Wireless LANs implement security measures in the______________
Wireless LANs implement security measures in the______________
Bridges are also repeaters and___________
Bridges are also repeaters and___________
Stations can be configured through technique_____________
Stations can be configured through technique_____________
Active hub is actually a____________
Active hub is actually a____________
The device that operates below the physical layer of the OSI model is____________
The device that operates below the physical layer of the OSI model is____________
No protocol at the data link layer allows the fragmentation and reassembly of______________
No protocol at the data link layer allows the fragmentation and reassembly of______________
Virtual LANs create___________
Virtual LANs create___________
A transparent bridge's duties include______________
A transparent bridge's duties include______________
In filtering when the frame is forwarded, the decision must specify the_____________
In filtering when the frame is forwarded, the decision must specify the_____________
A point-to-point link in a remote backbone connected by remote bridges acts as ____________
A point-to-point link in a remote backbone connected by remote bridges acts as ____________
The bridge must discard any frames too large for its____________
The bridge must discard any frames too large for its____________
The connecting device which operates at the physical and data link layer is called ___________
The connecting device which operates at the physical and data link layer is called ___________
Connecting devices are divided into_______________
Connecting devices are divided into_______________
Each LAN type has its own frame____________
Each LAN type has its own frame____________
In transparent bridges, redundancy of the bridges can create loops in the system which is very___________
In transparent bridges, redundancy of the bridges can create loops in the system which is very___________