移动端

  • 题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

医学医药类 | 儿科护理主管护师(中级)

模式切换

0 0 0
我的错题 我的收藏 学习笔记

多选题 Which two statements about the open and shared key wireless-authentication methods are true? ()

A

 Shared key authentication is considered more secure than open authentication.

B

 Shared key authentication is considered less secure than open authentication.

C

 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.

D

 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.

E

 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

多选题 Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony?()

A

 Analog phones, connected to the PSTN, act as internal call agents if IP communication to the CallManager is lost.

B

 An onsite gateway reroutes calls over the PSTN if IP communication to the CallManager is lost.

C

 The IP phones can reroute calls over the PSTN if IP communication to the CallManager is lost.

D

 Local voice gateways can assume the function of a call agent if IP communication to the CallManager is lost.

E

 IP phones use an internal call agent if IP communication to the CallManager is lost.

多选题 What are three features of voice traffic on a network?()

A

bursty

B

constant

C

bandwidth intensive

D

small packet sizes

E

time-sensitive

F

retransmittable

多选题 Which two characteristics are common between traffic policing and traffic shaping?()

A

 The rate of traffic is measured and compared to a configured policy.

B

 Classification is used to differentiate traffic.

C

 Traffic is marked and sent out according to priority.

D

 Both can be applied to inbound and outbound traffic.

E

 Both buffer traffic to ensure a predetermined traffic rate.

F

 Both drop traffic that is above a predetermined traffic rate.

多选题 Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()

A

both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)

B

both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation

C

WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices

D

WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption

E

WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

多选题 Which three traffic descriptors are typically used as QoS markings for packets or frames entering the network?()

A

protocol type

B

CoS

C

DSCP

D

IP precedence

E

destination address

F

input interface

多选题 Which two Cisco AutoQoS interface statements are true?()

A

AutoQoS is supported on Frame Relay multipoint subinterfaces.

B

AutoQoS is supported on low-speed ATM PVCs in point-to-point subinterfaces.

C

AutoQoS is supported on serial PPP and HDLC interfaces.

D

AutoQoS is supported only on Frame Relay main interfaces and not on any subinterface configuration.

多选题 Which two statements about the DiffServ  model are true?()

A

a class can be identified as a single application, multiple applications with similar service needs,or be based on the source or destination IP address

B

a drawback of the DiffServ field in the MAC header to mark frames into behavior aggregates (BAs)

C

DiffServ uses the DiffServ field in the MAC header to mark frames into behavior

D

the DiffServ field occupies the same eight bits of the MAC header that were previously used for the ToS field

E

the first six high-order bits of the DiffServ field are used to identify the Resource Reservation Protocol (RSVP) value

F

the primary goal of DiffServ is scalability

多选题 Which two statements are true about broadband cable (HFC) systems?()

A

Cable modems only operate at Layer 1 of the OSI model.

B

Cable modems operate at Layers 1 and 2 of the OSI model.

C

Cable modems operate at Layers 1, 2, and 3 of the OSI model.

D

A function of the cable modem termination system (CMTS) is to convert the modulated signal from the cable modem into a digital signal.

E

A function of the cable modem termination system is to convert the digital data stream from the end user host into a modulated RF signal for transmission onto the cable system.

1 2 3 4 5 下一页 尾页 /

到第