多项选择题
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail?()
A.Virus
B.Worm
C.Trojan
D.Executable
相关考题
-
单项选择题
How does a switch respond when it receives a message?()
A.It reads the Layer-5 information and sends the message directly to the intended computer.
B.It reads the Media Access Control (MAC) address and sends the message directly to the intended computer.
C.It reads the Layer-5 information and broadcasts the message to all the computers that are connected to the switch.
D.It reads the Media Access Control (MAC) address and broadcasts the message to all the computers that are connected to the switch. -
多项选择题
Which two Internet Protocol (IP) telephony devices are best categorized as infrastructure components? ()
A.IP telephones
B.Voice gateways
C.Call management software
D.Media Convergence Servers (MCSs) -
单项选择题
What ensures that voice packets are given priority throughout the network so that conversations arrive intact?()
A.QoS
B.Centrex
C.Packet encryption
D.Intelligent call routing
