网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? ()
- A、ARP
- B、CDP
- C、DHCP
- D、DNS
- E、ICMP
参考答案
更多 “A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? ()A、ARPB、CDPC、DHCPD、DNSE、ICMP” 相关考题
考题
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A.tracerouteB.tracertC.ifconfigD.ipconfig
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
A.SSHB.WEPC.VPND.WPA
考题
Users are reporting that they are still experiencing network issues even though a fix was recentlyapplied. Which of the following troubleshooting methodology steps is the administrator using?()
A. Escalating the problemB. Testing the solution and identifying the effectsC. Continuing to gather information about the same symptomsD. Documenting the solution and the entire process
考题
Which of the following connectivity issues is likely to occur within a token ring network?()
A. CrosstalkB. Broadcast stormC. Duplex mismatchD. Collision
考题
The Ezonexam network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)A.ARPB.CDPC.DHCPD.DNSE.ICMP
考题
A company is experiencing network delays. The network administrator discovers that a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network.How could this action be responsible for the impaired network performance?()A. Connecting a host to the old switch has created a broadcast storm.B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.C. The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network.D. The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network.E. Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network.
考题
A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?()
A.ARPB.CDPC.DHCPD.DNSE.ICMP
考题
A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()A.B.C.D.
考题
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
考题
You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place. Who can authorize the DHCP servers?()A、 Chief information officerB、 IT support staff in BostonC、 IT support staff in New YorkD、 Network administrator in ChicagoE、 Network administrator in New York
考题
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
考题
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter
考题
Controlling costs that are associated with network issues, keeping unexpected problems from affecting productivity, and achieving business goals are characteristics of which cisco offering?()A、cisco SMARTnet serviceB、cisco captial financingC、cisco smart business roadmapD、cisco network optimization service
考题
A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A、 That there are no DHCP relay serversB、 That the user account on Active Directory is not lockedC、 That the network card driver is not installed incorrectlyD、 The network connection is functioning
考题
Several remote sales employees, who have come into the office this week, report that they are unable to get on the Internet, but no other users have reported similar issues. The help desk hasescalated the issue and the case notes state that the users have IP addresses that begin with 169. Which of the following should the system administrator check FIRST?()A、DHCP serverB、Network switchesC、DNS serverD、Core router
考题
An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs
考题
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A、tracerouteB、tracertC、ifconfigD、ipconfig
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
考题
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic
考题
In a TCP/IP network, which of the following protocols is involved when a user issues a ping command?()A、TCPB、UDPC、ICMPD、SMTP
考题
单选题A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A
That there are no DHCP relay serversB
That the user account on Active Directory is not lockedC
That the network card driver is not installed incorrectlyD
The network connection is functioning
考题
单选题A network administrator repeatedly receives support calls about network issues. After investigating the issues, the administrator finds that the source NAT pool is running out of addresses.To be notified that the pool is close to exhaustion, what should the administrator configure?()A
Use the pool-utilization-alarm raise-threshold under the security nat source stanza.B
Use a trap-group with a category of services under the SNMP stanza.C
Use an external script that will run a show command on the SRX Series device to see when the pool is close to exhaustion.D
Configure a syslog message to trigger a notification when the pool is close to exhaustion.
考题
多选题An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()ASetting up a custom community nameBConfiguring the network to block traffic on port 161CConfiguring the Windows Firewall to block port 161DSetting SNMP to read only on the devicesEInstalling new MIBs
考题
单选题Users are reporting that they are still experiencing network issues even though a fix was recentlyapplied. Which of the following troubleshooting methodology steps is the administrator using?()A
Escalating the problemB
Testing the solution and identifying the effectsC
Continuing to gather information about the same symptomsD
Documenting the solution and the entire process
考题
多选题A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? ()AARPBCDPCDHCPDDNSEICMP
热门标签
最新试卷