A. point-to-point
B. broadcast multi-access
C. nonbroadcast multi-access
D. nonbroadcast multipoint
E. broadcast point-to-multipoint
您可能感興趣的試卷
你可能感興趣的試題
A. permit all packets matching the first three octets of the source address to all destinations
B. permit all packet matching the last octet of the destination address and accept all source addresses
C. permit all packet matching the host bits in the source address to all destinations
D. permit all packet from the third subnet of the network address to all destinations
A. FTP traffic from 192.169.1.22 will be denied
B. No traffic, except for FTP traffic will be allowed to exit E0
C. FTP traffic from 192.169.1.9 to any host will be denied
D. All traffic exiting E0 will be denied
E. All FTP traffic to network 192.169.1.9/29 will be denied
A. access-list 101 in
B. access-list 101 out
C. ip access-group 101 in
D. ip access-group 101 out
A. access-list 101 deny tcp 192.168.1.128 0.0.0.15 192.168.1.5 0.0.0.0 eq 23 access-list 101 permit ip any any
B. access-list 101 deny tcp 192.168.1.128 0.0.0.240 192.168.1.5 0.0.0.0 eq 23 access-list 101 permit ip any any
C. access-list 1 deny tcp 192.168.1.128 0.0.0.255 192.168.1.5 0.0.0.0 eq 21 access-list 1 permit ip any any
D. access-list 1 deny tcp 192.168.1.128 0.0.0.15 host 192.168.1.5 eq 23 access-list 1 permit ip any any
A. L2TP
B. IPsec
C. PPTP
D. RSA
最新試題
Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()
Which command displays the CHAP authentication process as it occurs between two routers?()
Which command is used to display the collection of OSPF link states?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
Which command encrypts all plaintext passwords?()
If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()
Which IPsec security protocol should be used when confidentiality is required?()
After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()
On which options are standard access list based?()
Which pairing reflects a correct protocol-and-metric relationship?()