it reaches the router attached to the destination network.A router receives a (74) from a network and passes it to another network.A router is usually attached to several networks.When it receives a packet,to which network should it pass the packet? The decision is based on optimization: Which of the available (75) is the optimum pathway?A.modemsB.routersC.switchesD.computers

考题 The purpose of a network( )is to provide a shell around the network which will protect the system connected to the network from various threats.A.firewallB.switchC.routerD.gateway

考题 Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?() A. StarB. HybridC. MeshD. Ring

考题 Which of the following tools would allow an administrator to push out a software update to allswitches on the network?() A. Network managementB. Protocol analyzerC. Network monitoringD. System diagnostic

考题 While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop.Which of these can you implement to prevent future occurrences of this issue?()A.RSTPB.root guardC.BPDU guardD.GLBP

考题 Networks can be interconnected by different devices.In the physical layer, networks can be connected by( ) or hubs, which just move the bits from one network to an identical network.A.repeaters B.relays C.connectors D.modems

考题 Which of the following describes the purpose of a network to pology diagram?()A、 To display the logical layout this can differ from the physical layoutB、 To enhance a user’s understanding of the datacenter layoutC、 To create a physical map of the datacenter to provide to guestsD、 To provide a blueprint for recreating the same server setup for another client

考题 What is the purpose of a network mask?()A、It is used in conjunction with the wildcard mask to determine the number of hosts on a networkB、It is used to define which parts of the IP address are allocated to host addresses and network prefixesC、It is used to hide subnets from external networks by masking the subnets with NATD、It is used to differentiate a network as a classful network or a classless network

考题 You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A、Content storage networkingB、Network optimizationC、Network managementD、Network security

考题 As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()A、GLBPB、RSTPC、BPDU guardD、root guard

考题 QoS refers to the ability of a network to provide improved service, over various underlying technologies, to select network traffic. Which two traits are inherent to QoS?()A、 reference to network ability to provide improved service to all network trafficB、 reduction in delay, jitter, and packet lossC、 equal handling of all packetsD、 support for real-time applicationsE、 best-effort actions

考题 What is an ideal Cisco solution to protect a campus network and services from potential security breaches?()A、Cisco Security Device ManagerB、Cisco Security AgentC、Cisco VPN ClientD、Cisco Intrusion Detection System

考题 What is an appropriate use of a default route?()A、to provide routing to a local web serverB、to provide routing from an ISP to a stub networkC、to provide routing that will override the configured dynamic routing protocolD、to provide routing to a destination that is not specified in the routing table and which is outside the local network

考题 Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()A、StarB、HybridC、MeshD、Ring

考题 A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A、NIC filtering is enabled.B、Port security is configured.C、NIC is not in promiscuous mode.D、NIC is in promiscuous mode.

考题 Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

考题 多选题Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()ACreate a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleBRun the wlbs disable command on the cluster nodesCAssign a unique port rule for NLB cluster by using the NLB Cluster consoleDDelete the default port rules through Network Load Balancing Cluster console

考题 单选题Which of the following protocols can be used to retrieve system and network performance information from a router?()A LDAPB IMAPC TFTPD SNMP

考题 单选题While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop. Which of these can you implement to prevent future occurrences of this issue?()A RSTPB root guardC BPDU guardD GLBP

考题 单选题You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A Network managementB Network optimizationC Network securityD Content storage networking

考题 单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()A  NIC filtering is enabled.B  Port security is configured.C  NIC is not in promiscuous mode.D  NIC is in promiscuous mode.

考题 单选题Which of the following describes the purpose of a network topology diagram?()A To display the logical layout this can differ from the physical layoutB To enhance a user's understanding of the datacenter layoutC To create a physical map of the datacenter to provide to guestsD To provide a blueprint for recreating the same server setup for another client

考题 单选题An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway? 空白(4)处应选择()A destinationB resourceC packetD source

考题 单选题Which of the following describes the purpose of a network to pology diagram?()A  To display the logical layout this can differ from the physical layoutB  To enhance a user’s understanding of the datacenter layoutC  To create a physical map of the datacenter to provide to guestsD  To provide a blueprint for recreating the same server setup for another client

考题 单选题What is the purpose of a network mask?()A It is used in conjunction with the wildcard mask to determine the number of hosts on a networkB It is used to define which parts of the IP address are allocated to host addresses and network prefixesC It is used to hide subnets from external networks by masking the subnets with NATD It is used to differentiate a network as a classful network or a classless network