itgle.com

Which of the following are key characteristics of PPP (Choose three.)()。A、can be used over analog circuitsB、maps Layer 2 to Layer 3 addressC、encapsulates several routed protocolsD、supports IP onlyE、provides error correction

题目

Which of the following are key characteristics of PPP (Choose three.)()。

  • A、can be used over analog circuits
  • B、maps Layer 2 to Layer 3 address
  • C、encapsulates several routed protocols
  • D、supports IP only
  • E、provides error correction

相似考题
更多“Which of the following are key c”相关问题
  • 第1题:

    In a Windows Server 2003 environment using PKI, a user encrypts several documents on a shared file server. That user account is then accidentally deleted.  Which of the following must be configured inorder to decrypt those files?()

    • A、 Key recovery administrator
    • B、 Key recovery agent
    • C、 Trusted root certificate store
    • D、 Root certificate store

    正确答案:B

  • 第2题:

    Which of the following key sequences will allow a technician to install third party drivers during a Windows installation? ()

    • A、 Press F6
    • B、 Press ESC
    • C、 Press any key
    • D、 Press Alt+F8

    正确答案:A

  • 第3题:

    Which of the following flow control settings allows resumption of suspended output by hitting the "R" key?()

    • A、XON/XOFF
    • B、NONE
    • C、RTS/CTS
    • D、XON/IXANY

    正确答案:D

  • 第4题:

    A customer purchases a virtual media key on a x3650 M3. They ask where to install the key. Which of the following provides the correct answer?()

    • A、Problem Determination and Service Guide
    • B、xRef
    • C、ServerGuide Hardware Reference
    • D、COG

    正确答案:A

  • 第5题:

    Which of the following provides the underlying trust infrastructure to enable easy and secure sharing of information organizations and in cross-premises organizations?()

    • A、Public Key Infrastructure
    • B、Role-based access control
    • C、Federation
    • D、Digital certificate

    正确答案:C

  • 第6题:

    单选题
    You are developing a method to decrypt data that was encrypted with the Triple DES Algorithm. The method accepts the following parameters:  The byte array to be decrypted, which is named cipherMessage  The key, which is named key   An initialization vector, which is named iv  You need to decrypt the message by using the TripleDES class and place the result in a string.  Which code segment should you use?()
    A

    A

    B

    B

    C

    C

    D

    D


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    Static WEP is configured on the access point. You are authenticated and associated to the accesspoint but are unable to obtain an IP address. Which of the following will cause this problem?()
    A

    invalid radio type selected

    B

    no WEP key configured on the client

    C

    invalid SSID configured

    D

    invalid WEP key


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following authenticates a web server to the remote client in PKI?()
    A

    FQDN

    B

    DNS name

    C

    Public key

    D

    Private key


    正确答案: B
    解析: 暂无解析

  • 第9题:

    多选题
    Which of the following are key characteristics of PPP?()
    A

    can be used over analog circuits

    B

    maps Layer 2 to Layer 3 address

    C

    encapsulates several routed protocols

    D

    supports IP only

    E

    provides error correction


    正确答案: C,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which of the following settings is MOST likely to be controlled through the use of a laptop’sFunction (Fn) key?()
    A

    Wireless

    B

    Brightness

    C

    Sleep Mode

    D

    NumPad

    E

    Power


    正确答案: B,E
    解析: 暂无解析

  • 第11题:

    Which of the following settings is MOST likely to be controlled through the use of a laptop’sFunction (Fn) key?()

    • A、Wireless
    • B、Brightness
    • C、Sleep Mode
    • D、NumPad
    • E、Power

    正确答案:B,C

  • 第12题:

    Which of the following is a key component of a directory services server?()

    • A、 VPN
    • B、 RIS
    • C、 LDAP
    • D、 RAS

    正确答案:C

  • 第13题:

    Which of the following is a key advantage of AIX v5.3 over AIX v5.2?()

    • A、Dynamic LPAR
    • B、Micro-Partitioning
    • C、Small Memory Real Mode
    • D、Capacity Upgrade on demand for memory

    正确答案:B

  • 第14题:

    Which of the following commands should be used to assure that a dump can be forced using the reset button on a system without a key switch? ()

    • A、 sysdumpdev -k 
    • B、 sysdumpdev -L 
    • C、 sysdumpdev -K 
    • D、 sysdumpdev -P

    正确答案:C

  • 第15题:

    单选题
    Which of the following commands should be used to assure that a dump can be forced using the reset button on a system without a key switch? ()
    A

     sysdumpdev -k 

    B

     sysdumpdev -L 

    C

     sysdumpdev -K 

    D

     sysdumpdev -P


    正确答案: B
    解析: 暂无解析

  • 第16题:

    单选题
    Which of the following is a key component of a directory services server?()
    A

     VPN

    B

     RIS

    C

     LDAP

    D

     RAS


    正确答案: B
    解析: 暂无解析

  • 第17题:

    单选题
    Which of the following is a slip of tongue? _____.
    A

    Time flies.

    B

    Every little helps.

    C

    Detail is the key to success.

    D

    Man deposes, God proposes.


    正确答案: B
    解析:
    A项的意思是“光阴似箭”;B项的意思是“积少成多”;C项的意思是“细节决定成败”;D项的正确表达应为“Man proposes, God deposes”,意为“谋事在人,成事在天”。

  • 第18题:

    单选题
    Which of the following is used by BitLocker to lock an encryption key and protect data?()
    A

    ECP

    B

    IRQ

    C

    AGP

    D

    TPM


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    A technician is searching a knowledge base for the correct method of removing a virus. The knowledge base states that the key: HKEY_LOCAL_MACHINE/MICROSOFT/SOFTWARE/CURRENTVERSION/PAK needs to be deleted. Which of the following should the technician use to delete the key?()
    A

    MSCONFIG

    B

    DEBUG

    C

    EVENTVIEWER

    D

    REGEDIT


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    In a Windows Server 2003 environment using PKI, a user encrypts several documents on a shared file server. That user account is then accidentally deleted.  Which of the following must be configured inorder to decrypt those files?()
    A

     Key recovery administrator

    B

     Key recovery agent

    C

     Trusted root certificate store

    D

     Root certificate store


    正确答案: A
    解析: 暂无解析