网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
he network administrator is trying to add Switch1 to the network, but the 802.1Q trunk is not  coming up. Switch1 was previously tested in the laboratory and its trunk configuration worked fine.  What are three possible causes of this problem?()
A

The trunking configuration mode on Switch1 is set to Off.

B

The trunking configuration mode on the other end is set to On.

C

The trunking configuration mode on the other end is set to Desirable.

D

Cisco Discovery Protocol is not running on the other end.

E

There is a VTP domain name mismatch.

F

Switch1 does not support 802.1Q


参考答案

参考解析
解析: 暂无解析
更多 “多选题he network administrator is trying to add Switch1 to the network, but the 802.1Q trunk is not  coming up. Switch1 was previously tested in the laboratory and its trunk configuration worked fine.  What are three possible causes of this problem?()AThe trunking configuration mode on Switch1 is set to Off.BThe trunking configuration mode on the other end is set to On.CThe trunking configuration mode on the other end is set to Desirable.DCisco Discovery Protocol is not running on the other end.EThere is a VTP domain name mismatch.FSwitch1 does not support 802.1Q” 相关考题
考题 文中( 4 )处正确的答案是( )。A.route add-net 202.114.100.0/24 9w 10.1.1.1B.route add-net 202.114.100.0/24 9w 10.1.1.2C.route add-net 202.114.100.0/24 9w 10.1.1.2ech0”1”/proc/sys/net/ipv4/ip_forwardD.route add-net 202.114.110.0/24 9w 10.1.1.1;ech0”1”/proc/sys/net/ipv4/ip_forward

考题 You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All servers run Windows Server 2003. All client computers run Windows XP Professional.A server named Testking32 contains a folder that is shared as ManagerData$. A global group named AllManagers has permission to access the shared folder.A user reports that he needs access to the ManagerData$ shared folder. You add his user account to the All Managers global group. When the user attempts to connect to the shared folder by typing \\Testking32\ManagerData$\ , he receives the following error message: "\\Testking32\ManagerData$\ is not accessible. You might not have permissions to use the network resource. Contact the administrator of this server to find out if you have access permissions. Access is denied.You need to ensure that the user can access the ManagerData$ shared folder on Testking32.What should you do?()A. Instruct the user to type \\Testking32\ManagerData\ when he attempts to access the folder.B. Add the Anonymous Logon group to the ACL for the ManagerData$ shared folder.C. Select the Replace permission entries on all child object with entries shown here that apply to child objects check box.D. Instruct the user to log off and log on again before he accesses the folder.

考题 The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()A. Switch1(config)# i nterface fa0 /1 Switch1(config-if)# ip address 192.168.24.3.255.255.255.0B. Switch1 (config)#interface fa0/1 Switch1 (config-if)# switchport mode trunkC. Switch 1 (config)# i nterface fa0 /1 Switch1 (config-if)# duplex full Switch1 (config-if)# speed 100D. Switch1 (config-if)# default-gateway 192.168.24.1E. Switch1 (config)# line con 0 Switch1(config-line)# password cisco Switch1 (config-line)#login

考题 以下是某公司的网络拓扑图,公司要求全网范围内实现IP地址的动态分配,请根据拓扑图将配置补充完整。 [问题1](5分)图中的区域(a)的名称是(1),区域(b)的名称是(2),区域(c)的名称是(3),其中安全级别最高的是(4)。防火墙工作模式是(5) [问题2](5分).公司的服务器群主要部署的是基于WEB的各种应用,尽管在防火墙上设置各种安全措施,在实际应用中,服务器群总是遭到各种攻击。管理员用抓包工具发现大量的如下URL:http://www.abc.com/showdetail.asp?id=1 and (select count(*) from sysobjects)>0http://www.abc.com/showdetail.asp?id=1 and user>0…则公司的服务器遭受了(6)攻击,合理的解决方法是(7)[问题3](6分)以下是设备的部分配置,根据题意完成命令填空或者解释。…[Switch1]vlan 2 创建vlan2、3[Switch1-vlan2]quit[Switch1]vlan 3 [Switch1-vlan3]quit[Switch1]vlan 100 [Switch1-vlan100]quit [Switch1] (8) //配置名为net1的地址池[Switch1-ip-pool-net1] (9)[Switch1-ip-pool-net1] gateway-list 192.168.1.1[Switch1-ip-pool-net1] dns-list (10)[Switch1-ip-pool-net1] quit[Switch1][Switch1] ip pool net2[Switch1-ip-pool-net2] network 192.168.2.0 mask 255.255.255.0 [Switch1-ip-pool-net2] gateway-list 192.168.2.1[Switch1-ip-pool-net2] dns-list 114.114.114.114 [Switch1-ip-pool-net2] static-bind ip-address 192.168.2.10 mac-address 0001-1111-2222 [Switch1-ip-pool-net2] quit….[Switch1] (11)[Switch1-Vlanif2] ip address (12)[Switch1-vlanif2] (13) //接口下开启全局DHCP分配功能[Switch1-Vlanif2] quit[Switch1][Switch1] interface vlan 3[Switch1-Vlanif3] ip address 192.168.2.1[Switch1-vlanif3] dhcp select global [Switch1-Vlanif3] quit[Switch1][Switch1] interface vlan 100[Switch1-Vlanif100] ip address 192.168.100.1[Switch1-Vlanif100] quit[Switch1][问题4](4分):根据拓扑图,防火墙需要配置默认路由,则正确的命令是(14)和内网的回程路由(15)

