A. can be used over analog circuits
B. maps Layer 2 to Layer 3 address
C. encapsulates several routed protocols
D. supports IP only
E. provides error correction
您可能感興趣的試卷
你可能感興趣的試題
A. Administratively shut down the interfaces.
B. Physically secure the interfaces.
C. Configure a virtual terminal password and login process.
D. Enter an access list and apply it to the terminal interfaces using the access-class command.
E. Create an access list and apply it to the terminal interfaces using the access-group command.
A.multicast
B.broadcast
C.allcast
D.podcast
E.anycast
A.blocking
B.learning
C.disabled
D.forwarding
E.listening
A. Security increases because only the network administrator may change the routing tables.
B. Configuration complexity decreases as network size increases.
C. Routing updates are automatically sent to neighbors.
D. Route summarization iscompued automatically by the router.
E. Routing traffic load is reduced when used in stub network links
F. An efficient algorithm is used to build routing tables,using automatic updates.
G. Routing tables adapt automatically to topology changes.
A. to confine network instability to single areas of the network.
B. to reduce the complexity of router configuration
C. to speed up convergence
D. to lower costs by replacing routers with distribution layer switches
E. to decrease latency by increasing bandwidth
F. to reduce routing overhead
最新試題
Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()
Which command displays the CHAP authentication process as it occurs between two routers?()
At which layer of the OSI model is RSTP used to prevent loops?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
At which layer of the OSI model dose PPP perform?()
What is the purpose of the cisco Vlan Trunking protocol?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()
Which IPsec security protocol should be used when confidentiality is required?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()