考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode
考题
An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A. Router routes traffic between different networks and a switch does notB. The new switch is faulty and needs to be replaced and configured correctlyC. The firewall needs to be setup to allow traffic to reach the InternetD. The switch needs to be setup to forward data traffic to the Internet
考题
A( ) is a computer commtuucation network in a local area, which connects various computers.A.IntemetB.MANC.WAND.LAN
考题
What does a router do?()
A.Routes traffic down alternative paths and connects the local-area network (LAN) to the wide- area network (WAN)B.Reads Media Access Control (MAC) addresses to forward messages to the correct location and connects the local-area network (LAN) to the wide-area network (WAN)C.Stores data on the network and connects the local-area network (LAN) to the wide-area network (WAN)D.Broadcasts data to all devices that are connected to it across the local-area network (LAN) and wide-area network (WAN)
考题
What does a router do if it has no EIGRP feasible successor route to a destination network and the successor route to that destination network is inactive status?()
A. It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.B. It sends a copy of its neighbor table to all adjacent routers.C. It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.D. It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.
考题
The local area network also connects to a wide area network that allow a message ______ across the country or to other countries.A.is sent
B.to be sent
C.sending
D.send
考题
The local area network also connects to a wide area network that allow a message ___ across the country or to other countries.A.send
B.sending
C.to be sent
D.is sent
考题
Which of the following storage technologies connects by TCP/IP and can slow down network traffic?()A、SANB、Optical jukeboxC、NASD、Tape library
考题
What is A WAN?()A、A network that connects client devices wirelessly using radio wavesB、A network that crosses metropolitan, regional, or national boundariesC、A network that is restricted.to a single building ,a group of buildings, or even a single roomD、A network that encompasses an entire city or metropolitanared. and. connects multiple LANs
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode
考题
What does a router do?()A、Routes traffic down alternative paths and connects the local-area network (LAN) to the wide- area network (WAN)B、Reads Media Access Control (MAC) addresses to forward messages to the correct location and connects the local-area network (LAN) to the wide-area network (WAN)C、Stores data on the network and connects the local-area network (LAN) to the wide-area network (WAN)D、Broadcasts data to all devices that are connected to it across the local-area network (LAN) and wide-area network (WAN)
考题
How does a switch respond when it receives a message?()A、It reads the Layer-5 information and sends the message directly to the intended computer.B、It reads the Media Access Control (MAC) address and broadcasts the message to all the computers that are connected to the switch.C、It reads the Media Access Control (MAC) address and sends the message directly to the intended computer.D、It reads the Layer-5 information and broadcasts the message to all the computers that are connected to the switch.
考题
What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router B、to control broadcast traffic through a router C、to filter traffic as it passes through a router D、to filter traffic that originates from the router E、to replace passwords as a line of defense against security incursions
考题
What is A WAN?()A、A network that is restricted.to A single building ,A group of buildings, or even A single room.B、A network that encompasses an entire city or metropolitanared and connects multiple LANs.C、A network that connects client devices wirelessly using radio waves.D、A network that crosses metropolitan, regional, or national boundaries.
考题
Wide Area Network (WAN) is a computer network that covers a broad areA. Which statement is correct for wide-area network (WAN)?()A、Connects client devices wireless protocolB、Crosses metropolitan, regional, or national boundariesC、Limited in a single building, a group of buildings, or even a single roomD、Encompasses an entire city or metropolitan area and connects multiple local-area networks (LANs)
考题
An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A、Router routes traffic between different networks and a switch does notB、The new switch is faulty and needs to be replaced and configured correctlyC、The firewall needs to be setup to allow traffic to reach the InternetD、The switch needs to be setup to forward data traffic to the Internet
考题
You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks
考题
单选题Which of the following storage technologies connects by TCP/IP and can slow down network traffic?()A
SANB
Optical jukeboxC
NASD
Tape library
考题
单选题Wide Area Network (WAN) is a computer network that covers a broad areA. Which statement is correct for wide-area network (WAN)?()A
Limited in a single building, a group of buildings, or even a single roomB
Crosses metropolitan, regional, or national boundariesC
Encompasses an entire city or metropolitan area and connects multiple local-area networks (LANs)D
Connects client devices wireless protocol
考题
单选题What does a router do if it has no EIGRP feasible successor route to a destination network and the successor route to that destination network is inactive status?()A
It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.B
It sends a copy of its neighbor table to all adjacent routers.C
It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.D
It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.
考题
单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A
Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB
Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks
考题
单选题At Layer 2 of the OSI model, which component connects a host to the network media?()A
HubB
SwitchC
BridgeD
NICE
Transceiver
考题
单选题What does a router do?()A
Stores data on the network and connects the local-area network (LAN) to the wide-area network (WAN)B
Routes traffic down alternative paths and connects the local-area network (LAN) to the wide- area network (WAN)C
Broadcasts data to all devices that are connected to it across the local-area network (LAN) and wide-area network (WAN)D
Reads Media Access Control (MAC) addresses to forward messages to the correct location and connects the local-area network (LAN) to the wide-area network (WAN)
考题
单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A
BPDUB
Port securityC
RSTPD
STPE
VTPF
Blocking mode
考题
单选题An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A
Router routes traffic between different networks and a switch does notB
The new switch is faulty and needs to be replaced and configured correctlyC
The firewall needs to be setup to allow traffic to reach the InternetD
The switch needs to be setup to forward data traffic to the Internet
考题
单选题What is A WAN?()A
A network that connects client devices wirelessly using radio wavesB
A network that crosses metropolitan, regional, or national boundariesC
A network that is restricted.to a single building ,a group of buildings, or even a single roomD
A network that encompasses an entire city or metropolitanared. and. connects multiple LANs
考题
单选题How does a switch respond when it receives a message?()A
It reads the Layer-5 information and sends the message directly to the intended computer.B
It reads the Media Access Control (MAC) address and broadcasts the message to all the computers that are connected to the switch.C
It reads the Media Access Control (MAC) address and sends the message directly to the intended computer.D
It reads the Layer-5 information and broadcasts the message to all the computers that are connected to the switch.
考题
单选题What is A WAN?()A
A network that is restricted.to A single building ,A group of buildings, or even A single room.B
A network that encompasses an entire city or metropolitanared and connects multiple LANs.C
A network that connects client devices wirelessly using radio waves.D
A network that crosses metropolitan, regional, or national boundaries.