相关考题
-
多项选择题
Which two values are used by Spanning Tree Protocol to elect a root bridge (Choose two.)()。
A.amount of RAM
B.bridge priority
C.IOS version
D.IP address
E.MAC address
F.speed of the links -
单项选择题
Which component of VPN technology ensures that data can be read only by its intended recipient?()
A.dataintegrity
B.encryption
C.keyexchange
D.authentication -
多项选择题
An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL? ()
A.FTP
B.Telnet
C.SMTP
D.DNS
E.HTTP
F.POP3