The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.
The AED is responsible for load balancing all traffic for all VLANs across the transport network.
The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.
The AED is responsible for MAC address dispute contention for a given VLAN.
第1题:
此题为判断题(对,错)。
第2题:
A. It uses a Reliable transport mechanism.
B. It uses a Non-reliable transport mechanism
C. It is less bandwidth-intensive than connection oriented services
D. it uses handshaking
第3题:
● A transport layer protocol has several responsibilities. One is to create a process-to-process (program-to-program) communication; TCP uses port (71) to accomplish this. Another responsibility of a transport layer protocol is to create a (72) and error-control mechanism at the transport level. TCP uses a sliding (73) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (74) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (75) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver.
(71)
A. numbers
B. connections
C. diagrams
D. resources
(72)
A. procedure
B. function
C. route
D. flow
(73)
A. path
B. window
C. frame
D. diagram
(74)
A. packet
B. time
C. error
D. phase
(75)
A. ports
B. streams
C. packets
D. cells
第4题:
Which one of the following protocols uses both UDP and TCP ports for the transport layer operation?()
第5题:
Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()
第6题:
You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration.What should you do next?()
A. Use the transport security mode and specify None for transport client credential type.
B. Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.
C. Use the message security mode and specify Basic for the transport client credential type.
D. Use the transportWithMessageCredential security mode and specify None for the transport client credential type.
第7题:
In IPv6 network, an IPv6 overlay tunnel is required to communicate with isolated IPv6 networks across the existing IPv4 infrastructurE. There are currently fiv e IPv6 overlay tunnel types. Which three IPv6 overlay tunnel statements are true?()
第8题:
Regarding DHCP (dynamic host configuration protocol), which two of the following choices below are true? (Select two answer choices)
A. The DHCP Discover message uses FF-FF-FF-FF-FF as the Layer 2 destination address.
B. The DHCP Discover message uses UDP as the transport layer protocol.
C. The DHCP Discover message uses a special Layer 2 multicast address as the destination address.
D. The DHCP Discover message uses TCP as the transport layer protocol.
E. The DHCP Discover message does not use a Layer 2 destination address.
F. The DHCP Discover message does not require a transport layer protocol.
第9题:
Which layer of the OSI reference model uses the hardware address of a device to ensure message delivery to the proper host on a LAN?()
第10题:
A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()