A.10GBase-ER B.10GBase-LW C.100Base-FX D.1000Base-T
单项选择题Which of the following is a secure method of remote access via command line?()
A.RCP B.Telnet C.RSH D.SSH
单项选择题An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrators PC. Which of the following devices is the administrator plugged into? ()
A.Hub B. Bridge C. Switch D. Router
单项选择题A network technician is installing a new managed 10 100 Mbps switch on the network. The network has an older printer with a 10Mbps network adapter that will be moved to the new switch. Which of the following settings on the switch will need to be configured to support the printer?()
A. MAC filtering B. IP address C. PoE D. Port speed
单项选择题Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. Honeynet B. Honeypot C. Vulnerability scanner D. Network based IDS
单项选择题An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()
A. Caching engines B. QoS C. Traffic shaping D. Load balancing