- A.255,240.0.0
- B.255.255.0.0
- C.255.255.252.0
- D. 255.255.255.252
- avi, like many project&n
- bsp;(71) ,had studied the waterfall model of software development as the primary software life-
- cycle (72) .He was all set to use it for an upcoming project, his first assignment. However, Ravi foun
- d that the waterfall model could not be used because the customer wanted the software delivered in stages, something that implied that the system had to be delivered and built in (73) and not as (74) .The situation in many other p
- A.交换机是一种多端口网桥
- B.交换机的各个端口形成一个广播域
- C.集线器的所有端口组成一个冲突域
- D.集线器可以起到自动寻址的作用
- A.电信网、广播电视网、互联网
- B.物联网、广播电视网、电信网
- C.物联网、广播电视网、互联网
- D.物联网、电信网、互联网
- A.物理层
- B.数据链路层
- C.网络层
- D.传输层 (67)
- A.实现MAC地址与主机名之间的映射
- B.实现lP地址与MAC地址之间的变换
- C.实现IP地址与端口号之间的映射
- D.实现应用进程与物理地址之间的变换
- A.Guests
- B.Power Users
- C.Users
- D.Administrators
- A.外部攻击
- B.内部攻击
- C.网络监听
- D.病毒入侵
- A.Internet
- B.本地Intranet
- C.可信站点
- D.受限站点
- A.B的公钥
- B.B的私钥
- C.CA的公钥
- D.CA的私钥
- A.①和②
- B.①和④
- C.②和③
- D.②和④