网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You are the network administrator at Company and switch R1 is configured as shown below: Interface gigethernet 0/1 Switchport mode trunk Switchport trunk encapsulation dot1q Switchport trunk native vlan 5 If untagged frames are arriving on interface gigethernet 0/1 of R1, which of the following statement are correct?()
A
Untagged frames are automatically assumed to be in VLAN 5.
B
Untagged frames are defaulted to VLAN 1 traffic.
C
Untagged frames are dropped because all packets are tagged when dot1q trunked.
D
Untagged frames are determined on the other switch
E
Untagged frames are not supported on 802.1Q trunks.
参考答案
参考解析
解析:
暂无解析
更多 “单选题You are the network administrator at Company and switch R1 is configured as shown below: Interface gigethernet 0/1 Switchport mode trunk Switchport trunk encapsulation dot1q Switchport trunk native vlan 5 If untagged frames are arriving on interface gigethernet 0/1 of R1, which of the following statement are correct?()A Untagged frames are automatically assumed to be in VLAN 5.B Untagged frames are defaulted to VLAN 1 traffic.C Untagged frames are dropped because all packets are tagged when dot1q trunked.D Untagged frames are determined on the other switchE Untagged frames are not supported on 802.1Q trunks.” 相关考题
考题
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center
考题
A company is experiencing network delays. The network administrator discovers that a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network.How could this action be responsible for the impaired network performance?()A. Connecting a host to the old switch has created a broadcast storm.B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.C. The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network.D. The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network.E. Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network.
考题
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()A、You should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.B、You should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.C、You should consider having the new server joined to an Active Directory domain.D、You should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.
考题
You are configuring a Cisco multilayer switch for the Company network. Which command would you use to configure a port to act as a routed interface?()A、 ip routingB、 switchport mode trunkC、 no switchportD、 switchport trunk native vlan 1E、 None of the other alternatives apply
考题
You want to configure switch R1 to propagate VLAN information across the Company network using VTP. What must be configured on a Cisco switch in order to advertise VLAN information?()A、VTP modeB、VTP passwordC、VTP revision numberD、VTP pruningE、VTP domain nameF、None of the other alternatives apply
考题
The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.
考题
The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A、Lower the bridge priority number.B、Change the MAC address of the switch.C、Increase the VTP revision number for the domain.D、Lower the root path cost on the switch ports.E、Assign the switch an IP address with the lowest value.
考题
The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management domain?()A、Enable VTP pruning on any switch in the management domainB、Enable VTP pruning on any client switch in the domainC、Enable VTP pruning on a VTP server in the management domainD、Enable VTP pruning on every switch in the domainE、None of the other alternatives apply
考题
You are the network administrator at Company and switch R1 is configured as shown below: Interface gigethernet 0/1 Switchport mode trunk Switchport trunk encapsulation dot1q Switchport trunk native vlan 5 If untagged frames are arriving on interface gigethernet 0/1 of R1, which of the following statement are correct?()A、 Untagged frames are automatically assumed to be in VLAN 5.B、 Untagged frames are defaulted to VLAN 1 traffic.C、 Untagged frames are dropped because all packets are tagged when dot1q trunked.D、 Untagged frames are determined on the other switchE、 Untagged frames are not supported on 802.1Q trunks.
考题
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center
考题
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the day a network user named Mia Hamm reports that certain meetings are missing from her calendar.Company.com requested that you recover the missing calendar items for Mia Hamm whilst ensuring your solution recovers the missing items automatically.What should you do?()A、You should consider having the Set-MailboxCalendarConfiguration cmdlet run.B、You should consider having the schedule set for the Calendar Repair Assistant (CRA).C、You should consider having a Sharing policy created and configured.D、You should consider having the schedule set for the Managed Folder Assistant.
考题
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that a newly created room mailbox automatically accepts meeting requests.What should you do?()A、You should consider having a managed folder mailbox policy assigned.B、You should consider having the resource booking attendant enabled.C、You should consider having the mailbox permissions modified.D、You should consider having the moderation for the mailbox enabled.
