网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?()

A.ping address

B.tracert address

C.traceroute address

D.arp address


参考答案

更多 “ Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?() A.ping addressB.tracert addressC.traceroute addressD.arp address ” 相关考题
考题 You need to perform. some initial configuration tasks on a new Ezonexam switch. What is the purpose of assigning an IP address to a switch?A.To provide local hosts with a default gateway addressB.To allow remote management of the switch.C.To allow the switch to respond to ARP requests between two hostsD.To ensure that hosts on the same LAN can communicate with each other.E.None of the above

考题 A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()A. Micro segmentationB. Transparent switchingC. peer-to-peer networkingD. port securityE. store-and-forward switchingF. virtual local area networks

考题 Which command can be used from a PC to verfy the connectivity between host that connect through path?() A.tracert addressB.ping addressC.arp addressD.traceroute address

考题 For which type of connection should a straight-through cable be used?() A.switch to switchB.switch to hubC.switch to routerD.hub to hubE.router to PC

考题 Which two statements are true regarding the USING clause in table joins?()A、It can be used to join a maximum of three tables B、It can be used to restrict the number of columns used in a NATURAL join C、It can be used to access data from tables through equijoins as well as nonequijoins D、It can be used to join tables that have columns with the same name and compatible data types

考题 For which type of connection should a straight-through cable be used?()A、switch to switchB、switch to hubC、switch to routerD、hub to hubE、router to PC

考题 Hosts on the same VLAN can communicate with each other but are unable to communicate with hosts on different VLANs. What is needed to allow communication between VLANs()。A、a switch with a trunk link that is configured between the switchesB、a router with an IP address on the physical interface that is connected to the switchC、a switch with an access link that is configured between the switchesD、a router with subinterfaces configured on the physical interface that is connected to the switch

考题 What is the use of an "all configuration" backup in Cisco UCS?()A、 Can be used to migrate from a 6120 to a 6140 and retain the same service profilesB、 Can only be used on the fabric interconnect on which it was createdC、 Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster informationD、 Can be used to match firmware versions between 6120 and 6140 during a migration

考题 Which three statements describe the configuration change management feature in DCNM LAN? ()A、 Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.B、 DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.C、 You can archive a maximum of 50 configuration versions per managed device.D、 Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.E、 Device-running configuration will be archived only if it differs from the last archived version.

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

考题 Which router IOS commands can be used to troubleshoot LAN connectivity problems?()A、pingB、tracertC、ipconfigD、show ip routeE、winipcfgF、show interfaces

考题 What is the purpose of assigning an IP address to a switch?()A、Provides local hosts with a default gateway addressB、Allows remote management of the switch.C、Allows the switch to respond to ARP requests between two hostsD、Ensures that hosts on the same LAN can communicate with each other.

考题 On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A、a router with subinterfaces configured on the physical interface that is connected to the switchB、a router with an IP address on the physical interface connected to the switchC、a switch with an access link that is configured between the switchesD、a switch with a trunk link that is configured between the switches

考题 A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()A、Micro segmentationB、Transparent switchingC、peer-to-peer networkingD、port securityE、store-and-forward switchingF、virtual local area networks

考题 An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB

考题 单选题Hosts on the same VLAN can communicate with each other but are unable to communicate with hosts on different VLANs. What is needed to allow communication between VLANs()。A a switch with a trunk link that is configured between the switchesB a router with an IP address on the physical interface that is connected to the switchC a switch with an access link that is configured between the switchesD a router with subinterfaces configured on the physical interface that is connected to the switch

考题 多选题Which two statements are true regarding the USING clause in table joins?()AIt can be used to join a maximum of three tablesBIt can be used to restrict the number of columns used in a NATURAL joinCIt can be used to access data from tables through equijoins as well as nonequijoinsDIt can be used to join tables that have columns with the same name and compatible data types

考题 单选题A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()A Micro segmentationB Transparent switchingC peer-to-peer networkingD port securityE store-and-forward switchingF virtual local area networks

考题 单选题Which of the following would be used to connect two IDFs in the same building with the LAN, whileminimizing crosstalk?()A RG-6B STPC CAT3D UTP

考题 单选题What is the use of an "all configuration" backup in Cisco UCS?()A  Can be used to migrate from a 6120 to a 6140 and retain the same service profilesB  Can only be used on the fabric interconnect on which it was createdC  Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster informationD  Can be used to match firmware versions between 6120 and 6140 during a migration

考题 单选题Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?()A ping addressB tracert addressC traceroute addressD arp address

考题 单选题Which command can be used from a PC to verfy the connectivity between host that connect through path?()A tracert addressB ping addressC arp addressD traceroute address

考题 单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A BPDUB Port securityC RSTPD STPE VTPF Blocking mode

考题 单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A As the root user from serverA run the command rhost serverBB As the root user from serverA run the command rlogin serverBC As the desired user from serverB run the command rhost serverAD As the desired user from serverA run the command rlogin serverB

考题 单选题On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A a router with subinterfaces configured on the physical interface that is connected to the switchB a router with an IP address on the physical interface connected to the switchC a switch with an access link that is configured between the switchesD a switch with a trunk link that is configured between the switches

考题 多选题Which of the following answers are correct characteristics of microsegmentation, in the context of a Local Area Network (LAN)?()ADedicated paths between sending and receiving hosts are established.BMultiple subnetwork broadcast addresses are created.CMultiple ARP tables are needed.DThe decrease in the number of collision domains.EBroadcast domains are enhanced.FAdditional bandwidth is used to connect hosts.

考题 多选题Which router IOS commands can be used to troubleshoot LAN connectivity problems?()ApingBtracertCipconfigDshow ip routeEwinipcfgFshow interfaces