网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()

A.Port security needs to be globally enabled.

B.Port security needs to be enabled on the interface.

C.Port security needs to be configured to shut down the interface in the event of a violation.

D.Port security needs to be configured to allow only one learned MAC address.

E.Port security interface counters need to be cleared before using the show command.

F.The port security configuration needs to be saved to NVRAM before it can become active.


参考答案

更多 “ Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()A.Port security needs to be globally enabled.B.Port security needs to be enabled on the interface.C.Port security needs to be configured to shut down the interface in the event of a violation.D.Port security needs to be configured to allow only one learned MAC address.E.Port security interface counters need to be cleared before using the show command.F.The port security configuration needs to be saved to NVRAM before it can become active. ” 相关考题
考题 Refer to the exhibit. The routing protocols EIGRP and OSPF have been configured as indicated in the exhibit. Given the partial configuration of router R2, which network will be present in th e routing table of R4?()A. Network BB. Network A and Network BC. Network AD. neither Network A nor Network B

考题 Refer to the exhibit. BigBids Incorporated is a worldwide auction provider. The network uses EIGRP as its routing protocol throughout the corporation. The network administrator does not understand the convergence of EIGRP. Using the output of the show ip eigrp topology all - links command, answer the administrator‘s questions.Which three networks is the router at 172.17.10.2 directly connected to?()A. 172.17.0.0/30B. 172.17.1.0/24C. 172.17.2.0/24D. 172.17.3 .0/25E. 172.17.3.128/25F. 172.17.10.0/24

考题 Refer to the exhibit. ROUTE.com is planning to implement a secure OSPF network to support traffic between clients on the 172.16.10.0/24 network and the file server on the 172.16.20./24 network. You have been asked to review the implementation and verification plans for this OSPF project. Which statement about the plan is true? ()A. It is complete as writtenB. It should include a task that verifie s that the interarea routes are using the proper MEDC. It should include a task that verifies that load sharing is active on R1 and R4D. It should include a task that verifies that all redundant links will become active when the primary links are sh ut down

考题 Refer to the exhibit. ROUTE.com is planning to implement a new secure OSPF network to support traffic between clients on the 172.16.10.0/24 network and the file server on th e 172.16.20./24 network. You have been asked to review the implementation plan for the OSPF project. Which statement about the plan is true?()A. It is complete as written.B. It should include a task that shuts down all unused interfaces.C. It sho uld include tasks that enable and verify OSPF authentication.D. It should include a task that establishes a file transfer baseline before and after the configuration is changed.

考题 Refer to the exhibit. The partial configuration for an OSPF ASBR and an Area 0 ABR is shown. Assume the OSPF configurations throughout the network are operable. Which statement about these configurations is true? ()A. The ASBR route - maps are basically useless, because there are no deny prefix - lists.B. LSA Type 5s wil l not be received by the ABR from the ASBR.C. The OSPF backbone will not learn any RFC 1918 addresses.D. The matched prefix - list addresses will be given a metric of 255, which is essentially unreachable.

考题 Refer to the above exhibit. Why is the 140.140.0.0 network not used as the gateway of last resort even though it is configured first?() A.The last default - network statement will always be preferred.B.A route to the 140.140.0.0 network does not exist in the routing table.C.Default - network selection will always prefer the statement with the lowest IP address.D.A router will load balance across multiple default - networks; repeatedly issuing the show ip route command would show the gateway of last resort changing between the two networks.

考题 Refer to the exhibit. ROUTE.com has just implemented this EIGRP network. A network administrator came to you for advice while trying to implement load balancing across part of their EIGRP network. If the variance value is configured as 2 on all routers and all o ther metric and K values are configured to their default values, traffic from the Internet to the data center will be load balanced across how many paths? ()A. 1B. 2C. 3D. 4E. 5

考题 Refer to the exhibit. By default, when RTB passes BGP advertisements from RTA about network 192.168.2.0 to RTC, what address will be listed as the next - hop address? () A. 10.1.1.2B. 192.168.1.49C. 10.1.1.1D. 192.168.1.50

考题 Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?() A.255.255.255.0B.255.255.254.0C.255.255.252.0D.255.255.248.0

考题 Refer to the exhibit. An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is the problem?() A.data link layerB.application layerC.access layerD.session layerE.network layer

考题 Refer to the exhibit. Give this output for SwitchC, what should the network administrator‘s next action be?() A.Check the trunk encapsulation mode for SwitchC‘s fa0/1 port.B.Check the duplex mode for SwitchC‘s fa0/1 port.C.Check the duplex mode for SwitchA‘s fa0/2 port.D.Check the trunk encapsulation mode for SwitchA‘s fa0/2 port.

