网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。
- A、VLAN support
- B、compression
- C、authentication
- D、sliding windows
- E、multilink support
- F、quality of service
参考答案
更多 “What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。A、VLAN supportB、compressionC、authenticationD、sliding windowsE、multilink supportF、quality of service” 相关考题
考题
The Ezonexam network administrator wants to use a router named VE1 to segment the local network. What are some of the advantages of using VE1 to segment the network? (Choose two)A. Routers generally cost less than switchesB. Filtering can occur based on Layer 3 informationC. Broadcasts are not forwarded across the routerD. Broadcasts are eliminatedE. Adding a router to the network decreases latencyF. Routers can generally support more LAN ports than switches
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode
考题
What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。
A.VLAN supportB.compressionC.authenticationD.sliding windowsE.multilink supportF.quality of service
考题
A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()A、Logging detect fail-loginB、Login on-failure logC、Login detect login-failure logD、Logging login on-failureE、none of the above
考题
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
考题
You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place. Who can authorize the DHCP servers?()A、 Chief information officerB、 IT support staff in BostonC、 IT support staff in New YorkD、 Network administrator in ChicagoE、 Network administrator in New York
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode
考题
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
考题
As a network administrator, can you tell me what the root guard feature provides in a bridgednetwork?()A、It ensures that BPDUs sent by the root bridge are forwarded in a timely mannerB、It enforces the root bridge placement in the networkC、It ensures that all ports receiving BPDUs from the root bridge are in the forwarding state.D、It ensures that the bridge is elected as root bridge in the network.
考题
Before inserting a new switch in the network,the network administrator checks that the VTP domain name is correct,the VTP mode is set to server, and revision is lower than the switches in the network. The administrator then configures interfaces and trunks,erases existing VLANs,and connects the switch to the network. Following that procedure,there is no connectivity in the network. What is a possible cause of this problem?()A、Because the configuration revision of the new switches is lower than the rest of the network, it can change the VLAN database of the other switches.B、As a VTP server, the new switch deleted all VLANs of the network.C、Erasing VLANs increases the VTP configuration revision.D、Since the configuration revision of the network is higher than the new switch, the VLAN database was automatically synchronized.
考题
A network administrator is viewing the control plane traffic flowing through their network in real-time. What built-in feature enabled this ability?()A、call homeB、wiresharkC、ethanalyzerD、NX-OS
考题
You are subneting in the network, out of network address,what’s feature can add one more address?
考题
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable
考题
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable
考题
While reviewing cluster logs, and administrator notice that an event, network_down rs232a, occurred on the previous day. After verifying the physical network connections and device states, what command can be used to verify the cluster state?()A、 clstatB、 cllsifC、 clsnapshotinfoD、 clcheck_server
考题
An administrator named Admin1 plans to deploy operating systems to the planned VMs. You need to recommend a configuration plan for the VMs. The plan must ensure that the operating systems can be deployed to the VMs. What should you include in the recommendation?()A、a synthetic network adapterB、an emulated network adapterC、virtual machine queue (VMQ)D、Virtual Machine Chimney
考题
单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A
Default gatewayB
The ports on the switchC
Port security on the server's switch portD
Ethernet cable
考题
问答题You are subneting in the network, out of network address,what’s feature can add one more address?
考题
多选题What can a network administrator utilize by using PPP Layer 2 encapsulation? (Choose three.)()AVLAN supportBcompressionCauthenticationDsliding windowsEmultilink supportFquality of service
考题
单选题A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A
applicationB
presentationC
sessionD
transportE
internetF
datalink
考题
单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A
BPDUB
Port securityC
RSTPD
STPE
VTPF
Blocking mode
考题
单选题While reviewing cluster logs, and administrator notice that an event, network_down rs232a, occurred on the previous day. After verifying the physical network connections and device states, what command can be used to verify the cluster state?()A
clstatB
cllsifC
clsnapshotinfoD
clcheck_server
考题
单选题A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()A
Logging detect fail-loginB
Login on-failure logC
Login detect login-failure logD
Logging login on-failureE
none of the above
考题
多选题What are two security appliances that can be installed in a network? ()AATMBIDSCIOSDIOXEIPSFSDM
考题
单选题You are the network administrator at TestKing. TestKing has been provided withthe network address 165.100.27.0/24. The TestKing CEO wants to know how many subnetworks this address provides, and how many hosts can be supported on each subnet. What would your reply be?()A
One network with 254 hosts.B
254 networks with 254 hosts per network.C
65,534 networks with 255 hosts per network.D
30 networks with 64 hosts per network.E
254 networks with 65,534 per network.
考题
单选题The network administrator needs to address seven LANs. RIP version 1 is the only routing protocol in use on the network and subnet 0 is not being used. What is the maximum number of usable IP addresses that can be supported on each LAN if the organization is using one class C address block?()A
8B
6C
30D
32E
14F
16
考题
单选题An administrator named Admin1 plans to deploy operating systems to the planned VMs. You need to recommend a configuration plan for the VMs. The plan must ensure that the operating systems can be deployed to the VMs. What should you include in the recommendation?()A
a synthetic network adapterB
an emulated network adapterC
virtual machine queue (VMQ)D
Virtual Machine Chimney
热门标签
最新试卷