网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()
- A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command
- B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command
- C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them
- D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security
参考答案
更多 “A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security” 相关考题
考题
A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back.What is causing the problem?()A. The host needs to open the telnet port.B. The host needs a route for the translated address.C. The administrator must use a proxy-arp policy for the translated address.D. The administrator must use a security policy, which will allow communication between the zones.
考题
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?()
A.IDSB.IPSC.FirewallD.Managed PKI
考题
A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A. RIP v1B. RIP v2C. IGRPD. OSPFE. EIGRP
考题
You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()
A. Configuration registerB. NVRAMC. Boot flashD. CMOSE. Flash
考题
What are three factors a network administrator must consider before implementing Netflow in the network?()
A.CPU utilizationB.where Netflow data will be sentC.number of devices exporting Netflow dataD.port availabilityE.SNMP versionF.WAN encapsulation
考题
A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A、RIP v1B、RIP v2C、IGRPD、OSPFE、EIGRP
考题
You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()A、Configuration registerB、NVRAMC、Boot flashD、CMOSE、Flash
考题
What are three factors a network administrator must consider before implementing Netflow in the network?()A、CPU utilizationB、where Netflow data will be sentC、number of devices exporting Netflow dataD、port availabilityE、SNMP versionF、WAN encapsulation
考题
A network administrator receives an error message while tring to configure the Ethernet interface of arouter with IP address 10.24.24.24/29.which statement explains the reason for this issue?()A、The address is a broadcast addressB、The Ehernet interface is faultyC、VLSM-capable routing protocols must be enable first on the router.D、This address is a network address.
考题
An administrator is configuring a Catalyst switch with VLAN information that must be automatically distributed to other Catalyst switches in the network. What conditions must be met in order for the VLANs configured on this switch to be automatically configured on the other switches?()A、The switch that will share its VLAN configuration must be in VTP server mode.B、The switches must be in the same VTP domain.C、The switch that will share the VLAN information must be configured as the root bridge.D、The switches must be connected over VLAN trunks.E、The switches must be configured to use the same STP version.F、The switches must have VTP pruning activated.
考题
The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.
考题
A natural disaster has occurred and the administrator must return the network to a healthy status.Which of the following should the administrator do in this case?()A、Follow the emergency action plan.B、Wait for an issue to be reported.C、Establish a new baseline.D、Determine if escalation is necessary.
考题
A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?()A、CAT3 cableB、Serial cableC、Crossover cableD、Rollover cable
考题
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI
考题
An administrator only has one public IP address that must be shared among five employees. Which of the following network schemes should be used?() A、SNATB、SNAPC、NACD、MPLS
考题
The Cluster Administrator wants to use disk heartbeats as a non-IP network. What Volume Group consideration must be accounted for prior to configuring disk heartbeats?() A、 The Volume Group major number must be the same on all nodes.B、 The Shared Volume Group must be created with the Big VG format.C、 The Volume Group must be created as Enhanced Concurrent Capable.D、 The "t factor" must be doubled to create the reserved area for disk hearbeats.
考题
You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.How can you find out about the mailboxes that exceeds 2 GB in size?()A、You must use the Get-MailboxStatistics cmdlet.B、You must use the Test-Mailflow cmdlet.C、You must use the Get-StoreUsageStatistics.D、You must use the Test-ServiceHealth cmdlet.
考题
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to use administrative delegation on a series of cmdlets?()A、You must implement log transactionsB、You must set up new management roleC、You must implement Mailbox journalingD、You must set up a Role Based Access Control (RBAC) role
考题
多选题You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()AConfiguration registerBNVRAMCBoot flashDCMOSEFlash
考题
单选题A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A
RIP v1B
RIP v2C
IGRPD
OSPFE
EIGRP
考题
单选题You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to allow a room mailbox to automatically take requests for meetings?()A
You must use log transactions.B
You must use Calendar Repair Assistant (CRA).C
You must select the resource booking attendant.D
You must set up Task Scheduler.
考题
多选题Your network consists of three Active Directory forests. Forest trust relationships exist between all forests. Each forest contains one domain. All domain controllers run Windows Server 2008 R2. Your company has three network administrators. Each network administrator manages a forest and the Group Policy objects (GPOs) within that forest. You need to create standard GPOs that the network administrators in each forest will use. The GPOs must meet the following requirements: èThe GPOs must only contain settings for either user configurations or computer configurations. èThe number of GPOs must be minimized. Which two actions should you perform?()AExport the new GPOs to .cab files. Ensure that the .cab files are available to the network administrator in each forest.BCreate two new GPOs. Configure both GPOs to use the required user configurations and the required computer configurations.CCreate two new GPOs. Configure one GPO to use the required user configuration. Configure the other GPO to use the required computer configuration.DBack up the Sysvol folder that is located on the domain controller where the new GPOs were created. Provide the backup to the network administrator in each forest.
考题
单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network contains a Mailbox server named XXX-EX10.What action must you take to have mailboxes retained for 8 weeks after deletion?()A
You must create a legal hold.B
You must change the mailbox database properties.C
You must create Transport Protection Rules.D
You must create Personal archives.
考题
单选题In order to troubleshoot an issue with the Testking frame relay network, you log into a remote router via a telnet session and issue the command "debug frame-relay lmi". After a long wait, you fail to see any output. What could be the cause of this problem?()A
The IP addresses are configured incorrectly.B
Frame Relay LMI messages not displayed in real time.C
The administrator must issue the enable frame-relay lmi debug command.D
The administrator must issue the terminal monitor command.E
Debug messages can only be received once through the console port.F
The administrator must issue the show frame-relay lmi vty 0 4 command
考题
单选题You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.The Xxx network has two Mailbox servers named XXX-EX01 and XXX-EX02.You are busy implementing a database availability group (DAG). What actions must you take to guarantee mailbox databases replications on XXX-EX01 and XXXEX02?()A
You must implement a custom Send connectorB
You must install the Active Directory Connector (ADC)C
You must change the Database pathsD
You must change the membership list of the DAG
考题
单选题A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()A
The host needs to open the telnet port.B
The host needs a route for the translated address.C
The administrator must use a proxy-arp policy for the translated address.D
The administrator must use a security policy, which will allow communication between the zones.
考题
单选题A network administrator receives an error message while tring to configure the Ethernet interface of a router with IP address 10.24.24.24/29.which statement explains the reason for this issue?()A
The address is a broadcast addressB
The Ehernet interface is faultyC
VLSM-capable routing protocols must be enable first on the router.D
This address is a network address.
考题
单选题You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment. Xxx has recently added a distribution group named KingDistribute.How can you allow a user named Dean Austin to manage membership of KingDistribute only but not of the other groups?()A
You must create a new direct role assignment for Dean Austin.B
You must view the properties of KingDistribute the add Dean Austin to it.C
You must add Dean Austin to KingDistribute’s Managed by list.D
You must change the default sharing policy.
热门标签
最新试卷