更多"Why does the data communication ind"的相关试题:
[单项选择]Why does the author use the term "the dividend" even though he has acknowledged that in fact it does not exist
A. He is attempting to describe a transmittal circumstance.
B. He is articulating a metaphysical theory.
C. He is clarifying a situation.
D. He is devising an econometric formula.
[单项选择]Why does IS-IS use the SPF algorithm?()
A. to determine the pseudonode ID
B. to determine the next hop to a given destination
C. to determine the complete path to a given destination
D. to determine the number of routers present in a given area
[多项选择]Which three components does the Scheduler use for managing tasks within the Oracle environment?()
A. a job
B. a program
C. a schedule
D. a PL/SQL procedure
[单项选择]Which mechanism does External BGP use to prevent the formation of routing loops?()
A. AS path
B. Split horizon
C. Poison reverse
D. Unicast RPF check
[单项选择]What language does International NAVTEX use?()
A. Russian
B. French
C. English
D. German
[单项选择]Which multicast address does RIPv2 use for route updates by default?()
A. 224.0.0.2
B. 224.0.0.5
C. 224.0.0.9
D. 255.255.255.255
[多项选择]Why does the data communication industry use the layered OSI reference model? (Choose two.)()
A. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
B. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.
C. It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers.
D. It encourages industry standardization by defining what functions occur at each layer of the model.
E. It provides a means by which changes in functionality in one layer require changes in other layers.
[单项选择]Which interface does the Infranet Controller use to push the configuration? ()
A. trusted port
B. internal port
C. trust interface
D. untrust interface
[单项选择]Which network protocol does DNS use?()
A. FTP
B. TFTP
C. TCP
D. UDP
E. SCP
[单项选择]Which TCP port does LDP use for its protocol communications?()
A. 464
B. 466
C. 644
D. 646
[单项选择]Which of these ports does syslog use to send messages to a syslog server?()
A. TCP502
B. TCP514
C. TCP520
D. UDP502
E. UDP514
F. UDP520
[单项选择]How does ERS use the VLAN tag?()
A. to provide service internetworking
B. to support transparency for Layer 2 frames
C. as a connection identifier to indicate destination
D. as a mapping to the DLCI in service internetworking
E. to provide a trunk by which all VLANs can navigate from one site to one or multiple sites
[单项选择]Why does the author mention Alfred Stieglitz
A. to demonstrate that photography was the major influence in modern art
B. to compare him to other artists of the time
C. to point out that many artists learned their craft by studying with him
D. to give an example of someone who had an influence on modern art
[单项选择]Why does Denny have to go unarmed
A. He cannot tell an enemy from a friend.
B. The price would be very high if it were armed.
C. He does not know how to use a weapon.
D. It is unlikely that he will be attacked by a human enemy.
[单项选择]Why does the author mention electric eels
A. To warn the reader to stay away from them.
B. To compare their voltage to that used in houses.
C. To give an example of a living electrical generator.
D. To describe a new source of electrical power.
[单项选择]Why does the author mention Florence Nightingale
A. To describe the career of a pioneer of nursing education.
B. To show that women doctors supported the effort to upgrade nursing.
C. To prove that conditions differed in military and civilian hospitals.
D. To show the similarity of her means to those used by United States reformers.
[单项选择]What does the female mosquito use to test her victim's body and sweat
A. Her sensors.
B. Her antennae.
C. Her legs.
D. Her tip.