网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()
A

 network

B

 application

C

 session

D

 data link


参考答案

参考解析
解析: 暂无解析
更多 “单选题A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()A  networkB  applicationC  sessionD  data link” 相关考题
考题 Your network contains a server named Server1.contoso.com. Server1 is located on the internal network. You have a client computer named Computer1 that runs Windows 7. Computer1 is located on a public network that is connected to the Internet. Computer1 is enabled for DirectAccess. You need to verify whether Computer1 can resolve Server1 by using DirectAccess. Which command should you run on Computer1?()A. nbtstat.exe a server1.contoso.comB. netsh.exe dnsclient show stateC. nslookup.exe server1.contoso.comD. ping.exe server1.contoso.com

考题 While troubleshooting a network connectivity problem, a Ezonexam technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the 7-layer OSI model does the problem most likely exist?A. The data link layerB. The application layerC. The protocol layerD. The access layerE. The session layerF. The network layerG. None of the above

考题 The purpose of a network( )is to provide a shell around the network which will protect the system connected to the network from various threats.A.firewallB.switchC.routerD.gateway

考题 Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?() A. StarB. HybridC. MeshD. Ring

考题 A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? () A. ESD matB. ESD wrist strapC. Sealable plastic bagD. Anti-static bag

考题 Certkiller .com has a remote data center with servers connected to a local datacenter through a high-speed network. Which of the following methods is the most convenient to use to install and upgrade the servers in the remote center using locally managed install images?()A.NIMB.HAGEO/HACMPC.NFSD.ftp, rsh and rexec

考题 You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

考题 A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()A、 networkB、 applicationC、 sessionD、 data link

考题 Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A、 Verify the configuration of the connected port on the network switch.B、 Reboot the server.C、 Install a new NIC on the server.D、 Verify that network cables are connected.

考题 While troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the OSI model does the problem most likely exist()。A、the session layerB、the protocol layerC、the data link layerD、the access layerE、the network layerF、the application layer

考题 A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()A、ESD matB、ESD wrist strapC、Sealable plastic bagD、Anti-static bag

考题 Which action increases server availability?()A、 configuring a second network card with a different IP addressB、 replacing the existing 100 Mbps NIC with a gigabit Ethernet NICC、 using adapter teaming and configuring the second network card with the same IP address as the first network cardD、 installing a dual-port network card that can handle the future growth and setting one NIC to 10 Mbps and one NIC to 100 Mbps

考题 A server connects to iSCSI presented SAN storage array through a dedicated NIC; however, the SAN traffic is passed on the same switches as the Ethernet network and VoIP traffic. The size of the presented drive is 700GB. The administrator has noticed a decrease in storage performance. Which of the following is MOST likely the cause?()A、The server power supply is starting to fail and causing the iSCSI NIC to intermittently lose power.B、There are too many users attempting to access the iSCSI presented disk.C、The other network traffic is causing packet delays in the iSCSI network.D、The SAN is nearing capacity and should be expanded

考题 Which of the following network types is being described when computers are connected so thatdata flows from one computer to the other by traveling through each computer in the network?()A、StarB、HybridC、MeshD、Ring

考题 A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A、NIC filtering is enabled.B、Port security is configured.C、NIC is not in promiscuous mode.D、NIC is in promiscuous mode.

考题 Which of the following is a storage system that can be connected to multiple servers through an iSCSI connection?()A、JBODB、DASC、NASD、SAN

考题 On which of the following network devices would an administrator configure an ACL?()A、RouterB、HubC、RepeaterD、NIC

考题 单选题Which of the following should a technician do FIRST to troubleshoot a users network connectivity problem?()A Run TRACERT from the users workstation.B Start with the Last Known Good Configuration and reboot the computer.C Replace the network interface card (NIC).D PING the users workstation.

考题 单选题A user reports that a network printer will not print, however, other users are not experiencing any problems. The user has rebooted their computer twice and it is still not printing. Which of the following should the technician check?()A Run the printer configuration wizard on the desktop.B Check to see if the network printer is turned on.C Verify that the printer is connected to the network.D Check the local print queue for a failed print job.

考题 单选题While troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the OSI model does the problem most likely exist?()A the session layerB the protocol layerC the data link layerD the access layerE the network layerF the application layer

考题 单选题Certkiller .com has a remote data center with servers connected to a local datacenter through a high-speed network. Which of the following methods is the most convenient to use to install and upgrade the servers in the remote center using locally managed install images?()A NIMB HAGEO/HACMPC NFSD ftp, rsh and rexec

考题 单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()A  NIC filtering is enabled.B  Port security is configured.C  NIC is not in promiscuous mode.D  NIC is in promiscuous mode.

考题 单选题Your network contains a server named Server1.contoso.com. Server1 is located on the internal network. You have a client computer named Computer1 that runs Windows 7. Computer1 is located on a public network that is connected to the Internet. Computer1 is enabled for DirectAccess. You need to verify whether Computer1 can resolve Server1 by using DirectAccess. Which command should you run on Computer1?()A nbtstat.exe a server1.contoso.comB netsh.exe dnsclient show stateC nslookup.exe server1.contoso.comD ping.exe server1.contoso.com

考题 单选题Which action increases server availability?()A  configuring a second network card with a different IP addressB  replacing the existing 100 Mbps NIC with a gigabit Ethernet NICC  using adapter teaming and configuring the second network card with the same IP address as the first network cardD  installing a dual-port network card that can handle the future growth and setting one NIC to 10 Mbps and one NIC to 100 Mbps

考题 多选题You are the administrator of a Windows 2000 Professional computer, which has a 56 Kbps modem, connected to itself. You want the users on your company’s network to be able to connect to the Internet using your computer. But, you do not want to allow any other operations than HTTP and FTP. Which ports will you allow through this connection? ()APort 80BPort 21CPort 25DPort 81

考题 单选题A server connects to iSCSI presented SAN storage array through a dedicated NIC; however, the SAN traffic is passed on the same switches as the Ethernet network and VoIP traffic. The size of the presented drive is 700GB. The administrator has noticed a decrease in storage performance. Which of the following is MOST likely the cause?()A The server power supply is starting to fail and causing the iSCSI NIC to intermittently lose power.B There are too many users attempting to access the iSCSI presented disk.C The other network traffic is causing packet delays in the iSCSI network.D The SAN is nearing capacity and should be expanded

考题 单选题Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A  Verify the configuration of the connected port on the network switch.B  Reboot the server.C  Install a new NIC on the server.D  Verify that network cables are connected.