网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A network administrator wants to verify the active alarms on interface so-0/0/0. Which command displays this information?()
A

show interfaces alarms

B

show interfaces terse

C

show alarms extensive

D

show interfaces extensive


参考答案

参考解析
解析: 暂无解析
更多 “单选题A network administrator wants to verify the active alarms on interface so-0/0/0. Which command displays this information?()A show interfaces alarmsB show interfaces terseC show alarms extensiveD show interfaces extensive” 相关考题
考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode

考题 A network administrator wants to verify the active alarms on interface so-0/0/0.0. Which command displays this information?() A. show interfaces alarmsB. show interfaces terseC. show alarms extensiveD. show interfaces extensive

考题 An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?() A.IDSB.IPSC.FirewallD.Managed PKI

考题 An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS

考题 An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?() A.netstatB.tracerouteC.nbtstatD.ping

考题 The administrator wants to verify the current state of the OSPF database loading process. Which show command should the administrator use?() A. show ip ospf [process - id] interfaceB. show ip ospf neighborC. show ip ospf [process - id]D. show ip ospf [process - id area - id] database

考题 Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A、 Verify the configuration of the connected port on the network switch.B、 Reboot the server.C、 Install a new NIC on the server.D、 Verify that network cables are connected.

考题 Your network consists of a single Active Directory domain that has three Active Directory sites. Each site contains two Active Directory domain controllers.  All domain controllers run Windows Server 2003 Service Pack 2 (SP2). All domain controllers have Windows Support Tools installed. You need to verify the replication status of Active Directory.  Which tool should you use?()A、Active Directory Sites and ServicesB、Nltest.exeC、Network MonitorD、Replmon.exe

考题 You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()A、 Chief information officerB、 IT support staff in BostonC、 IT support staff in New YorkD、 Network administrator in ChicagoE、 Network administrator in New York

考题 An administrator wants to rackmount a new server.  Power and network outlets are available and cooling in the room is adequate to support the additional server. The new server is identical to the other servers already installed.  Which of the following items should the administrator FIRST verify before installing the server?()A、HBA is compatible with the SAN fiber switch.B、Update the newly installed server with the latest KVM drivers.C、The UPS will continue to perform as expected with the additional load.D、Verify the server NIC is compatible with the NAS.

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

考题 A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A、 That there are no DHCP relay serversB、 That the user account on Active Directory is not lockedC、 That the network card driver is not installed incorrectlyD、 The network connection is functioning

考题 An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()A、netstatB、tracerouteC、nbtstatD、ping

考题 An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI

考题 An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS

考题 While reviewing cluster logs, and administrator notice that an event, network_down rs232a, occurred on the previous day. After verifying the physical network connections and device states, what command can be used to verify the cluster state?()A、 clstatB、 cllsifC、 clsnapshotinfoD、 clcheck_server

考题 An AIX server has 2 network interfaces and the system administrator wants to enable the users on the locally configured network interface to be able to connect to systems configured on the global network interface.  How is it accomplished?()A、Enable routed on the serverB、Enable gated on the serverC、Enable ipforwarding on the serverD、Set network options back to default

考题 Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

考题 单选题An administrator wants to rackmount a new server.  Power and network outlets are available and cooling in the room is adequate to support the additional server. The new server is identical to the other servers already installed.  Which of the following items should the administrator FIRST verify before installing the server?()A HBA is compatible with the SAN fiber switch.B Update the newly installed server with the latest KVM drivers.C The UPS will continue to perform as expected with the additional load.D Verify the server NIC is compatible with the NAS.

考题 单选题A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A  That there are no DHCP relay serversB  That the user account on Active Directory is not lockedC  That the network card driver is not installed incorrectlyD  The network connection is functioning

考题 单选题The administrator wants to verify the current state of the OSPF database loading process. Which show command should the administrator use?()A show ip ospf [process - id] interfaceB show ip ospf neighborC show ip ospf [process - id]D show ip ospf [process - id area - id] database

考题 单选题You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()A  Chief information officerB  IT support staff in BostonC  IT support staff in New YorkD  Network administrator in ChicagoE  Network administrator in New York

考题 单选题A network administrator wants to verify the active alarms on interface so-0/0/0. Which command displays this information?()A show interfaces alarmsB show interfaces terseC show alarms extensiveD show interfaces extensive

考题 单选题As a network administrator, you have configured a Catalyst 6500 Series Switch with redundant supervisor engine in a CIS network. What is the result of issuing the redundancy force-switchover command on that switch?()A Automatic switchover from active to standby on primary supervisor failureB Reset of the primary supervisor.C Manual switchover from active to standby supervisorD Manual switchover from standby to active supervisor

考题 单选题Which command do you use to show active alarms?()A show hardware stateB show system alarmsC show chassis stateD show services alarms

考题 单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A Disable SSIDB WPAC MAC filteringD RAS

考题 单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A BPDUB Port securityC RSTPD STPE VTPF Blocking mode

考题 单选题Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A  Verify the configuration of the connected port on the network switch.B  Reboot the server.C  Install a new NIC on the server.D  Verify that network cables are connected.