考题 he network administrator is trying to add Switch1 to the network, but the 802.1Q trunk is not  coming up. Switch1 was previously tested in the laboratory and its trunk configuration worked fine.  What are three possible causes of this problem?()A、The trunking configuration mode on Switch1 is set to Off.B、The trunking configuration mode on the other end is set to On.C、The trunking configuration mode on the other end is set to Desirable.D、Cisco Discovery Protocol is not running on the other end.E、There is a VTP domain name mismatch.F、Switch1 does not support 802.1Q

考题 The network security policy requires that only one host be permitted to attach dynamically to each switch interfacE.If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? ()A、Switch1(config-if)# switchport port-security maximum 1B、Switch1(config)# mac-address-table secureC、Switch1(config)# access-list 10 permit ip hostD、Switch1(config-if)# switchport port-security violation shutdownE、Switch1(config-if)# ip access-group 10

考题 A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()A、Edit the /etc/hosts file and add an alias to the correct entryB、Set up an alias in his .kshrc file to alias the hostname to the fully qualified hostnameC、Add an alias to /etc/aliasesD、Add mars.net to the search path of the resolv.conf file

考题 You work as an Exchange Administrator for Xxx Inc.The company has a Windows 2008 Active Directorybased network.The network contains an Exchange Server 2010 organization.The Exchange environment has two Edge Transport servers and two Hub servers.The CTO wants you to filter a list of IP addresses and requests that you add these IP addresses to the block list. You log into one of the Edge Transport servers and add the list of IPs to the block list.The next day the CTO informs you that the IP addresses he gave you are still able to send messages into the Exchange environment. What changes should you make to ensure these IP addresses are blocked?()A、Restart the SMTP service.B、Reboot the Edge Transport server.C、Add the list to the second Edge Transport server.D、Restart IIS.

考题 A network associate is trying to understand the operation of the FLD Corporation by studying the network in the exhibit. The associate knows that the server in VLAN 4 provides the necessary resources to support the user hosts in the other VLANs. The associate needs to determine which interfaces are access ports. Which interfaces are access ports? ()A、Switch1 - Fa 0/2B、Switch1 - Fa 0/9C、Switch2 - Fa 0/3D、Switch2 - Fa 0/4E、Switch2 - Fa 0/8F、Router - Fa 1/0

考题 The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。A、Switch1(config-if)# switchport port-security maximum 1B、Switch1(config)# mac-address-table secureC、Switch1(config)# access-list 10 permit ip hostD、Switch1(config-if)# switchport port-security violation shutdownE、Switch1(config-if)# ip access-group 10

考题 The network administrator is trying to add Switch1 to the network, but the 802.1Q trunk is not coming up. Switch1 was previously tested in the laboratory and its trunk configuration worked fine. What are three possible causes of this problem? ()A、The trunking configuration mode on Switch1 is set to Off.B、The trunking configuration mode on the other end is set to On.C、The trunking configuration mode on the other end is set to Desirable.D、Cisco Discovery Protocol is not running on the other end.E、There is a VTP domain name mismatch.F、Switch1 does not support 802.1Q.

