网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()
A
Ring
B
Mesh
C
Star
D
Hybrid
参考答案
参考解析
解析:
暂无解析
更多 “单选题When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()A RingB MeshC StarD Hybrid” 相关考题
考题
● An internet is a combination of networks connected by (71) . When a datagram goes from a source to a (72) , it will probably pass many (73) until it reaches the router attached to the destination network. A router receives a (74) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (75) is the optimum pathway?(71)A. modemsB. routersC. switchesD. computers(72)A. userB. hostC. cityD. destination(73)A. destinationsB. routersC. packetsD. computers(74)A. destinationB. resourceC. packetD. source(75)A. pathwaysB. routersC. diagramsD. calls
考题
An internet is a combination of networks connected by (71) .When a datagram goes from a source to a (72) ,it will probably pass many (73) until it reaches the router attached to the destination network.A router receives a (74) from a network and passes it to another network.A router is usually attached to several networks.When it receives a packet,to which network should it pass the packet? The decision is based on optimization: Which of the available (75) is the optimum pathway?A.modemsB.routersC.switchesD.computers
考题
When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()
A.RingB.MeshC.StarD.Hybrid
考题
Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()
A. StarB. HybridC. MeshD. Ring
考题
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A.WormB.SmurfC.Logic BombD.Man-in-the-middle
考题
When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()
A.BusB.MeshC.MultipathD.Ring
考题
An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway?
空白(2)处应选择()A、userB、hostC、cityD、destination
考题
An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway?
空白(1)处应选择()A、modemsB、routersC、switcherD、computers
考题
Which of the following BEST describes a hub?()A、Determines the best route to transmit dataB、Inspects traffic and accepts or declines transmissionC、Broadcasts data to specific network devicesD、Broadcasts data to all network devices
考题
When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()A、RingB、MeshC、StarD、Hybrid
考题
Which of the following network cable types is MOST often used in environments where physicalsecurity of the data is the top priority?()A、UTPB、CoaxialC、Fiber opticD、STP
考题
When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()A、BusB、MeshC、MultipathD、Ring
考题
Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()A、StarB、HybridC、MeshD、Ring
考题
Which of the following are advantages of using Dynamic Host Configuration Protocol?()A、IP addresses can be managed from a central pointB、Computers can automatically get new addressing when moved to a different network segmentC、Media Access Control addresses can be changed automaticallyD、The network speed can automatically adjust based on the type of traffic being generatedE、The HOSTS file on the computer can be validated for proper entries
考题
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A、WormB、SmurfC、Logic BombD、Man-in-the-middle
考题
Which of the following terms is used when printing data on both the front and the back of paper?()A、ScalingB、CopyingC、DuplexD、Simplex
考题
A host is to be part of a very small private network, which will never be connected to any other networks. Which of the following name resolution schemes would be the easiest to implement?()A、DNSB、NISC、DHCPD、etc/hosts file
考题
You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A、Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B、Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C、Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D、Configure the IP properties of the portable computers so that they have an alternate configuration.
考题
单选题Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()A
StarB
HybridC
MeshD
Ring
考题
单选题An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway?
空白(2)处应选择()A
userB
hostC
cityD
destination
考题
单选题Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()A
StarB
RingC
BusD
Mesh
考题
单选题Which of the following network cable types is MOST often used in environments where physicalsecurity of the data is the top priority?()A
UTPB
CoaxialC
Fiber opticD
STP
考题
单选题Which of the following terms is used when printing data on both the front and the back of paper?()A
ScalingB
CopyingC
DuplexD
Simplex
考题
单选题You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A
Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B
Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C
Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D
Configure the IP properties of the portable computers so that they have an alternate configuration.
考题
单选题Which of the following BEST describes a hub?()A
Determines the best route to transmit dataB
Inspects traffic and accepts or declines transmissionC
Broadcasts data to specific network devicesD
Broadcasts data to all network devices
考题
单选题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A
WormB
SmurfC
Logic BombD
Man-in-the-middle
考题
单选题A host is to be part of a very small private network, which will never be connected to any other networks. Which of the following name resolution schemes would be the easiest to implement?()A
DNSB
NISC
DHCPD
etc/hosts file
热门标签
最新试卷