考题
Your network contains a Hyper-V host named Hyperv1 that runs Windows Server 2012 R2. Hyperv1 has a virtual switch named Switch1. You replace all of the network adapters on Hyperv1 with new network adapters that support singleroot I/O virtualization (SR-IOV). You need to enable SR-IOV for all of the virtual machines on Hyperv1. Which two actions should you perform?()A、On each virtual machine, modify the Advanced Features settings of the network adapterB、Modify the settings of the Switch1 virtual switchC、Delete, and then recreate the Switch1 virtual switchD、On each virtual machine, modify the BIOS settingsE、On each virtual machine, modify the Hardware Acceleration settings of the network adapter
考题
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com. What should you do?()A、You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.B、You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.C、You should consider having mail enabled for KingPublic.D、You should consider having the author role assigned to Anonymous.
考题
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that all the network users are able to automatically schedule the use of a projector.What should you do?()A、You should consider having the schedule for the Managed Folder Assistant modified.B、You should consider having the properties of the Calendar managed default folder modified.C、You should consider having a new Sharing policy created.D、You should consider having an equipment mailbox created.
考题
Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.
考题
You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.
考题
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that the network users are able to open a resource mailbox. What should you do?()A、You should consider having a new Sharing policy crated from the Exchange Management Console (EMC).B、You should consider having the Resource Delegated parameter set for the resource mailbox from the Exchange Management Shell.C、You should consider having the password for the account associated to the resource mailbox reset from Active Directory Users And Computers console.You should then have the password provided to the network users .D、You should consider having the properties of the resource mailbox modified from Microsoft Office Outlook.
考题
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.
考题
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently created a distribution group for the network users.During the course of the business week you receive instruction from Company.com to ensure that the newly added users are able to add their mailboxes to the distribution group.What should you do?()A、You should consider having the security settings of the distribution group modified.B、You should consider having the authentication settings of the ECP virtual directory modified.C、You should consider having the group scope of the distribution group modified.D、You should consider having the approval mode of the distribution group modified.
考题
You work as a network administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com.All servers on the ABC.com network have Windows Server 2012 R2.The ABC.com network contains a server named ABC_SR04 that has a Hyper-V Virtual Switch and several Hyper-V virtual machines.You upgrade the network interface cards (NICs) on ABC_SR04 with NICs that have support for single-root I/O virtualization (SR-IOV). How would you ensure that the virtual machines on ABC_SR04 are able to use the SR-IOV NICs?()A、You should run the New-NetSwitchTeam cmdlet on ABC_SR04B、You need to create an internal virtual network on ABC_SR04.C、You need to install Integration Services on ABC_04.D、You should configure the Hardware Acceleration settings on the virtual machines.E、You need to add a new Hyper-V Virtual Switch on ABC_SR04.F、You need to remove the existing Hyper-V Virtual Switch from ABC_SR04.G、You should run the Set NetIsatapConfiguration cmdlet on ABC_SR04.
考题
单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A
One router is running RIPv1.B
RIP neighbor is 224.0.0.9.C
The network contains a loop.D
Network 10.10.1.0 is reachable.
考题
多选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.ABC.com has a Hyper-V server, named ABC-SR13, which hosts multiple virtual machines. You have enabled the use of Single-root I/O virtualization.Which of the following is TRUE with regards to using Single-root I/O virtualization?()AIt maximizes network throughput, while minimizing network latency.BIt maximizes network throughput, as well as network latency.CIt avoids the virtual switch stack and allows the virtual machine direct access to the actual network switch.DIt prevents the virtual machine from accessing the network switch directly.
考题
单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()A
msiB
mstC
zapD
zip
考题
单选题As a network administrator, you have configured a Catalyst 6500 Series Switch with redundant supervisor engine in a CIS network. What is the result of issuing the redundancy force-switchover command on that switch?()A
Automatic switchover from active to standby on primary supervisor failureB
Reset of the primary supervisor.C
Manual switchover from active to standby supervisorD
Manual switchover from standby to active supervisor
考题
单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A
Lower the bridge priority number.B
Change the MAC address of the switch.C
Increase the VTP revision number for the domain.D
Lower the root path cost on the switch ports.E
Assign the switch an IP address with the lowest value.
考题
单选题You want to configure switch R1 to propagate VLAN information across the Company network using VTP. What must be configured on a Cisco switch in order to advertise VLAN information?()A
VTP modeB
VTP passwordC
VTP revision numberD
VTP pruningE
VTP domain nameF
None of the other alternatives apply
考题
单选题The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management domain?()A
Enable VTP pruning on any switch in the management domainB
Enable VTP pruning on any client switch in the domainC
Enable VTP pruning on a VTP server in the management domainD
Enable VTP pruning on every switch in the domainE
None of the other alternatives apply
热门标签
最新试卷