网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()
A
network
B
application
C
session
D
data link
参考答案
参考解析
解析:
暂无解析
更多 “单选题A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()A networkB applicationC sessionD data link” 相关考题
考题
Your network contains a server named Server1.contoso.com. Server1 is located on the internal network. You have a client computer named Computer1 that runs Windows 7. Computer1 is located on a public network that is connected to the Internet. Computer1 is enabled for DirectAccess. You need to verify whether Computer1 can resolve Server1 by using DirectAccess. Which command should you run on Computer1?()A. nbtstat.exe a server1.contoso.comB. netsh.exe dnsclient show stateC. nslookup.exe server1.contoso.comD. ping.exe server1.contoso.com
考题
While troubleshooting a network connectivity problem, a Ezonexam technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the 7-layer OSI model does the problem most likely exist?A. The data link layerB. The application layerC. The protocol layerD. The access layerE. The session layerF. The network layerG. None of the above
考题
The purpose of a network( )is to provide a shell around the network which will protect the system connected to the network from various threats.A.firewallB.switchC.routerD.gateway
考题
Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()
A. StarB. HybridC. MeshD. Ring
考题
A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()
A. ESD matB. ESD wrist strapC. Sealable plastic bagD. Anti-static bag
考题
Certkiller .com has a remote data center with servers connected to a local datacenter through a high-speed network. Which of the following methods is the most convenient to use to install and upgrade the servers in the remote center using locally managed install images?()A.NIMB.HAGEO/HACMPC.NFSD.ftp, rsh and rexec
考题
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D
考题
A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()A、 networkB、 applicationC、 sessionD、 data link
考题
Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day. Which of the following is the NEXT step the administrator should take?()A、 Verify the configuration of the connected port on the network switch.B、 Reboot the server.C、 Install a new NIC on the server.D、 Verify that network cables are connected.
考题
While troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the OSI model does the problem most likely exist()。A、the session layerB、the protocol layerC、the data link layerD、the access layerE、the network layerF、the application layer
考题
A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()A、ESD matB、ESD wrist strapC、Sealable plastic bagD、Anti-static bag
考题
Which action increases server availability?()A、 configuring a second network card with a different IP addressB、 replacing the existing 100 Mbps NIC with a gigabit Ethernet NICC、 using adapter teaming and configuring the second network card with the same IP address as the first network cardD、 installing a dual-port network card that can handle the future growth and setting one NIC to 10 Mbps and one NIC to 100 Mbps
考题
A server connects to iSCSI presented SAN storage array through a dedicated NIC; however, the SAN traffic is passed on the same switches as the Ethernet network and VoIP traffic. The size of the presented drive is 700GB. The administrator has noticed a decrease in storage performance. Which of the following is MOST likely the cause?()A、The server power supply is starting to fail and causing the iSCSI NIC to intermittently lose power.B、There are too many users attempting to access the iSCSI presented disk.C、The other network traffic is causing packet delays in the iSCSI network.D、The SAN is nearing capacity and should be expanded
考题
Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()A、StarB、HybridC、MeshD、Ring
考题
A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A、NIC filtering is enabled.B、Port security is configured.C、NIC is not in promiscuous mode.D、NIC is in promiscuous mode.
考题
Which of the following is a storage system that can be connected to multiple servers through an iSCSI connection?()A、JBODB、DASC、NASD、SAN
考题
On which of the following network devices would an administrator configure an ACL?()A、RouterB、HubC、RepeaterD、NIC
考题
单选题Which of the following should a technician do FIRST to troubleshoot a users network connectivity problem?()A
Run TRACERT from the users workstation.B
Start with the Last Known Good Configuration and reboot the computer.C
Replace the network interface card (NIC).D
PING the users workstation.
考题
单选题A user reports that a network printer will not print, however, other users are not experiencing any problems. The user has rebooted their computer twice and it is still not printing. Which of the following should the technician check?()A
Run the printer configuration wizard on the desktop.B
Check to see if the network printer is turned on.C
Verify that the printer is connected to the network.D
Check the local print queue for a failed print job.
考题
单选题While troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the OSI model does the problem most likely exist?()A
the session layerB
the protocol layerC
the data link layerD
the access layerE
the network layerF
the application layer
考题
单选题Certkiller .com has a remote data center with servers connected to a local datacenter through a high-speed network. Which of the following methods is the most convenient to use to install and upgrade the servers in the remote center using locally managed install images?()A
NIMB
HAGEO/HACMPC
NFSD
ftp, rsh and rexec
考题
单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()A
NIC filtering is enabled.B
Port security is configured.C
NIC is not in promiscuous mode.D
NIC is in promiscuous mode.
考题
单选题Your network contains a server named Server1.contoso.com. Server1 is located on the internal network. You have a client computer named Computer1 that runs Windows 7. Computer1 is located on a public network that is connected to the Internet. Computer1 is enabled for DirectAccess. You need to verify whether Computer1 can resolve Server1 by using DirectAccess. Which command should you run on Computer1?()A
nbtstat.exe a server1.contoso.comB
netsh.exe dnsclient show stateC
nslookup.exe server1.contoso.comD
ping.exe server1.contoso.com
考题
单选题Which action increases server availability?()A
configuring a second network card with a different IP addressB
replacing the existing 100 Mbps NIC with a gigabit Ethernet NICC
using adapter teaming and configuring the second network card with the same IP address as the first network cardD
installing a dual-port network card that can handle the future growth and setting one NIC to 10 Mbps and one NIC to 100 Mbps
考题
多选题You are the administrator of a Windows 2000 Professional computer, which has a 56 Kbps modem, connected to itself. You want the users on your company’s network to be able to connect to the Internet using your computer. But, you do not want to allow any other operations than HTTP and FTP. Which ports will you allow through this connection? ()APort 80BPort 21CPort 25DPort 81
考题
单选题A server connects to iSCSI presented SAN storage array through a dedicated NIC; however, the SAN traffic is passed on the same switches as the Ethernet network and VoIP traffic. The size of the presented drive is 700GB. The administrator has noticed a decrease in storage performance. Which of the following is MOST likely the cause?()A
The server power supply is starting to fail and causing the iSCSI NIC to intermittently lose power.B
There are too many users attempting to access the iSCSI presented disk.C
The other network traffic is causing packet delays in the iSCSI network.D
The SAN is nearing capacity and should be expanded
考题
单选题Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day. Which of the following is the NEXT step the administrator should take?()A
Verify the configuration of the connected port on the network switch.B
Reboot the server.C
Install a new NIC on the server.D
Verify that network cables are connected.
热门标签
最新试卷