考题 A network administrator enters the command clear ip route * and as a result he sees the message,"Please update the network documentation to record why the ip routing table was cleared." Which router feature was used in this case?()A、NetFlowB、SNMPC、DebugD、SysLogE、EEMF、CEF

考题 A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem? ()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0A、The process id is configured improperlyB、The OSPF area is configured improperlyC、The network wildcard mask is configured improperlyD、The network number is configured improperlyE、The AS is configured improperlyF、The network subnet mask is configuerd improperly

考题 A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?()A、CAT3 cableB、Serial cableC、Crossover cableD、Rollover cable

考题 he system administrator is making system wide changes to a server, which will add to the PATH variable for the server environment.  Where is the PATH variable found for the system?()A、/profileB、/etc/envpathC、/etc/profileD、/etc/environment

考题 The system administrator notices that IP packets are not getting forwarded. The system administrator wants to use an AIX machine as an internetwork router over TCP/IP networks. Which of the following commands will allow this change on the fly?()A、 Some network attributes are runtime attributes that can be changed at any time. Others are loadtime attributes that must be set before the netinet kernel extension is loaded and be placed in the /etc/rc.net or /etc/rc.bsdnet file. This parameter cannot be done on the fly, since a reboot is required.B、 Add to the /etc/rc.net file or if a Berkelye-style network configuration, /etc/rc.bsdnet, and issue the command: no -a ipforwarding=1 to start ipforwarding immediately.C、 Add to the /etc/rc.net file or if a Berkeley-style network configuration, /etc/rc.bsdnet, and issue the command: no -o ipforwarding=0 to start ipforwarding immediately.D、 Add to the /etc/rc.net file or if a Berkeley-style network configuration, /etc/rc.bsdnet, and issue the command: no -o ipforwarding=1 to start ipforwarding immediately.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

考题 You work as an Exchange Administrator for Xxx Inc.The company has a Windows 2008 Active Directorybased network.The network contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG attachments be filtered so that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of the following commands will you use to accomplish the task?()A、Add-AttachmentFilterEntry -Name *.jpeg -Type ContentTypeB、Add-AttachmentFilterEntry -Name *.exe -Type FileNameC、Add-AttachmentFilterEntry -Name image/jpeg -Type ContentTypeD、Add-AttachmentFilterEntry -Name image/jpeg -Type FileName

考题 You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.

考题 You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .The Xxx network has a mail server named XXX-EX01.What actions must you take to do an unattended installation of Exchange Server 2010 server on XXXEX01?()A、You should add recipient filter.B、You should add create Send connectors.C、You should run setup /ps.D、You should add setup.com in the script.

考题 You are the network administrator for your company. The network consists of a single Active Directorydomain. All network servers run Windows Server 2003. Three thousand client computers run Windows 2000Professional, and 1,500 client computers run Windows XP Professional.A new employee named Peter is hired to assist you in installing Windows XP Professional on 150 new client computers.You need to ensure that Peter has only the minimum permissions required to add new computer accounts to the domain and to own the accounts that he creates. Peter must not be able to delete computer accounts.What should you do()?A、Add Peter's user account to the Server Operators group.B、Add Peter's user account to the Account Operators group.C、Use the Delegation of Control Wizard to permit Peter's user account to create new computer objects in the Computers container.D、Create a Group Policy object (GPO) and link it to the domain. Configure the GPO to permit Peter's user account to add client computers to the domain.

考题 单选题A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()A Edit the /etc/hosts file and add an alias to the correct entryB Set up an alias in his .kshrc file to alias the hostname to the fully qualified hostnameC Add an alias to /etc/aliasesD Add mars.net to the search path of the resolv.conf file

考题 多选题The network administrator is trying to add Switch1 to the network, but the 802.1Q trunk is not coming up. Switch1 was previously tested in the laboratory and its trunk configuration worked fine. What are three possible causes of this problem?()AThe trunking configuration mode on Switch1 is set to Off.BThe trunking configuration mode on the other end is set to On.CThe trunking configuration mode on the other end is set to Desirable.DCisco Discovery Protocol is not running on the other end.EThere is a VTP domain name mismatch.FSwitch1 does not support 802.1Q.

考题 单选题A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?() Router(config)#router ospf 1 Router(config-router)#network 10.0.0.0 255.0.0.0 area 0A The process id is configured improperlyB The OSPF area is configured improperlyC The network wildcard mask is configured improperlyD The network number is configured improperlyE The AS is configured improperlyF The network subnet mask is configuerd improperly

考题 单选题A system administrator is trying to troubleshoot company wide email problems that may be related to DNS.  Which of the following network tools would be MOST useful to determine if it is a DNS issue?()A netstatB tracertC nslookupD ping

考题 单选题he system administrator is making system wide changes to a server, which will add to the PATH variable for the server environment.  Where is the PATH variable found for the system?()A /profileB /etc/envpathC /etc/profileD /etc/environment

考题 单选题A network administrator enters the command clear ip route * and as a result he sees the message,"Please update the network documentation to record why the ip routing table was cleared." Which router feature was used in this case?()A NetFlowB SNMPC DebugD SysLogE EEMF CEF