-
Wide Area Network (WAN) is a computer network that covers a broad areA. Which statement is correct for wide-area network (WAN)?()
A . Limited in a single building, a group of buildings, or even a single room
B . Crosses metropolitan, regional, or national boundaries
C . Encompasses an entire city or metropolitan area and connects multiple local-area networks (LANs)
D . Connects client devices wireless protocol
-
VOIP is being implemented on the Company network. In a properly designed network, what is the maximum amount of time a voice package should spend crossing a network? ()
A . 90 milliseconds
B . 120 milliseconds
C . 150 milliseconds
D . 240 millisecond
-
You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this network?()
A . There are 254 usable subnets.
B . There are 256 usable hosts per subnet.
C . There are 50 usable subnets.
D . There are 254 usable hosts per subnet.
E . There are 24 usable hosts per subnet.
F . There is one usable network.
-
An important difference between presupposition and entailment is that presupposition,unlike entailment,is not vulnerable to negation. That is to say, if a sentence is negated, the original presupposition is still true.
A . 正确
B . 错误
-
What are three factors a network administrator must consider before implementing Netflow in the network?()
A . CPU utilization
B . where Netflow data will be sent
C . number of devices exporting Netflow data
D . port availability
E . SNMP version
F . WAN encapsulatio
-
Which of the following Class A networks is reserved for "private networks" use only?()
A . network 10.0.0.0
B . network 127.0.0.0
C . network 129.135.0.0
D . network 192.168.0.0
-
our network contains a Network Policy Server (NPS) named Server1.You need to configure a network policy for a VLAN.Which RADIUS attributes should you add?()
A . ¡¤Logi-LAT-Service ˆLogin-LAT-Node ˆLogin-LAT-Group ˆNAS-Identifier
B . ¡¤Tunne-Assignment-ID ˆTunnel-Preference ˆTunnel-Client-Auth-ID ˆNAS-Port-Id
C . ¡¤Tunne-Client-Endpt ˆTunnel-Server-Endpt ˆNAS-Port-Type ˆTunnel-Password
D . ¡¤Tunne-Medium-Type ˆTunnel-Pvt-Group-ID ˆTunnel-Type ˆTunnel-Tag
-
A network vulnerability scanner is part of which critical element of network and system security?()
A . host security
B . perimeter security
C . security monitoring
D . policy management
-
Which two are effects of connecting a network segment that is running 802.1D to a network segment that is running 802.1w?()
A . the entire network switches to 802.1D and generates BPDUs to determine root bridfe status.
B . A migration delay of three seconds occurs when the port that is connected to the 802.1D bridge comes up
C . The entire network reconverges and a unique root briddge for the 802.1D segment, and a root bridge for the 802.1W segment, is chosen
D . the first hop 802.1w switch that is connected to the 802.1D runs entirely in 802.1DCompatibility mode and converts the BPDUs to either 802.1D or 802.1W segments of the network
E . Classic 802.1D timers, Such as forward Delay and Max-age, will only be used as a backup, and will not be necessary if point-to-point links and edge prots are properly identified and set by the administrator.
-
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port()。
A . This is a 10 Mb/s switch port
B . This is a 100 Mb/s switch port
C . This is an Ethernet port operating at half duplex
D . This is an Ethernet port operating at full duplex
E . This is a port on a network interface card in a PC
-
我国目前已经命名了获得国际SC(A)R组织承认的南极地名大约有多少个?
-
Morrison’s goal in writing The Bluest Eye is that she wants to make a statement about the damage that internalized racism can do to the most vulnerable member of a community.
