單項(xiàng)選擇題Which of the following are true of Ethernet technology?()

A. Hosts use a logical ring topology.
B. Hosts use a logical bus topology
C. Hosts must wait for an electronic signal to transfer data.
D. Hosts are directly connected to a wiring concentrator called a MSAU.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Two stations on a LAN transmit at the same time, resulting in a collision. What happens when a collision occurs on the network?()

A. Each device on the Ethernet segment stops transmitting for a short time.
B. A jam signal informs all devices that a collision occurred.
C. When data transmission resumes, the devices that were involved in the collision have priority to transmit.
D. The devices that are involved in the collision stops transmitting for a short time.
E. The collision invokes a random back-off algorithm.

2.單項(xiàng)選擇題Which of the addresses below is an example of a valid unicast address?()

A.172.31.128.255./18
B.255.255.255.255
C.192.168.24.59/30
D.224.0.0.5
E.All of the above

3.單項(xiàng)選擇題Which one of the protocols below allows a router to respond to an ARP request destined to a remote host?()

A. Gateway DP
B. Reverse ARP
C. proxy ARP
D. Inverse ARP
E. indirect ARP

4.單項(xiàng)選擇題Which of the following processes, is used to find the hardware address of a LAN device?()

A. Inverse-ARP
B. Reverse-ARP
C. Proxy ARP
D. ARP

5.多項(xiàng)選擇題Which of the following are actual varieties of network crosstalk?()

A. near-end crosstalk(NEXT)
B. middle open-end crosstalk(MOEXT)
C. power sum near-end crosstalk(PSNEXT)
D. jitterry crosstalk(JEXT)
E. far end crosstalk(FEXT)

最新試題

Which of the following statements regarding routed and routing protocols are true?()

題型:多項(xiàng)選擇題

The network 172.12.0.0 needs to be divided into subnets where each subnet has the capacity of 458 IP addresses.What would be the correct subnet mask to accomplish this division keeping the number of subnets at the maximum? ()

題型:單項(xiàng)選擇題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項(xiàng)選擇題

Which connections allow the use of full-duplex Ethernet?()

題型:多項(xiàng)選擇題

What is the subnetwork address for a host with IP address 201.100.5.68/28?()

題型:單項(xiàng)選擇題

Which of the following contribute to congestion on an Ethernet network?()

題型:多項(xiàng)選擇題

A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()

題型:單項(xiàng)選擇題

Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()

題型:單項(xiàng)選擇題

Which of the following correctly describe steps in the OSI data encapsulation process?()

題型:多項(xiàng)選擇題

Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity?()

題型:單項(xiàng)選擇題