网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The Company network needs to pass traffic between VLANs.  Which device should be used to  accomplish this? ()
A

 Hub

B

 Switch

C

 Router

D

 Bridge

E

 None of the other alternatives apply


参考答案

参考解析
解析: 暂无解析
更多 “单选题The Company network needs to pass traffic between VLANs.  Which device should be used to  accomplish this? ()A  HubB  SwitchC  RouterD  BridgeE  None of the other alternatives apply” 相关考题
考题 Ezonexam is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers and what technology should be implemented on this device? (Choose two)A. VLANB. SubinterfaceC. STPD. HubE. SwitchF. RouterG. Wireless Access PointH. VTP

考题 A(75)system placed between the company network and the outside world may limit outside access to the internal network.A.firewallB.modemC.gatewayD.key

考题 A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back.What is causing the problem?()A. The host needs to open the telnet port.B. The host needs a route for the translated address.C. The administrator must use a proxy-arp policy for the translated address.D. The administrator must use a security policy, which will allow communication between the zones.

考题 An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A. Router routes traffic between different networks and a switch does notB. The new switch is faulty and needs to be replaced and configured correctlyC. The firewall needs to be setup to allow traffic to reach the InternetD. The switch needs to be setup to forward data traffic to the Internet

考题 A ______ system placed between the company network and the outside world may limit outside access to the internal network.A.firewallB.modemC.gatewayD.key

考题 Refer to the exhibit. A Boston company bought the asse ts of a New York company and is trying to route traffic between the two data networks using EIGRP over EoMPLS. As a network consultant, you were asked to verify the interoperability of the two networks. From the show ip route command output, what can yo u tell the customer about the traffic flow between the subnet in New York (172.16.8.0/24) and the subnets in Boston (172.16.16.0/24 and 10.10.16.0/24)?()A. Traffic is flowing between the 172.16.8.0 subnet and subnets 172.16.16.0 and 10.10.16.0 and no configuration changes are needed.B. Auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16.8.0 subnet and subnets 172.16.16.0 and 10.10.16.0.C. Traffic will flow between the 172.16.8.0 subnet and 172.16.16.0 without any further configuration changes. However, auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16.8.0 subnet and the 10.10.16.0 subnet.D. Auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16 .8.0 subnet and the 172.16.16.0 subnet. However, traffic will flow between the 172.16.8.0 subnet and 10.10.16.0 without any further configuration changes.

考题 Refer to the exhibit. A Boston company bought th e assets of a New York company and is trying to route traffic between the two data networks using EIGRP. The show command output shows that traffic will not flow between the networks. As a network consultant, you were asked to modify the configuration a nd certify the interoperability of the two networks. For traffic to flow from subnet 172.16.8.0/24 to the 172.16.16.0/24 subnet, which configuration change do you recommend?()A. Turn off autosummarization on routers N1 and B1.B. Add IP summary addre sses to the Internet - pointing interfaces of routers N1 and B1.C. Turn off autosummarization on routers N2 and B2.D. Add wildcard masks to the network commands on routers N2 and B2.

考题 Which two series of Cisco Catalyst switches, when placed in the distribution layer, effectively pass high amounts of network traffic between the core and access layers while aggregating access? ()A、 Cisco Catalyst 2800B、 Cisco Catalyst 3550C、 Cisco Catalyst 3750D、 Cisco Catalyst 4500E、 Cisco Catalyst 6500

考题 You have been tasked with setting a trust boundary on the Company network.  What is the basic  function of this trust boundary?()A、 Trust boundaries are points in the network where Layer 2 CoS markings are converted to Layer  3 DSCP or IP precedence markings.B、 Trust boundaries are a point in the network where QoS functionality begins and ends.C、 Trust boundaries determine whether certain types of traffic can pass.D、 Trust boundaries are a point in the network where decisions about CoS markings on incoming  packets are made.E、 None of the other alternatives apply

