网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()
A

Host B and the switch need to be in the same subnet.

B

The switch needs and appropriate default gateway assigned.

C

The switch interface connected to the router is down.

D

Host B need to be assigned an IP address in vlan 1.

E

The switch interfaces need the appropriate IP addresses assigned.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A Host B and the switch need to be in the same subnet.B The switch needs and appropriate default gateway assigned.C The switch interface connected to the router is down.D Host B need to be assigned an IP address in vlan 1.E The switch interfaces need the appropriate IP addresses assigned.” 相关考题
考题 The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

考题 The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)A.Configure port Fa0/1 to accept connections only from the static IP address of the serverB.Configure the MAC address of the server as a static entry associated with port Fa0/1C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectorsD.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverE.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address

考题 You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10

考题 Why would a network administrator configure port security on a switch?() A. To prevent unauthorized Telnet access to a switch port.B. To limit the number of Layer 2 broadcasts on a particular switch port.C. To prevent unauthorized hosts from accessing the LAN.D. To protect the IP and MAC address of the switch and associated ports.E. To block unauthorized access to the switch management interfaces over common TCP ports.

考题 A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()A. Configure port Fa0/1 to accept connections only from the static IP address of the server.B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C. Configure the MAC address of the server as a static entry associated with port Fa0/1.D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrators attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A.Host B and the switch need to be in the same subnet.B.The switch needs and appropriate default gateway assigned.C.The switch interface connected to the router is down.D.Host B need to be assigned an IP address in vlan 1.E.The switch interfaces need the appropriate IP addresses assigned.

考题 The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()A.from host PC1 to host 5.1.1.10B.from host PC1 to host 5.1.3.10C.from host PC2 to host 5.1.2.10D.from host PC2 to host 5.1.3.8

考题 Why would a network administrator configure port security on a switch()。 A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports

考题 The Dynamic Host Configuration Protocol provides configuration parameters to Internet( ).DHCP consists of two components:a( )for delivering host-specifie configuration parameters from a DHCP server to a host and a mechanism for allocation of network addresses to hosts.DHCP is built on a client-server model,where designated DHCP server hosts allocate network addresses and deliver( )parameters to dynamically configured hosts.DHCP supports three mechanisms for IP address allocation.In“automatic allocation”,DHCP assigns a(本题)IP address to client.In“dynamic allocation”,DHCP assigns an IP address to a client for a limited period of time.In“manual allocation”,a client’s IP address is assigned by the network( ),and DHCP is used simply to convey the assigned address to the client.A.permanent B.dynamic C.connection D.session

考题 The Dynamic Host Configuration Protocol provides configuration parameters to Internet( ).DHCP consists of two components:a( )for delivering host-specifie configuration parameters from a DHCP server to a host and a mechanism for allocation of network addresses to hosts.DHCP is built on a client-server model,where designated DHCP server hosts allocate network addresses and deliver( )parameters to dynamically configured hosts.DHCP supports three mechanisms for IP address allocation.In“automatic allocation”,DHCP assigns a( )IP address to client.In“dynamic allocation”,DHCP assigns an IP address to a client for a limited period of time.In“manual allocation”,a client’s IP address is assigned by the network(本题),and DHCP is used simply to convey the assigned address to the client.A.controller B.user C.host D.administrator

考题 Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

考题 A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1 (Choose two.)()。A、Configure port Fa0/1 to accept connections only from the static IP address of the server.B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C、Configure the MAC address of the server as a static entry associated with port Fa0/1.D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

考题 The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

考题 Which of the following is an unlikely reason for the ARP process to fail?()A、CEF switching is disabled on the switchB、The source device and destination device are in different VLANsC、The VLAN is excluded from the trunkD、The host is connected to the switch through an IP phoneE、A faulty cable from host to switch or between switchesF、The trunking encapsulation type is inconsistent on the two ends of the link

考题 Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. All client computers run Windows 7. You need to ensure that the current Libraries from users’ computers are available when they log on to the RD Session Host server. What should you do?()A、Redirect each userˉs Documents folder to a network shareB、Redirect each userˉs Links folder to the RD Session Host serverC、Use a startup script to copy .library-ms files from the client computers to the RD Session Host server.D、Use Group Policy Preferences to copy .library-ms files from the client computers to the RD Session Host server.

考题 单选题A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

考题 多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1 (Choose two.)()。AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 多选题The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()AARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.BARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.CMAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.DARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.EMAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

考题 单选题Refer to the exhibit。A problem with network connectivity has been observed.It is suspected that the cable connected to switch port Fa0/9 on Switch 1 disconnected.What would be an effect of tis cable being disconnected?()A Host B would not be able to access the server in VLAN9 until the cable is reconnectedB For less than a minute ,Host B would not be able to access the server in VLAN9.Then normal network function would resume.C Communication between VLAN3 and the other VLANs would be disabledD The transfer of files from Host B to the server in VLAN9 would be significantly slower.

考题 单选题Why would a network administrator configure port security on a switch?()A to prevent unauthorized Telnet access to a switch portB to limit the number of Layer 2 broadcasts on a particular switch portC to prevent unauthorized hosts from accessing the LAND to protect the IP and MAC address of the switch and associated portsE to block unauthorized access to the switch management interfaces over common TCP ports

考题 单选题Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both  switch S2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switch S2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?()A  Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1.B  No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0.C  No. Traffic will loop back and forth between switch S5 and S2.D  Yes. Traffic will pass from switch S6 to S3 to S2 to S1.E  No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end.

考题 单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A BPDUB Port securityC RSTPD STPE VTPF Blocking mode

考题 单选题Why would a network administrator configure port security on a switch?()A To prevent unauthorized Telnet access to a switch port.B To limit the number of Layer 2 broadcasts on a particular switch port.C To prevent unauthorized hosts from accessing the LAN.D To protect the IP and MAC address of the switch and associated ports.E To block unauthorized access to the switch management interfaces over common TCP ports.

考题 单选题Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A Host B and the switch need to be in the same subnet.B The switch needs and appropriate default gateway assigned.C The switch interface connected to the router is down.D Host B need to be assigned an IP address in vlan 1.E The switch interfaces need the appropriate IP addresses assigned.

考题 单选题Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. All client computers run Windows 7. You need to ensure that the current Libraries from users’ computers are available when they log on to the RD Session Host server. What should you do?()A Redirect each userˉs Documents folder to a network shareB Redirect each userˉs Links folder to the RD Session Host serverC Use a startup script to copy .library-ms files from the client computers to the RD Session Host server.D Use Group Policy Preferences to copy .library-ms files from the client computers to the RD Session Host server.

考题 多选题Which of the following is an unlikely reason for the ARP process to fail?()ACEF switching is disabled on the switchBThe source device and destination device are in different VLANsCThe VLAN is excluded from the trunkDThe host is connected to the switch through an IP phoneEA faulty cable from host to switch or between switchesFThe trunking encapsulation type is inconsistent on the two ends of the link

考题 多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.