A.data integrity B.encryption C.key exchange D.authentication
A.STP B.VTP C.EIGRP D.SNMP E.CDP F.None of the above
A.115.64.8.32 B.115.64.7.64 C.115.64.6.255 D.115.64.3.255 E.115.64.5.128 F.115.64.12.128
A.a primary route,stored in the routing table B.a backup route,stored in the routing table C.a backup route,stored in the topology table D.a primary route,stored in the topology table
A.footprint analysis attack B.privilege escalation attack C.buffer Unicode attack D.social engineering attack E.front door attacks F.Trojan horse attack
A.最小特權(quán)觀念 B.進(jìn)程之間的隔離 C.標(biāo)準(zhǔn)檢測(cè)器 D.小的、可驗(yàn)證的代碼塊
A. Static NAT B. Port loading C. NAT Overloading D. Dynamic NAT E. None of the above
A.這是一個(gè)10Mb/s的交換端口 B.這是一個(gè)100Mb/s的交換端口 C.這是一個(gè)工作在半雙工模式下的以太口 D.這是一個(gè)工作在全雙工模式下的以太口 E.這是一個(gè)PC機(jī)上網(wǎng)卡上的一個(gè)接口
A.It creates a VLAN 999 interface. B.It designates VLAN 999 for untagged traffic. C.It blocks VLAN 999 traffic from passing on the trunk. D.It designates VLAN 999 as the default for all unknown tagged traffic.
A.bandwidth B.delay C.load D.reliability