Border Gateway Protocol(BGP) is inter-autonomous system(  )protocol. BGP is based on a routing method called path vector routing. Distance vector routing is not a good candidate for inter-autonomous system routing because there are occasions on which the route with the smallest (  )count is not the preferred route. For example, we may not want a packet through an not secure even though it is the shortest route. Also, distance vector routing is unstable due to the fact that the routers announce only the number of hop counts to the destination without actually defining the path that leads to that(  ).A router that receives a distance vector advertisement packet may be fooled if the shortest path is actually calculated through the receiving router itself. Link(  )routing is also not a good candidate for inter-autonomous system routing because an Internet is usually too big for this routing method. To use link state routing for the whole internet would require each router to have a huge link state database. It would also take a long time for each router to calculate its rousting (  )using the Dijkstra algorism.
问题1选项
A.routing
B.switching
C.transmitting
D.receiving
问题2选项
A.path
B.hop
C.route
D.packet
问题3选项
A.connection
B.window
C.source
D.destination
问题4选项
A.status
B.search
C.state
D.research
问题5选项
A.table
B.state
C.metric
D.cost
正确答案及解析
正确答案
解析
包含此试题的试卷
你可能感兴趣的试题
Network security is the protection of the underlying networking infrastructure from ( )access, misuse, or theft, It involves creating a secure infrastructure for devices, users and applications to work in a ( ) manner. Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements ( ) and controls. Authorized users gain access to network resources. A ( ) is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. A virtual (作答此空) network encrypts the connection from an endpoint to a network, often over the internet. Typically a remote-access VPN uses IPsec or Secure Sockets Layer to authenticate the communication between device and network.
- 
                
- A.public
 - B.private
 - C.personal
 - D.political
 
 - 查看答案
 
Network security is the protection of the underlying networking infrastructure from ( )access, misuse, or theft, It involves creating a secure infrastructure for devices, users and applications to work in a ( ) manner. Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements ( ) and controls. Authorized users gain access to network resources. A (作答此空) is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. A virtual ( ) network encrypts the connection from an endpoint to a network, often over the internet. Typically a remote-access VPN uses IPsec or Secure Sockets Layer to authenticate the communication between device and network.
- 
                
- A.firewall
 - B.router
 - C.gateway
 - D.switch
 
 - 查看答案
 
Network security is the protection of the underlying networking infrastructure from ( )access, misuse, or theft, It involves creating a secure infrastructure for devices, users and applications to work in a ( ) manner. Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements (作答此空) and controls. Authorized users gain access to network resources. A ( ) is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. A virtual ( ) network encrypts the connection from an endpoint to a network, often over the internet. Typically a remote-access VPN uses IPsec or Secure Sockets Layer to authenticate the communication between device and network.
- 
                
- A.computing
 - B.tanstation
 - C.policies
 - D.simulations
 
 - 查看答案
 
Network security is the protection of the underlying networking infrastructure from ( )access, misuse, or theft, It involves creating a secure infrastructure for devices, users and applications to work in a (作答此空) manner. Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements ( ) and controls. Authorized users gain access to network resources. A ( ) is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. A virtual ( ) network encrypts the connection from an endpoint to a network, often over the internet. Typically a remote-access VPN uses IPsec or Secure Sockets Layer to authenticate the communication between device and network.
- 
                
- A.economical
 - B.secure
 - C.fair
 - D.efficient
 
 - 查看答案
 
Network security is the protection of the underlying networking infrastructure from (作答此空)access, misuse, or theft, It involves creating a secure infrastructure for devices, users and applications to work in a ( ) manner. Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements ( ) and controls. Authorized users gain access to network resources. A ( ) is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. A virtual ( ) network encrypts the connection from an endpoint to a network, often over the internet. Typically a remote-access VPN uses IPsec or Secure Sockets Layer to authenticate the communication between device and network.
- 
                
- A.unauthorized
 - B.authorized
 - C.normal
 - D.frequent
 
 - 查看答案