网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following network modifications should be implemented to extend the wirelessnetwork range and allow out-of-range users to share the Internet connection?()
A
Create a new VLAN for the out-of-range users.
B
Add a wireless access point for the out-of-range users.
C
Upgrade the out-of-range users’ SSID searching software.
D
Enable network sharing on the users’ computers that are within range.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following network modifications should be implemented to extend the wirelessnetwork range and allow out-of-range users to share the Internet connection?()A Create a new VLAN for the out-of-range users.B Add a wireless access point for the out-of-range users.C Upgrade the out-of-range users’ SSID searching software.D Enable network sharing on the users’ computers that are within range.” 相关考题
考题
A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()A. Circuit switchingB. Network address translationC. Power over EthernetD. Virtual servers
考题
Which of the following should be used to restrict access to a wireless network?()
A. Port forwardingB. Enable SSID broadcastC. Wireless encryptionD. Enable DMZ
考题
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
A.WEPB.PEAPC.WPAD.TKIP
考题
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
A. Network diagramB. Performance baselineC. Network security procedureD. Company policy
考题
An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()A.NATB.DynamicC.SubnettingD.Static
考题
Which of the following should an administrator do after running a command from the console onthe perimeter router?()
A. Update the configuration logsB. Update the network wiring schematicsC. Update the network configuration proceduresD. Compare the configuration with the baseline
考题
An engineer is preparing an implementation plan in which the configuration needs to influence BGP‘s choice of best path.Which of the following is least likely to be used by the configuration in this imple mentation plan?()A. WeightB. Origin codeC. AS_PathD. Local_Pref
考题
Which of the following statements is true about the 80/20 rule (Select all that apply)?()A、20 percent of the traffic on a network segment should be local.B、no more than 20 percent of the network traffic should be able to move across a backbone.C、no more than 80 percent of the network traffic should be able to move across a backbone.D、80 percent of the traffic on a network segment should be local.
考题
A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()A、Circuit switchingB、Network address translationC、Power over EthernetD、Virtual servers
考题
A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()A、Frequency settings should be changedB、Additional WAPs should be installedC、Channels should be changedD、VLANs should be added
考题
A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()A、SSIDB、WPA PassphraseC、WEP KeyD、Network Path
考题
An engineer is preparing an implementation plan in which the configuration needs to influence BGP's choice of best path. Which of the following is least likely to be used by the configuration in this imple mentation plan?()A、WeightB、Origin codeC、AS_PathD、Local_Pref
考题
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A、Network diagramB、Performance baselineC、Network security procedureD、Company policy
考题
Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP
考题
The warranty expiration date of each server should be recorded in which of the following documents?()A、Asset managementB、Network diagramC、Server baselineD、List of vendors
考题
An administrator only has one public IP address that must be shared among five employees. Which of the following network schemes should be used?() A、SNATB、SNAPC、NACD、MPLS
考题
A user reports that they are unable to print to a remote printer. Which of the following should the technician check FIRST?()A、Printer driverB、Protocol stackC、Network connectivityD、Correct patch application
考题
Which of the following options best justifies why a DNS server should be run in a large network system?()A、To use ftp and telnetB、To perform NFS mountsC、To make /etc/hosts files unnecessaryD、To reduce network traffic and save bandwidth
考题
Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A、 netpmonB、 netstatC、 nfsstatD、 vmstat
考题
Which of the following commands should be used to set network attributes on a currently running kernel?()A、 noB、 chdevC、 vmtuneD、 schedtune
考题
单选题Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A
netpmonB
netstatC
nfsstatD
vmstat
考题
单选题Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A
WEPB
PEAPC
WPAD
TKIP
考题
单选题Which of the following network modifications should be implemented to extend the wirelessnetwork range and allow out-of-range users to share the Internet connection?()A
Create a new VLAN for the out-of-range users.B
Add a wireless access point for the out-of-range users.C
Upgrade the out-of-range users’ SSID searching software.D
Enable network sharing on the users’ computers that are within range.
考题
单选题Which of the following should an administrator do after running a command from the console onthe perimeter router?()A
Update the configuration logsB
Update the network wiring schematicsC
Update the network configuration proceduresD
Compare the configuration with the baseline
考题
单选题A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()A
Circuit switchingB
Network address translationC
Power over EthernetD
Virtual servers
考题
单选题Which of the following should be used to restrict access to a wireless network?()A
Port forwardingB
Enable SSID broadcastC
Wireless encryptionD
Enable DMZ
考题
多选题Which of the following statements is true about the 80/20 rule (Select all that apply)?()A20 percent of the traffic on a network segment should be local.Bno more than 20 percent of the network traffic should be able to move across a backbone.Cno more than 80 percent of the network traffic should be able to move across a backbone.D80 percent of the traffic on a network segment should be local.
考题
单选题Which of the following commands should be used to view and change the network filesystem tuning parameters available on the system?()A
noB
nfsoC
vmtuneD
exportfs
热门标签
最新试卷