考题 A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.)()A、hubB、routerC、switchD、STPE、subinterfacesF、VLAN

考题 The Company network needs to pass traffic between VLANs.  Which device should be used to  accomplish this? ()A、 HubB、 SwitchC、 RouterD、 BridgeE、 None of the other alternatives apply

考题 A company is installing IP phones. The phones and office computers connect to the same devicE.To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffiC.What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? ()A、hubB、routerC、switchD、STPE、subinterfacesF、VLAN

考题 The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network.   Which two statements correctly describe features of this protocol? ()A、 Control traffic between an access point and a controller is encrypted within LWAPP.B、 Data traffic between an access point and a controller is encrypted within LWAPP.C、 Layer 3 mode packets are transmitted in TCP frames.D、 Data traffic between an access point and a controller is encapsulated within LWAPP.E、 VLAN tagging and QoS markings are applied at the access point.

考题 On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A、a router with subinterfaces configured on the physical interface that is connected to the switchB、a router with an IP address on the physical interface connected to the switchC、a switch with an access link that is configured between the switchesD、a switch with a trunk link that is configured between the switches

考题 An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A、Router routes traffic between different networks and a switch does notB、The new switch is faulty and needs to be replaced and configured correctlyC、The firewall needs to be setup to allow traffic to reach the InternetD、The switch needs to be setup to forward data traffic to the Internet

考题 Which two configuration options must be present for IPv4 transit traffic to pass between the ge-0/0/0.0 andge-0/0/2.0 interfaces?()A、family inetB、a security zoneC、a routing instanceD、host-inbound-traffic

考题 You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.  Which inbound traffic should be allowed? ()A、 VPN TrafficB、 DNS TrafficC、 LDAP TrafficD、 HTTP TrafficE、 HTTPS TrafficF、 Traffic from the network address of 192.168.10/24

考题 You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

考题 You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

考题 多选题The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network.   Which two statements correctly describe features of this protocol? ()AControl traffic between an access point and a controller is encrypted within LWAPP.BData traffic between an access point and a controller is encrypted within LWAPP.CLayer 3 mode packets are transmitted in TCP frames.DData traffic between an access point and a controller is encapsulated within LWAPP.EVLAN tagging and QoS markings are applied at the access point.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()A Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.B Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.C Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.D Create a Pattern Match capture trigger for the 131.107.0.1 IP address.

考题 多选题A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device (Choose two.)()。AhubBrouterCswitchDSTPEsubinterfacesFVLAN

考题 多选题A company is installing IP phones. The phones and office computers connect to the same devicE.To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffiC.What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? ()AhubBrouterCswitchDSTPEsubinterfacesFVLAN

考题 多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. Your company has a Network Load Balancing cluster named nlb.wiikigo.com.The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenlydistributes HTTP traffic between both hosts. WEB2 needs to be configured to handle all HTTPS traffic fornlb.wiikigo.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2. What should you do to achieve this?()AIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Single host.BIn the properties for WEB2, the Handling priority option for the TCP 443 port rule should be changed tothe value of 1.CIn the properties for WEB1, the Handling priority option for the TCP 443 port rule should be changed tothe value of 0.DIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Multiple host and the Affinity option set to the value of Single.

考题 多选题You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.  Which inbound traffic should be allowed? ()AVPN TrafficBDNS TrafficCLDAP TrafficDHTTP TrafficEHTTPS TrafficFTraffic from the network address of 192.168.10/24

考题 多选题Which two series of Cisco Catalyst switches, when placed in the distribution layer, effectively pass high amounts of network traffic between the core and access layers while aggregating access? ()ACisco Catalyst 2800BCisco Catalyst 3550CCisco Catalyst 3750DCisco Catalyst 4500ECisco Catalyst 6500

考题 单选题You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A  Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B  Allow all inbound VPN traffic to pass through the perimeter firewall only.C  Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D  Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.