-
上第一遍封面胶后,照灯时间为()。A.20-30sB.10sC.10-15sD.50s
上第一遍封面胶后,照灯时间为()。
A.20-30s
B.10s
C.10-15s
D.50s
-
箕斗提升井筒的风速不得超过()。A.4 m/sB.6m/sC.8 m/sD.10 m/s
箕斗提升井筒的风速不得超过()。
A.4 m/s
B.6m/s
C.8 m/s
D.10 m/s
-
提升速度超过()的提升绞车,必须装设限速保护。A.3m/sB.2m/sC.5m/s
提升速度超过()的提升绞车,必须装设限速保护。
A.3m/s
B.2m/s
C.5m/s
-
电影影片的闪烁频率为()A.12次/sB.12次/sC.12次/sD.12次/s
电影影片的闪烁频率为()
A.12次/s
B.12次/s
C.12次/s
D.12次/s
-
As any diplomat from Britain, Austria or Turkey can tell you, handling the legacy of a vanished, far-flung empire is a tricky business. But for Georgia, the gap between old glory and present vulnerability is especially wide.
Today's Georgia is diminished by war, buffeted by geopolitics and recovering from post-Soviet chaos. But 800 years ago the country was a mighty military, cultural and ecclesiastical force. Its greatest monarch, Queen Tamara, defeated many foes (including her first husband) and built fine monuments. In her time, Georgia also had a big stake in the Christian life of the Holy Land. From Jerusalem to the Balkans, Georgia's priests, artists and church-builders were active and respected. So too were its poets, like Shota Rustaveli, the national bard who dedicated an epic to his beloved queen.
In between seeking western aid and coping with power cuts, modern Georgia has pledged to keep a wary eye on every place where churches, inscriptions and frescoes testify to its golden age. That includes Greece, Turkey, Bulgaria, Romania and above all, Israel. Last year, Georgians were enraged when a fresco of Rustaveli, in a Jerusalem church under the care of the Greek Orthodox Patriarchate, was defaced, then badly restored. This year, a better restoration was done, but Georgians now want a promise that in all future restoration their own experts can take part. They also want to stop the seepage of Georgian frescoes and icons, supposedly under the Patriarchate's care, on to the art market. Several times, Georgia has had to use its meagre resources to buy back pieces of the national heritage. The hope is that things will improve with the recent election of a new Jerusalem Patriarch, after his predecessor was ousted under a cloud of scandal.
Georgia's ties with Israel are good, thanks to a thriving Georgian-Jewish community with happy memories of its homeland. Georgia also gets along with Greece, amid a fug of sentimentality over legends about the Argonauts that link the two nations. But can these warm, fuzzy feelings translate into better protection for an ancient culture? That will be a challenge for Geld Bezhuashvili, who succeeds Salome Zourabichvili, the French-born diplomat who was sacked, after a power struggle, as Georgian foreign minister on October 19th.
The word "tricky" in the first paragraph of the text denotes ______.
A.deceptive
B.crafty
C.tough
D.tacit
-
You are a network administrator for The network consists of a single Active Directory domain named.
The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO.
Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:\Program Files\MT Apps. The financial application suite contains many executable files.
Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components.
The financial application suite and the browser-based application are frequently updates with patches or new versions.
You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration.
Which three actions should you perform to configure software restriction polices?()
(Each correct answer presents part of the solution. Choose three)
-
A IP address contains a network address and
A.broadcast address
B.multiple address
C.host address
D.subnet mask
-
采煤工作面的最高风速不得大于()。A.3m/sB.4m/sC.5m/sD.6m/s
采煤工作面的最高风速不得大于()。
A.3m/s
B.4m/s
C.5m/s
D.6m/s
-
立井中用吊桶升降物料,在无罐道时的最大速度不得超过()。A.1m/sB.2m/sC.3m/s
立井中用吊桶升降物料,在无罐道时的最大速度不得超过()。
A.1m/s
B.2m/s
C.3m/s
-
1Bq=()。A.1.sB.1/sC.3.7×1010.sD.3.7×1010/s
1Bq=()。
A.1.s
B.1/s
C.3.7×1010.s
D.3.7×1010/s
-
1Ci=()。A.1.sB.1/sC.3.7×1010.sD.3.7×1010/s
1Ci=()。
A.1.s
B.1/s
C.3.7×1010.s
D.3.7×1010/s
-
In PTN wrapping ring network protection, when a node detects network failure, through
A.A.MPLS
B.B.OAM
C.C.APM
D.D.APS