网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

As a network administrator, can you tell me what the root guard feature provides in a bridgednetwork?()

  • A、It ensures that BPDUs sent by the root bridge are forwarded in a timely manner
  • B、It enforces the root bridge placement in the network
  • C、It ensures that all ports receiving BPDUs from the root bridge are in the forwarding state.
  • D、It ensures that the bridge is elected as root bridge in the network.

参考答案

更多 “As a network administrator, can you tell me what the root guard feature provides in a bridgednetwork?()A、It ensures that BPDUs sent by the root bridge are forwarded in a timely mannerB、It enforces the root bridge placement in the networkC、It ensures that all ports receiving BPDUs from the root bridge are in the forwarding state.D、It ensures that the bridge is elected as root bridge in the network.” 相关考题
考题 文中( 2 )处正确的答案是( )。A.network stationsB.network clientsC.network devicesD.network seI'vers

考题 文中( 4 )处正确的答案是( )。A.network growthB.network structureC.network architectureD.network servers

考题 ●The Simple Network Management Protocol (SNMP)is an (71) protocol that facilitates the exchange of management information between (72) .It is part of the Transmission Control Protocol/Internet Protocol(TCP/IP) protocol suite.SNMP enables network (73) to manage network performance, find and sole network problems,and plan for (74) .An SNMP-managed network consists of three key components:managed devices , (75) ,and network-management systems .(71) A.Physical LayerB.Link LayerC.Network LayerD.Transport Layer(72) A.network stationsB.network clientsC.network devicesD.network servers(73) A.serversB.administratorsC.computersD.routers(74) A.network growthB.network structureC.network architectureD.network servers(75) A.administratorsB.agentsC.managersD.servers

考题 WhichofthefollowingClassAnetworksisreservedfor"privatenetworks"useonly?() A.network10.0.0.0B.network127.0.0.0C.network129.135.0.0D.network192.168.0.0

考题 Refer to the exhibit. The routing protocols EIGRP and OSPF have been configured as indicated in the exhibit. Given the partial configuration of router R2, which network will be present in th e routing table of R4?()A. Network BB. Network A and Network BC. Network AD. neither Network A nor Network B

考题 How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? () A. 64 network and 4 hostsB. 4 network and 64 hostsC. 2 network and 62 hostsD. 62 network and 2 hosts

考题 What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()A、The network was originated via redistribution of an interior gateway protocol into BGPB、The network was defined by a static routeC、The network was originated via a network or aggregate commandD、The network was learned via EBGPE、The network was learned via IBGP

考题 What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()A、The network was originated via redistribution of an interior gateway protocol into BGPB、The network was defined by a static routeC、The network was learned via IBGPD、The network was learned via EBGPE、The network was originated via a network or aggregate command

考题 What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when using the "show ip bgp" c ommand?()A、The network was originated via redistribution of an interior gateway protocol into BGP.B、The network was defined by a static route.C、The network was learned via IBGP.D、The network was learned via EBGP.E、The network was originated via a network or aggregate command.

考题 How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()A、64 network and 4 hostsB、4 network and 64 hostsC、2 network and 62 hostsD、62 network and 2 hosts

考题 Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network.  You need to ensure that the computer is able to connect to the wireless network.  What should you do?()A、Change the Network Category setting of the wireless connection to Public.B、Enable the Internet Connection Sharing feature on the wireless network adapter.C、Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.D、Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.

考题 Which of the following Class A networks is reserved for "private networks" use only?()A、network 10.0.0.0B、network 127.0.0.0C、network 129.135.0.0D、network 192.168.0.0

考题 You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A、Content storage networkingB、Network optimizationC、Network managementD、Network security

考题 What does a router do?()A、Routes traffic down alternative paths and connects the local-area network (LAN) to the wide- area network (WAN)B、Reads Media Access Control (MAC) addresses to forward messages to the correct location and connects the local-area network (LAN) to the wide-area network (WAN)C、Stores data on the network and connects the local-area network (LAN) to the wide-area network (WAN)D、Broadcasts data to all devices that are connected to it across the local-area network (LAN) and wide-area network (WAN)

考题 Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()A、Optical networkB、Storage-area network (SAN)C、Content delivery network (CDN)D、Network management

考题 How does network integration help businesses keep pace with changing network demands?()A、 addition of strict firewallsB、 limiting Internet accessC、 intelligence on foundation network devicesD、 increased use of network services

考题 Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()A、Optical networkB、Network managementC、Storage-area network (SAN)D、Content delivery network (CDN)

考题 A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

考题 Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft   Online Responder on the internal network.   You need to recommend a secure method for Internet users to verify the validity of individual certificates.   The solution must minimize network bandwidth. What should you recommend?()A、Deploy a subordinate CA on the perimeter network.B、Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.C、Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication  requests to a server on the internal network.D、Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS  to redirect requests to the Online Responder on the internal network.

考题 You are designing a Windows Server 2008 R2 Hyper-V virtualization environment. Your host servers must have the following elements:  A dedicated management network adapter.A dedicated virtual network for child iSCSI network traffic.A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing.  Which adapters should you choose?()A、three network adapters that support 802.1pB、two network adapters that support 802.1q, and one iSCSI host bus adapterC、two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyD、two network adapters that support 802.1q, and one network adapter that supports Jumbo frames

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

考题 多选题What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()AThe network was originated via redistribution of an interior gateway protocol into BGPBThe network was defined by a static routeCThe network was originated via a network or aggregate commandDThe network was learned via EBGPEThe network was learned via IBGP

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

考题 单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A The network uses MAC filteringB The network uses WEPC The network uses SSID broadcastD The network uses WPA

考题 单选题How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()A 64 network and 4 hostsB 4 network and 64 hostsC 2 network and 62 hostsD 62 network and 2 hosts

考题 单选题Which option describes the default roles available to RBAC on Cisco Nexus switches?()A  admin, operator, network-admin, and network-operatorB  admin, read-only, network-admin, and network-operatorC  vdc-admin, vdc-operator, network-admin, and network-operatorD  vdc-admin, vdc-operator, network-admin, and network-operator (for Nexus 7000) and network- admin and network-operator (for other Nexus switches)E  admin and read-only

考题 多选题What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when using the "show ip bgp" c ommand?()AThe network was originated via redistribution of an interior gateway protocol into BGP.BThe network was defined by a static route.CThe network was learned via IBGP.DThe network was learned via EBGP.EThe network was originated via a network or aggregate command.

考题 多选题What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()AThe network was originated via redistribution of an interior gateway protocol into BGPBThe network was defined by a static routeCThe network was learned via IBGPDThe network was learned via EBGPEThe network was originated via a network or aggregate command