多項(xiàng)選擇題Which of the following describes the roles of devices in a WAN?()

A.A CSU/DSU terminates a digital local loop
B.A modem terminates a digital local loop
C.A CSU/DSU terminates an analog local loop
D.A modem terminates an analog local loop
E.A router is commonly consideredaDTEdevice
F.A router is commonly considereda DCE device


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit.What is the meaning of the term dynamic as displayed in the output of the show frame-relay map command shown?()

A.The Seria l0/0interface is passing traffic.
B.The DLCI 100 was dynamic allyallocated by the router
C.The Seria l0/0 interf aceacquired the IP address of 172.16.3.1 from a DHCP server
D.The DLCI 100 will be dynamically changed as required to adapt to changes in the Frame Relay cloud
E.The mapping between DLCI 100 and the end station IP address 172.16.3.1 was learned through Inverse ARP

2.多項(xiàng)選擇題Which of the following are key characteristics of PPP?()

A.can be used over analog circuits
B.maps Layer 2 to Layer 3 address
C.encapsulates several routed protocols
D.supports IP only
E.provides error correction

3.單項(xiàng)選擇題A default Frame Relay WAN is classified as what type of physical network?()

A.point-to-point
B.broadcast multi-access
C.nonbroadcast multi-access
D.nonbroadcast multipoint.broadcast point-to-multipoint

4.單項(xiàng)選擇題

Refer to the exhibit.Which statement describes DLCI 17?()

A.DLCI 17 describes the ISDN circuit between R2 and R3.
B.DLCI 17 describes a PVC on R2.It cannot be used on R3 or R1.
C.DLCI 17 is the Layer 2 address used by R2 to describe a PVC to R3.
D.DLCI 17 describes the dial-up circuit from R2 and R3 to the service provider.

5.單項(xiàng)選擇題The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()

A.ermit all packet smatching the first three octets of the source address to all destinations
B.permit all packet matching the last octet of the destination address and accept all source addresses
C.permit all packet matching the host bits in the source address to all destinations
D.permit all packet from the third subnet of the network address to all destinations