网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()
A
ping 192.168.1.255
B
ping with sweep option
C
ping 192.168.1.127
D
ping 192.168.1.64
E
ping with broadcast option
参考答案
参考解析
解析:
暂无解析
更多 “单选题While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()A ping 192.168.1.255B ping with sweep optionC ping 192.168.1.127D ping 192.168.1.64E ping with broadcast option” 相关考题
考题
While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out."At which OSI layer is this problem associated with?A.The data link layerB.The application layerC.The access layerD.The session layerE.The network layer
考题
While troubleshooting an issue in the Ezonexam LAN you notice that a network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?A. This is an Ethernet port operating at half duplexB. This is an Ethernet port operating at full duplexC. This is a port on a network interface card in a PCD. This is 10 MB/s switch portE. This is a 100 MB/s switch portF. None of the above
考题
Your network contains a server named Server1 that runs Windows Server 2008 R2.You discover that the server unexpectedly shut down several times during the past week.You need to identify what caused the shutdowns and which software was recently installed.What should you click from Action Center?()A. Maintenance, and then View reliability historyB. Troubleshooting, and then ProgramsC. Troubleshooting, and then System and SecurityD. Troubleshooting, and then View history
考题
Your network uses the172.12.0.0 class B address. You need to support 459 hosts per subnet, while accommodating the maximum number of subnets. Which mask would you use?A.255.255.0.0.B.255.255.128.0.C.255.255.224.0.D.255.255.254.0.E.None of the above
考题
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D
考题
You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()A.AB.BC.CD.D
考题
Certkiller .com has asked you to develop an application that displays the properties for all Certkiller.com‘s network drives.The information generated by this application will be utilized by Certkiller .com‘s network administrators to verify client setups.You need to ensure that these requirements are fully satisfied.What should you do?()A.B.C.D.
考题
While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop.Which of these can you implement to prevent future occurrences of this issue?()A.RSTPB.root guardC.BPDU guardD.GLBP
考题
While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()A. pingB. traceC. show ip routeD. show interfaceE. show cdp neighbors
考题
On your OSPF network, routers TK1 and TK2 belong to the same Ethernet network. However, they are unable to establish an adjacency over this link. While troubleshooting this problem, you issue the show ip ospf interface Ethernet 0command on each router. The output from these commands is displayed below:What is the underlying cause of the routers failing to become adjacent?()A. The OSPF area is misconfigured.B. The priority on TK2 should be set lower.C. The cost on TK2 should be set lower.D. The hello and dead timers are misconfigured.E. You need to add a backup designated router to the network.F. The OSPF process ID numbers do not match.
考题
While troubleshooting a routing problem on the company EIGRP network you discover that one ofthe routers is failing to establish adjacencies with its neighbor. What is a likely cause of thisproblem between neighbors?()A、The K-values do not matchB、The hold times do not matchC、The hello times do not matchD、The AS numbers do not match
考题
While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()A、ping 192.168.1.255B、ping with sweep optionC、ping 192.168.1.127D、ping 192.168.1.64E、ping with broadcast option
考题
While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out."At which OSI layer is this problem associated with?()A、The data link layerB、The application layerC、The access layerD、The session layerE、The network layer
考题
While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()A、pingB、traceC、show ip routeD、show interfaceE、show cdp neighbors
考题
Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft Online Responder on the internal network. You need to recommend a secure method for Internet users to verify the validity of individual certificates. The solution must minimize network bandwidth. What should you recommend?()A、Deploy a subordinate CA on the perimeter network.B、Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.C、Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication requests to a server on the internal network.D、Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS to redirect requests to the Online Responder on the internal network.
考题
Your network contains an Active Directory domain that has two sites. You need to identify whether logon scripts are replicated to all domain controllers. Which folder should you verify()A、GroupPolicyB、NTDSC、SoftwareDistributionD、SYSVOL
考题
You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed? ()A、 VPN TrafficB、 DNS TrafficC、 LDAP TrafficD、 HTTP TrafficE、 HTTPS TrafficF、 Traffic from the network address of 192.168.10/24
考题
You are the administrator of an Active Directory domain. The network contains a Windows Server 2003 domain controller named Server1Users report that they experience intermittent delays when they log on to Server1. Administrators report that replication attempts between Server1 and other domain controllers are occasionally delayed.You need to verify the cause of the intermittent connection delays to Server1. You also need to find out whether the problem is related to a hardware deficiency on Server1. You need to track these delays over a period of one day. What should you do first?()A、Run the netdiag /verbose command to perform a network diagnostic test on Server1.B、Run the replmon command to view the Active Directory replication status on Server1.C、Use Network Monitor to view the network traffic packet contents between Server1 and all other computers.D、Create a System Monitor counter to track the queue lengths on the network adapter on Server1.
考题
You work as an Exchange Administrator for Xxx .The company has a Windows 2008 Active Directorybased network.You have just finished deploying an Exchange 2010 server and migrating all mailboxes including resource mailboxes from Exchange Server 2003. After the migration from the Exchange 2003 server was complete, you noticed that the resource mailboxes were showing up as a shared mailbox and not a resource mailbox.You realize that you need to convert them to Exchange 2010 resource mailboxes.While logged into the Exchange Management Console, you do not see any option to convert a mailbox. What should you use to convert this Exchange 2010 shared mailbox to an Exchange 2010 resource mailbox?()A、Exchange Troubleshooting AssistantB、Exchange System ManagerC、Exchange Management ShellD、Command prompt
考题
You are designing a Windows 7 deployment image. You receive a baseline image over the network, from a different geographic location. You need to verify that the baseline image is valid. Which tool should you use?()A、ImageXB、Windows Compatibility EvaluatorC、Windows System Image Manager (Windows SIM)D、the Deployment Image Servicing and Management (DISM) tool
考题
Your network contains a server named Server1 that runs Windows Server 2008 R2.You discover that the server unexpectedly shut down several times during the past week.You need to identify what caused the shutdowns and which software was recently installed. What should you click from Action Center?()A、Maintenance, and then View reliability historyB、Troubleshooting, and then ProgramsC、Troubleshooting, and then System and SecurityD、Troubleshooting, and then View history
考题
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.
考题
单选题While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()A
pingB
traceC
show ip routeD
show interfaceE
show cdp neighbors
考题
单选题While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop. Which of these can you implement to prevent future occurrences of this issue?()A
RSTPB
root guardC
BPDU guardD
GLBP
考题
单选题You are the network administrator of a small Layer 2 network with 50 users. Lately, users have beencomplaining that the network is very slow. While troubleshooting, you notice that the CAM table of yourswitch is full, although it supports up to 12, 000 MAC addresses. How can you solve this issue and preventit from happening in the future?()A
Upgrade the switchesB
Configure BPDU guardC
Configure VLAN access listsD
Configure port securityE
Configure Dynamic ARP inspection
考题
单选题You are designing a Windows 7 deployment image. You receive a baseline image over the network, from a different geographic location. You need to verify that the baseline image is valid. Which tool should you use?()A
ImageXB
Windows Compatibility EvaluatorC
Windows System Image Manager (Windows SIM)D
the Deployment Image Servicing and Management (DISM) tool
考题
多选题You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed? ()AVPN TrafficBDNS TrafficCLDAP TrafficDHTTP TrafficEHTTPS TrafficFTraffic from the network address of 192.168.10/24
考题
单选题You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()A
Upgrade the switchesB
Configure BPDU guardC
Configure VLAN access listsD
Configure port securityE
Configure Dynamic ARP inspection
热门标签
最新试卷