Эротические рассказы

CompTIA Network+ Practice Tests. Craig ZackerЧитать онлайн книгу.

CompTIA Network+ Practice Tests - Craig Zacker


Скачать книгу
of the following terms refers to methods by which network traffic is prioritized to prevent applications from suffering faults due to network congestion?Port forwardingDynamic routingVLANsQoS

      84 Which of the following statements about Routing Information Protocol version 1 (RIPv1) is true? (Choose all that apply.)RIPv1 broadcasts the entire contents of the routing table every 30 seconds.RIPv1 advertises the subnet mask along with the destination network.RIPv1 broadcasts only the elements in the routing table that have changed every 60 seconds.RIPv1 does not include the subnet mask in its network advertisements.

      85 Which of the following mechanisms for prioritizing network traffic uses a 6-bit classification identifier in the Internet Protocol (IP) header?DiffservCoSTraffic shapingQoSAdministrative distance

      86 Which of the following statements about static routing are true? (Choose all that apply.)Static routes are manually configured routes that administrators must add, modify, or delete when a change in the network occurs.Static routes are automatically added to the routing table by routing protocols when a new network path becomes available.Static routes adapt to changes in the network infrastructure automatically.Static routes are a recommended solution for large internetworks with redundant paths to each destination network.Static routes are a recommended solution for small internetworks with a single path to each destination network.

      87 Which of the following TCP/IP routing protocols does not include the subnet mask within its route update messages, preventing it from supporting subnetting?Routing Information Protocol, version 1 (RIPv1)Routing Information Protocol, version 2 (RIPv2)Border Gateway Protocol (BGP)Open Shortest Path First (OSPF)

      88 Which of the following terms refers to a routing protocol that does not rely on hop counts to measure the efficiency of routes?Interior gateway protocolEdge gateway protocolDistance vector protocolLink state protocol

      89 What is the maximum number of routes that can be included in a single RIP broadcast packet?202532Unlimited

      90 Which of the following routing protocols can you use on a TCP/IP internetwork with segments running at different speeds, making hop counts an inaccurate measure of route efficiency? (Choose all that apply.)Enhanced Interior Gateway Routing Protocol (EIGRP)Routing Information Protocol (RIP)Open Shortest Path First (OSPF)Border Gateway Protocol (BGP)

      91 Which of the following statements about the Open Shortest Path First (OSPF) routing protocol are true? (Choose all that apply.)OSPF is an interior gateway protocol.OSPF is a link state routing protocol.OSPF does not support Classless Inter-Domain Routing (CIDR).OSPF shares routes within an autonomous system.

      92 What is the term for the process by which dynamic routing protocols update other routers with routing table information?ConvergenceDistance vectoringRedistributionDissemination

      93 Which of the following TCP/IP routing protocols measures the efficiency of routes by the number of hops between the source and the destination?Routing Internet Protocol (RIP)Open Shortest Path First (OSPF)Border Gateway Protocol (BGP)Intermediate System to Intermediate System (IS-IS)

      94 Which of the following types of routing protocols route datagrams between autonomous systems?EGPRIPIGPOSPF

      95 Which of the following prevents packets on a TCP/IP internetwork from being transmitted endlessly from router to router?Open Shortest Path First (OSPF)Maximum Transmission Unit (MTU)Administrative distanceTime to Live (TTL)

      96 Which of the following command-line tools can you use to create and modify static routes on a Unix or Linux system? (Choose all that apply.)routeifconfigtracerouteip

      97 Routers that use the Open Shortest Path First (OSPF) routing protocol calculate the relative costs of routes through the network by exchanging which of the following specifications for each interface with other routers?Transmission speedData link layer protocolNetwork mediumIP address

      98 Which of the following statements about the Border Gateway Protocol (BGP) is not true?BGP is an exterior gateway protocol.BGP is a link state routing protocol.BGP supports Classless Inter-Domain Routing (CIDR).BGP shares routes among autonomous systems.

      99 In an IPv4 routing table, what is the network destination address for the host system's default route?0.0.0.0127.0.0.0127.255.255.255255.255.255.255

      100 Which of the following routing protocols uses the packet format shown in the figure?RIPv1RIPv2OSPFEIGRPBGP

      101 Which of the following routing protocols has both interior and exterior designations, based on whether it is used for routing within an autonomous system or on the Internet?RIPOSPFEIGRPBGP

      102 Which of the following network layer protocols includes a Time to Live (TTL) field? (Choose all that apply.)IPv4IPv6ICMPIGMP

      103 Which of the following is not a method of traffic shaping?Rate limitingWAN optimizationBandwidth throttlingSelf-limiting

      104 An enterprise network has been designed with individual departmental switches because, in most cases, the devices in a specific department exchange network traffic with other devices in the same department. Each of the departmental switches is also connected to a host switch, which enables devices to communicate with other departments. Which of the following terms describes this switching architecture?Distributed switchingPort forwardingTraffic shapingNeighbor discoveryFlow control

      105 Review the following figure. Note that each store-and-forward switch has three connected node ports and one port for switch-to-switch connections. All node ports and links are configured for half-duplex communication. The switch-to-switch links are configured for full-duplex communication. Which of the following statements about the switched network is true?There are nine collision domains, one for each half-duplex connection.There are 12 collision domains, one for each switch connection.There are three collision domains, one for each switch-to-switch connection.There is one collision domain for this network.

      106 Which of the following could be a valid MAC address for a network interface adapter?10.124.25.43FF:FF:FF:FF:FF:FF00:1A:6B:31:9A:4E03:AE:16:3H:5B:11fe80::89a5:9e4d:a9d0:9ed7

      107 Which of the following protocols prevents network switching loops from occurring by shutting down redundant links until they are needed?RIPSTPVLANNATARP

      108 Which of the following cable types can be used to connect an MDI port on a workstation to an Auto-MDI-X port on an Ethernet switch? (Choose all that apply.)A crossover twisted pair cableA straight-through twisted pair cableA coaxial cableA single-mode fiber optic cableA multimode fiber optic cable

      109 Which of the following is a network layer protocol that uses ICMPv6 messages to locate routers, DNS servers, and other nodes on an IPv6 network?BGPNDPOSPFPoE

      110 Which of the following is a protocol that identifies VLANs by inserting a 32-bit field in the Ethernet frame?IEEE 802.1PIEEE 802.1QIEEE 802.1XIEEE 802.1ABIEEE 802.1AX

      111 Each of the following Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) events occurs on an Ethernet network when two stations transmit simultaneously, although not in the order listed. Which of the following events occurs immediately after the collision?The two stations observe a random backoff interval.The two stations transmit a jam signal.The two stations stop transmitting.The two stations listen to see if the channel is idle.The two stations begin retransmitting their frames.

      112 For the Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) mechanism to function properly on an Ethernet network, host systems must be able to detect when a collision occurs, so they can react to it. Which of the following cabling errors can prevent the collision detection process from functioning properly?Excessively long cable segmentsIncorrect wiring pinoutsToo many systems on a single networkAn excessive number of collisions

      113 When a packet collision between two systems occurs on an Ethernet network, Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) causes the two systems to stop transmitting and generate a jam signal. After sending the jam signal, why do the two systems wait for a randomized backoff interval before retransmitting their packets?They need time to reassemble the packets.To prevent another collision from occurring.They need to rebuffer the packet.To recalculate the packets’ checksum values.

      114 Which of the following devices is used to physically connect computers in


Скачать книгу
Яндекс.Метрика