CCNA
CISCO
Backup Balance Bandwidth Base Belong Benefit Block Bound Boundary Branch Brand Bridges Broadband Broadcast Buffer Bundle
Cable Calculate Callback Capability Capacity Card Case Catalyst Cause CellCentral Certification Channel Character Characteristic Circuit Circumstance Collision Combination Combine Command Commit Communication Compare Complain Complexity Component Composite Compress Compression Concept Configuration Configure Confine Congestion Connectivity Conserve Consider Consist Console Consolidate Contact Contain Contiguous Continuous Contrast Contribution Controller Convention Convergence Corporate Corrupt Cost Count Counterpart Cover Create Crossover Cycle
Database Debug Decimal Decrease Deduce Deem Default Define Definition Delivery Demand Deny Depend Depict Deployment Describe Describe Describe Descriptive DesignateDesire Destination Destine Detail Detail Detect Detection Determine Diagnose Diagram Dialog Direction Disable Discontinuous Discover Display Distance Distinction Divide Domain Dramatically Due Duplex Dynamic
lectronic Eliminate Employees Emulation Enable Encapsulation Encryption Enhance Enlarge Ensure Enter Enterprise Entire Entry Entry Environment Equate Erase Error Establish Establishing Evaluate Event Evidence Excessive Exclusive Execute Exhibit Exit Expand Experience Extend Extensive External
Facilitate Factor Failure Fashion Faulty Faulty Feasible Feature Filter Finite FlashFlood Forward Frame FrequentlyFunction
Gateway Global Guide
Hardware Hierarchical Hold time Hop Horizon Hub
Ignore Image Impact Implement Inactivity Inbound Increase Indicate Indicator Ineligible Infrared Initial Initialize Initialize Input Inside Instability Instruct Integer Integrity Intend Interface Intermittent Internal Interval Invalid Inverse Investigate Isolate Issue
Jam
Keep alive
Latency Legacy Legitimate Link List Load Local Loop Loopback
Maintain Major Mask Maximum Mechanism Media Meet Memory Mention Met Method Metric Midst MinimalModify Modular Module Monitor Motivation Multiple Multipoint
Negotiate Neighbor Non continuous Normal Notorious
Obtain Obviously Occur Occur Offer Omit Operational Option Ordinarily Orient Original Outbound Output Outside Overhead
Packet Parameter Parity Participate Particular Passive Perform Period Permission Permit Persistent Phase Platform Plug Poison Port Port Fast Portion PosePrefer Prevent Primary Prior Priority Private Privilege Procedure Process Product Prohibit Prone Proprietary Protocol Provider Proxy Purge Purpose
Quantity Query Queue
Range Reachability Reachable Reboot Reclaim Recognize Recommend Recovery Redistribute Reduce Reference Refurbish Regard Register Relate Relationship Relay Release Relevant Reliable Remain Remote Repeater Replace RepresentRequire Requirement Resort Respectively Respond Response Responsible Restart Retransmit Reveal Reverse Revert Risk Rollover Router
Scalability Scenario Scheme Scratch Secondary Secret Security Segment Separate Serial Session Shortage Significance Significant Similar Simultaneous Single Slot Software Source Specific Specify Spectrum Split Spoke Stability Stable Standard State Statement StaticStatus Storm Straight-through Streamline Streamline Structure Subnet Summarization Summary Super net Superior Suppression Suspend Switch Symptom Synchronous Syntax System
Tag Target Task TemporaryTerminal Terminate Topology Track Traffic Traits Translation Transport Trigger Troubleshoot Trunk Type
Uncast Unequal Unequal Unequal Unique Update Upgrade Upon Usable Utilization Utilize
ValidVa lue Variable Variance Various Vector Verification Verify Verify Verify Version Via Virtual
您的帮助是我们莫大的动力!感谢有您一路相随,记得点击页面右上角的“大拇指”或者“两角箭头”,谢谢了。