网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()

  • A、a router with subinterfaces configured on the physical interface that is connected to the switch
  • B、a router with an IP address on the physical interface connected to the switch
  • C、a switch with an access link that is configured between the switches
  • D、a switch with a trunk link that is configured between the switches

参考答案

更多 “On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A、a router with subinterfaces configured on the physical interface that is connected to the switchB、a router with an IP address on the physical interface connected to the switchC、a switch with an access link that is configured between the switchesD、a switch with a trunk link that is configured between the switches” 相关考题
考题 As they access the corporate network, mobile and remote users inadvertently can infect the network with(72) and worms acquired from unprotected public networks.A.virusesB.diseaseC.germsD.sickness

考题 The 201.145.32.0 network is subnetted using a /26 mask. How many networks and IP hosts per network exists using this subnet mask?A.4 networks and 64 hostsB.64 networks and 4 hostsC.4 networks and 62 hostsD.62 networks and 2 hostsE.6 network and 30 hosts

考题 You need subnet a Ezonexam network segment. How many subnetworks and hosts are available per subnet if you apply a /28 mask to the 210.10.2.0 class C network?A. 30 networks and 6 hosts.B. 6 networks and 30 hosts.C. 8 networks and 32 hosts.D. 32 networks and 18 hosts.E. 16 networks and 14 hosts.F. None of the above

考题 You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this network? (Select all valid answers)A. There are 254 usable subnets.B. There are 256 usable hosts per subnet.C. There are 50 usable subnets.D. There are 254 usable hosts per subnet.E. There are 24 usable hosts per subnet.F. There is one usable network.

考题 How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? () A. 64 network and 4 hostsB. 4 network and 64 hostsC. 2 network and 62 hostsD. 62 network and 2 hosts

考题 TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()A. TestKing# show eigrp entriesB. TestKing# show protocolsC. TestKing# debug eigrp routesD. TestKing# show ip route eigrpE. TestKing# show route eigrp

考题 For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。 A.IPB.ICMPC.TCPD.UDP

考题 How many subnetworks and hosts are available per subnet if you apply a /28 mask to the 210.10.2.0 class C network?()A、30 networks and 6 hosts.B、6 networks and 30 hosts.C、8 networks and 32 hosts.D、32 networks and 18 hosts.E、14 networks and 14 hosts.F、None of the above

考题 In which situation would the use of a static route be appropriate?()A、To configure a route to the first Layer 3 device on the network segment.B、To configure a route from an ISP router into a corporate network.C、To configure a route when the administrative distance of the current routing protocolis too low.D、To reach a network is more than 15 hops away.E、To provide access to the Internet for enterprise hosts.

考题 How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()A、64 network and 4 hostsB、4 network and 64 hostsC、2 network and 62 hostsD、62 network and 2 hosts

考题 When one connection to a host fails in a full mesh network, which of the following is true?()A、All hosts can communicate.B、No hosts can communicate.C、Half of the hosts will lose communication.D、Only the two hosts between the failed connection will lose communication.

考题 You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this network?()A、There are 254 usable subnets.B、There are 256 usable hosts per subnet.C、There are 50 usable subnets.D、There are 254 usable hosts per subnet.E、There are 24 usable hosts per subnet.F、There is one usable network.

考题 You are planning to connect your three branch offices to the corporate site via Frame Relay. The first branch office has been assigned the network 10.1.0.0/16, the second 10.2.0.0/16, the third 10.3.0.0/16, and the corporate headquarters uses 10.0.0.0/16. You would like to summarize all branch and corporate networks into a single route at the corporate site. Which network address and subnet mask should you choose?()  A、 10.0.0.0/24B、 10.0.0.0/16C、 10.0.0.0/14D、 10.0.0.0/15

考题 The 201.145.32.0 network is subnetted using a /26 mask. How many networks and IP hosts per network exists using this subnet mask?()A、4 networks with 64 hostsB、64 networks and 4 hostsC、2 networks and 62 hostsD、62 networks and 2 hostsE、6 network and 30 hosts

考题 Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.

考题 Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

考题 You are designing a strategy to ensure that DNS queries always take the most efficient route to get resolved.  Which action or actions should you perform?()A、 Configure conditional forwarding on the corporate DNS servers to point the development DNS servers.B、 Configure conditional forwarding on the development DNS servers to point the corporate DNS servers.C、 Configure conditional forwarding on the perimeter network DNS servers to point the corporate and development DNS servers.D、 Configure forwarding on the corporate and development DNS servers to point the perimeter network DNS servers.E、 Disable root hints on the perimeter network DNS Servers.

考题 Your network contains a Windows Server 2008 R2 server that functions as a file server. All users have laptop computers that run Windows 7.   The network is not connected to the Internet. Users save files to a shared folder on the server. You need to design a data provisioning solution that meets the following requirements:   èUsers who are not connected to the corporate network must be able to access the files and the folders in the corporate network.    èUnauthorized users must not have access to the cached files and folders. What should you do?()A、Implement a certification authority (CA). Configure IPsec domain isolation.B、Implement a certification authority (CA). Configure Encrypting File System (EFS) for the drive that hosts the files.C、Implement Microsoft SharePoint Foundation 2010. Enable Secure Socket Layer (SSL) encryption.D、Configure caching on the shared folder. Configure offline files to use encryption.

考题 Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible.  What should you do()?  A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connectionsC、Configure VPN connections to use MS-CHAP v2 authenticationD、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP

考题 单选题How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()A 64 network and 4 hostsB 4 network and 64 hostsC 2 network and 62 hostsD 62 network and 2 hosts

考题 单选题TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()A TestKing# show eigrp entriesB TestKing# show protocolsC TestKing# debug eigrp routesD TestKing# show ip route eigrpE TestKing# show route eigrp

考题 单选题The 201.145.32.0 network is subnetted using a /26 mask. How many networks and IP hosts per network exists using this subnet mask?()A 4 networks with 64 hostsB 64 networks and 4 hostsC 2 networks and 62 hostsD 62 networks and 2 hostsE 6 network and 30 hosts

考题 单选题On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A a router with subinterfaces configured on the physical interface that is connected to the switchB a router with an IP address on the physical interface connected to the switchC a switch with an access link that is configured between the switchesD a switch with a trunk link that is configured between the switches

考题 单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()A IPB ICMPC TCPD UDP

考题 单选题In which situation would the use of a static route be appropriate?()A To configure a route to the first Layer 3 device on the network segment.B To configure a route from an ISP router into a corporate network.C To configure a route when the administrative distance of the current routing protocolis too low.D To reach a network is more than 15 hops away.E To provide access to the Internet for enterprise hosts.

考题 单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A  Create an IPsec Enforcement Network policyB  Create an 802.1X enforcement network policyC  Create a wired network (IEEE 802.3) Group PolicyD  Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy

考题 单选题You are the network administrator at TestKing. TestKing has been provided withthe network address 165.100.27.0/24. The TestKing CEO wants to know how many subnetworks this address provides, and how many hosts can be supported on each subnet. What would your reply be?()A One network with 254 hosts.B 254 networks with 254 hosts per network.C 65,534 networks with 255 hosts per network.D 30 networks with 64 hosts per network.E 254 networks with 65,534 per network.