网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuis and has built-in security mechanisms?()

A. Frame Relay

B. HDLC

C. x.25

D. PPP


参考答案

更多 “ Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuis and has built-in security mechanisms?() A. Frame RelayB. HDLCC. x.25D. PPP ” 相关考题
考题 A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2.Which protocol would meet the customers needs?()A. EAP-TLSB. EAP-MD5C. PAPD. EAP-MSCHAPv2

考题 Which extension to the OSPFv2 protocol supports traffic engineering?() A. LSA Type 8B. LSA Type 9C. LSA Type 10D. Transparent LSA

考题 Which three statements describe the User Datagram Protocol (UDP)?() A.UDP provides delivery notification and error checking mechanisms.B.UDP is faster than the Transmission Control Protocol (TCP).C.UDP application examples include DNS and VoIP.D.UDP is an application layer protocol.E.UDP uses a best effort delivery approach.

考题 Refer to the exhibit.What is the reason that the interface status is “administratively down,line protocol down”?() A.There is a mismatch in encapsulation typesB.The wrong type of cable is connected to the interfaceC.The interface has been configured with the shutdown commandD.The interface is not receiving any keepalivesE.The interface needs to be configured as a DTE deviceF.There is no encapsulation type configured

考题 IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic] B.private] C.personal D.proper

考题 A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()A、EAP-TLSB、EAP-MD5C、PAPD、EAP-MSCHAPv2

考题 Which deployed VoWLAN client security option is recommended by Cisco?()A、Layer 3 with Layer 3 Security set to None and Web Policy set to AuthenticationB、Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-ThroughC、Layer 3 with Layer 3 Security set to VPN Pass-ThroughD、Layer 2 with Layer 2 Security set to 802.1X

考题 Which type of intrusion prevention technology will be primarily used by the Cisco IPS security appliances?()A、signature-basedB、profile-basedC、rule-basedD、protocol analysis-based

考题 Which three statements describe the User Datagram Protocol (UDP)?()A、UDP provides delivery notification and error checking mechanisms.B、UDP is faster than the Transmission Control Protocol (TCP).C、UDP application examples include DNS and VoIP.D、UDP is an application layer protocol.E、UDP uses a best effort delivery approach.

考题 You work as a network technician at Company. Your boss, Ms., is interested  LWAPP (Lightweight Access Point Protocol). In particular she wants to know which type of  activities this protocol defines.  What should you tell her? ()A、 Layer 3 addressing and distributionB、 SNMP monitoring servicesC、 Access point certification and software controlD、 Packet encapsulation, fragmentation, and formattingE、 Compression and Layer 3 address mappingF、 User behaviors

考题 Refer to the exhibit.What is the reason that the interface status is “administratively down,line protocol down”?()A、There is a mismatch in encapsulation typesB、The wrong type of cable is connected to the interfaceC、The interface has been configured with the shutdown commandD、The interface is not receiving any keepalivesE、The interface needs to be configured as a DTE deviceF、There is no encapsulation type configured

考题 Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()A、 access point certification and software controlB、 compression and Layer 3 address mappingC、 Layer 3 addressing and distributionD、 packet encapsulation, fragmentation, and formattingE、 SNMP monitoring services

考题 What is true about Quality of Service (QoS) for VPNs?()A、QoS preclassification is only supported on generic routing encapsulation (GRE) and IPsec VPNsB、QoS preclassification is not required in Layer 2 Tunneling Protocol (L2TP), Layer2 Forwarding (L2F), and Point-to-Point Tunneling Protocol (PPTP) VPNsC、QoS preclassification is supported on IPsec AH VPNs, but not on IPsec ESP VPNsD、the QoS-for-VPNs feature (QoS preclassification) is designed for VPN transport interfacesE、with IPsec tunnel mode, the type of service (ToS) byte value is copied automatically from the original IP header to the tunnel header

考题 As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the devicE.For what two reasons can this happen? ()A、The data is moving from 10BASE-TX to 100BASE-TX.B、The WAN encapsulation type has changed.C、The data format has changed from analog to digital.D、The source and destination hosts are in the same subnet.E、The source and destination MAC addresses have changed.

考题 Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuis and has built-in security mechanisms?()A、Frame RelayB、HDLCC、x.25D、PPP

考题 Which data synchronization options between two geographical locations are supported by PowerHA SystemMirror?()A、Parallel and SerialB、Serial and AsynchronousC、Parallel and SynchronousD、Synchronous and Asynchronous

考题 A customer has a web application with HTTP Sessions that need to be replicated to a backup site that is more than 100 miles away from the primary site, connected over the Internet.    Which type of session replication in WebLogic is recommended?()A、MAN ReplicationB、WAN Replication  C、Synchronous ReplicationD、Asynchronous ReplicationE、Database Replication

考题 单选题Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuis and has built-insecurity mechanisms?()A Frame RelayB HDLCC x.25D PPP

考题 单选题Refer to the exhibit.What is the reason that the interface status is “administratively down,line protocol down”?()A There is a mismatch in encapsulation typesB The wrong type of cable is connected to the interfaceC The interface has been configured with the shutdown commandD The interface is not receiving any keepalivesE The interface needs to be configured as a DTE deviceF There is no encapsulation type configured

考题 单选题A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()A EAP-TLSB EAP-MD5C PAPD EAP-MSCHAPv2

考题 多选题As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the device. For what two reasons can this happen?()AThe data is moving from 10BASE-TX to 100BASE-TX.BThe WAN encapsulation type has changed.CThe data format has changed from analog to digital.DThe source and destination hosts are in the same subnet.EThe source and destination MAC addresses have changed.

考题 多选题What three statements are true about the various deployments of the 802.1x Extensible Authentication Protocol (EAP)? ()AEAP-FAST has the ability to tie login with non-Microsoft user databasesBEAP-TLS supports static passwordsCPEAP supports one-time passwordsDLEAP does not support multiple operating systemsELEAP supports Layer 3 roamingFPEAP does not work with WPA·

考题 单选题Which extension to the OSPFv2 protocol supports traffic engineering?()A LSA Type 8B LSA Type 9C LSA Type 10D Transparent LSA

考题 多选题Which three statements describe the User Datagram Protocol (UDP)?()AUDP provides delivery notification and error checking mechanisms.BUDP is faster than the Transmission Control Protocol (TCP).CUDP application examples include DNS and VoIP.DUDP is an application layer protocol.EUDP uses a best effort delivery approach.

考题 单选题Which deployed VoWLAN client security option is recommended by Cisco?()A Layer 3 with Layer 3 Security set to None and Web Policy set to AuthenticationB Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-ThroughC Layer 3 with Layer 3 Security set to VPN Pass-ThroughD Layer 2 with Layer 2 Security set to 802.1X

考题 单选题Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()A IETFB HDLCC Q9333-A Annex AD ANSI Annex D

考题 多选题You work as a network technician at Company. Your boss, Ms., is interested  LWAPP (Lightweight Access Point Protocol). In particular she wants to know which type of  activities this protocol defines.  What should you tell her? ()ALayer 3 addressing and distributionBSNMP monitoring servicesCAccess point certification and software controlDPacket encapsulation, fragmentation, and formattingECompression and Layer 3 address mappingFUser behaviors