A.Switches are primarily software based while bridges are hardware based.
B.Both bridges and switches forward Layer 2 broadcasts.
C.Bridges are frequently faster than switches.
D.Switches have a higher number of ports than most bridges.
E.Bridges define broadcast domains while switches define collision domains.
F.Both bridges and switches make forwarding decisions based on Layer 2 addresses.
您可能感兴趣的试卷
你可能感兴趣的试题
A.addresses chosen by a company to communicate with the Internet
B.addresses that cannot be routed through the public Internet
C.addresses that can be routed through the public Internet
D.a scheme to conserve public addresses
E.addresses licensed to enterprises or ISPs by an Internet registry organization
A.during high traffic periods
B.after broken links are re-established
C.when upper-layer protocols require high reliability
D.in an improperly implemented redundant topology
E.when a dual ring topology is in use
A.TFTP server, Flash, NVRAM
B.ROM, NVRAM, TFTP server
C.NVRAM, TFTP server, ROM
D.Flash, TFTP server, ROM
E.Flash, NVRAM, ROM
A.Filtering can occur based on Layer 3 information.
B.Broadcasts are eliminated.
C.Routers generally cost less than switches.
D.Broadcasts are not forwarded across the router.
E.Adding a router to the network decreases latency.
A.The PC has connectivity with a local host.
B.The PC has connectivity with a Layer 3 device.
C.The PC has a default gateway correctly configured.
D.The PC has connectivity up to Layer 5 of the OSI model.
E.The PC has the TCP/IP protocol stack correctly installed.
A.It creates a global address pool for all outside NAT transactions.
B.It establishes a dynamic address pool for an inside static address.
C.It creates dynamic source translations for all inside local PAT transactions.
D.It creates a one-to-one mapping between an inside local address and an inside global address.
E.It maps one inside source address to a range of outside global addresses.
A.VLAN support
B.compression
C.authentication
D.sliding windows
E.multilink support
F.quality of service
A.It specifies use of a static encryption key that must be changed frequently to enhance security.
B.It requires use of an open authentication method.
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
D.It requires that all access points and wireless devices use the same encryption key.
E.It includes authentication by PSK
A.Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface.
B.Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.
C.Configure many sub-interfaces on the same subnet.
D.Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.
A.Allow users to develop their own approach to network security.
B.Physically secure network equipment from potential access by unauthorized individuals.
C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.
D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
E.Minimize network overhead by deactivating automatic antivirus client updates.
最新试题
Which command displays the CHAP authentication process as it occurs between two routers?()
Which command encrypts all plaintext passwords?()
Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()
At which layer of the OSI model dose PPP perform?()
Which statement describes the rule of split horizon?()
How are VTP advertisements delivered to switches across the network?()
What is the default administrative distance of OSPF?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
Which pairing reflects a correct protocol-and-metric relationship?()
An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()