单项选择题
A. protecting a server frome unauthorized acces B. controlling path selection,based on the route metric C. reducing router CPU utilization D. filterring packets that are passing through a router
Which command can be used from a PC to verfy the connec...
单项选择题Which command can be used from a PC to verfy the connectivity between host that connect through path?()
A. tracert address B. ping address C. arp address D. traceroute address
What is the function of the command switchport trunk na...
单项选择题What is the function of the command switchport trunk native vlan 999 on a switch?()
A. It designates VLAN 999 for untagged traffic. B. It blocks VLAN 999 traffic from passing on the trunk. C. It creates a VLAN 999 interface. D. It designates VLAN 999 as the default for all unkown tagged traffic.
Which IPsec security protocol should be used when confi...
单项选择题Which IPsec security protocol should be used when confidentiality is required?()
A. AH B. MD5 C. PSK D. ESP