考题 Refer to the exhibit. The two exhibit devices are the only Cisco devices on the network. The serial network between the two devices has a mask of 255.255.255.252. Given the output that is shown, what three statements are true of these devices? ()A.The Manchester serial address is 10.1.1.1B.The Manchester serial address is 10.1.1.2C.这个Manchester路由器串口地址为:10.1.12D.The London router is a Cisco 2610.E.The Manchester router is a Cisco 2610.F.The CDP information was received on port Serial0/0 of the Manchester router.G.The CDP information was sent by port Serial0/0 of the London Router.

考题 Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()A、A level 5 password is not setB、The vty password is missingC、The console password is missingD、An ACL is blocking Telnet access

考题 Refer to the exhibit.   What are three of the basic components of a VoIP network?()A、software voice applicationsB、multipoint control unit (MCU)  C、gatekeeper  D、call agentE、interactive voice response (IVR) systems  F、softphones

考题 Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()A、Port security needs to be globally enabled.B、Port security needs to be enabled on the interface.C、Port security needs to be configured to shut down the interface in the event of a violation.D、Port security needs to be configured to allow only one learned MAC address.E、Port security interface counters need to be cleared before using the show command.F、The port security configuration needs to be saved to NVRAM before it can become active.

考题 You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B、Start the RunAs service and configure the service to start automatically.C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D、Use Scheduled Tasks to configure the task to run under the security context of your account.

考题 Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.

考题 You are a network administrator for ExamSheet.net's Windows 2000 network.  You use a user account named User1 to log on tot a Windows 2000 Professional computer. The computer is used by different students in a classroom. User1 does not have administrative rights. However, you prefer to use this account for your daily activities. Using the Task Scheduler you schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. You configure the task to run as the administrator account.  After the task was scheduled to have run you open the Task Scheduler and discover a status of "Could not start" for the task. You also discover account logon failure audit events in the computer's Security log.You want the scheduled task to successfully run AddUsers.cmd. You want to accomplish this with the least amount of administrative effort.  What should you do?()A、Schedule the task using theATcommand.B、Reenter the password for the administrator account using the Task Scheduler.C、Log on with an administrative account and reschedule the task.D、Log on by using the local Administrator account. Then schedule the task to run under User1.

考题 单选题Refer to the exhibit. Given the output for this command, if the router ID has not been manually set, what router ID will OSPF use for this RouterD?()A 10.1.1.2B 10.154.154.1C 172.16.5.1D 192.168.5.3

考题 单选题Refer to the exhibit. An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is the problem?()A data link layerB application layerC access layerD session layerE network layer

考题 多选题To save time configuring some custom network facilities, a junior administrator in your company  attempts to copy some entries from the /etc/inetd.conf file on a Solaris 8 OS server into the /etc/inetd.conf on a Solaris 10 OS server. The junior administrator is unable to determine why services do not start.  Which two commands can you run on the Solaris 10 OS server to start the services?()Ainetconv -fBinetcfg -i /etc/inetd.confCinetcfg -o /etc/inetd.confDinetconv -f -i /etc/inetd.confEinetconv -forceimport -o /etc/inetd.conf

考题 单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A STPB GVRPC SNMPD VTPE DHCP

考题 多选题Refer to the exhibit. Which two statements are correct?()AAll six routes will be installed in the routing tableBTwo routes will be installed in the routing tableCFour routes will be installed in the routing tableDAll the routes were redistributed into BGP from an IGPEAll the routes were originated by BGP with the network command

考题 单选题Refer to the exhibit. What switch proves the spanning-tree designated port role for the network segment that services the printers?()A Switch1B Switch2C Switch3D Switch4

考题 多选题Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()APort security needs to be globally enabled.BPort security needs to be enabled on the interface.CPort security needs to be configured to shut down the interface in the event of a violation.DPort security needs to be configured to allow only one learned MAC address.EPort security interface counters need to be cleared before using the show command.FThe port security configuration needs to be saved to NVRAM before it can become active.

考题 单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A Physically the voice network and the data network are separateB The voice traffic will normally be on a different IP subnet than will the data trafficC End user intervention is necessary to place the phone into the proper VLAND The same security policy should be implemented for both voice and data trafficE The data VLAN must be configured as the native VLAN

考题 多选题Refer to the exhibit.   What are three of the basic components of a VoIP network?()Asoftware voice applicationsBmultipoint control unit (MCU)CgatekeeperDcall agentEinteractive voice response (IVR) systemsFsoftphones

考题 单选题Refer to the exhibit. A network administrator configures a new router and enters the copy startup-config running-config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enter the system configuration dialog as shown. What is the caust of the problem?()A The network administrator faled to save the configuration.B The configuration register is set to 0x2100.C The boot system flash command is missing from the configuration.D The configuraiton register is set to 0x2102.E The router is configured with the boot system startup command.