网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Your network administrator has asked you to view the real-time interface usage on ge-0/0/0, Which command whould be used?()

  • A、monitor interface ge0/0/0
  • B、traceoptions interface ge-0/0/0
  • C、debug interface ge0/0/0
  • D、monitor usage ge-0/0/0

参考答案

更多 “Your network administrator has asked you to view the real-time interface usage on ge-0/0/0, Which command whould be used?()A、monitor interface ge0/0/0B、traceoptions interface ge-0/0/0C、debug interface ge0/0/0D、monitor usage ge-0/0/0” 相关考题
考题 You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

考题 Network management helps you to(66)the strengths and weaknesses of your network, as well as determine any configuration changes that may be necessary. Any controlled changes to your network and its components-especially configurations, software and(67), can have an effect on its overall efficiency. To maintain control, you need the tools and knowledge to manage all activity that has the potential to affect your(68).A.seeB.knowC.monitorD.control

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center

考题 A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?() A.ARPB.CDPC.DHCPD.DNSE.ICMP

考题 You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

考题 A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? ()A、ARPB、CDPC、DHCPD、DNSE、ICMP

考题 The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.

考题 You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

考题 Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

考题 An administrator has found interference on a network. Which of the following cable types is thenetwork MOST likely composed of?()A、UTPB、FiberC、RG-6D、STP

考题 A network administrator has a 10base2 network.  A card is provided that has both 10base2 and 10base5 ports.  Which of the following types of cables should be selected in SMIT during configuration of the adapter?()A、TPB、BNCC、DIXD、CAT5

考题 An AIX server has 2 network interfaces and the system administrator wants to enable the users on the locally configured network interface to be able to connect to systems configured on the global network interface.  How is it accomplished?()A、Enable routed on the serverB、Enable gated on the serverC、Enable ipforwarding on the serverD、Set network options back to default

考题 You are the administrator of WXYZ.com Incorporation. Your company’s network consists of Windows 2000 Professional clients and Windows 2000 Servers. Users have started reporting that the network performance has degraded in recent times. Most of the Windows 2000 Professional clients on your network use the TCP/IP protocol to communicate with the Server. You want to increase network performance. Where do you change the binding order?()A、Windows 2000 Server  Network  Binding  Server  TCP/IP on the top.B、Windows 2000 Server  Network  Binding  Workstation  TCP/IP on the top.C、Windows 2000 Professional  Network  Binding  Server  TCP/IP on the top.D、Windows 2000 Professional  Network  Binding  Server  TCP/IP on the bottom.E、Windows 2000 Professional  Network  Binding  Workstation  TCP/IP on the top.F、Windows 2000 Professional  Network  Binding  Workstation  TCP/IP on thebottom.

考题 Maria has been set up as an assistant to the administrator. Users of your network are complaining that Maria has been opening their files and editing them. She needs to perform backups and installations of programs, and setting up of printers.   How do you fix the problem with the minimum amount of effort, yet allowing her to accomplish the assigned tasks? ()A、Remove her Administrator privilege and give her Power Users and Backup Operators.B、Leave her as Administrator and make deny on Users’ files.C、Remove her administrator privileges and assign her Server Operators.D、Remove her administrator privileges and assign her Power Users and Replicator. E、Tell her that she isn’t allowed to tamper with other users files.

考题 Your network administrator has assigned you an IP address of 192.168.0.20 with subnet mask of 255.255.255.0.Your network is running in pure Windows 2000 domain. What else should know in order to join your computer to the Windows 2000 domain. ()A、 Address of DHCP server.B、 Address of WINS server.C、 Address of DNS server.D、 Address of default gateway

考题 You are employed as the exchange administrator at TestKing.com. The TestKing.com network containsan Exchange Server 2010 Organization. TestKing.com has its headquarters in Chicago and a branchoffice in Dallas. TestKing.com has a global security group named TestFinance. TestFinance contains all the users in theFinance department. A new TestKing.com policy state that TestFinance have the nesessary permissons tosearch the mailboxes for e-mail messages containing certain words. The CIO wants you to recommend asolution that will comply with the new policy. What should you do?()A、Your solution should include a finance hold.B、Your solution should include mailbox journaling.C、Your solution should include a Discovery Management role group.D、Your solution should include administrator audit logging.

考题 You are the administrator of Etechsol.com Enterprises. Your company consists of a small 20-user network. Management has decided to upgrade all computers to Windows 2000.   After having a closer examination of your company’s network, you realize that only half of the network interface cards are Net PC compliant. You decide to create Windows 2000 remote boot floppies.  What executable is used for creating RIS boot disks for non-PXE compliant clients?()A、RBFG*EXEB、RIPREP*EXEC、RIS*EXED、RISPXE*EXEE、RISBOO*EXE

考题 单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A One router is running RIPv1.B RIP neighbor is 224.0.0.9.C The network contains a loop.D Network 10.10.1.0 is reachable.

考题 单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A STPB GVRPC SNMPD VTPE DHCP

考题 单选题Your network administrator has assigned you an IP address of 192.168.0.20 with subnet mask of 255.255.255.0.Your network is running in pure Windows 2000 domain. What else should know in order to join your computer to the Windows 2000 domain. ()A  Address of DHCP server.B  Address of WINS server.C  Address of DNS server.D  Address of default gateway

考题 多选题You are the administrator of a Windows 2000 Professional computer, which has a 56 Kbps modem, connected to itself. You want the users on your company’s network to be able to connect to the Internet using your computer. But, you do not want to allow any other operations than HTTP and FTP. Which ports will you allow through this connection? ()APort 80BPort 21CPort 25DPort 81

考题 多选题You are a network administrator for ExamSheet.net’s Windows 2000 network. Your computer has Windows 2000 Professional installed. Your office has a power utage while you are running the Windows 2000 disk defragmenter. When you restart your computer, you receive the following error message: "Bad or missing operating system". You want your computer to start properly. You want to do this with least amount of administrative effort. What should you do?()AReinstall the operating systemBStart the computer by using the Windows 2000 Professional CD-ROM.CUse the Recovery Console to repair the Master Boot Record.DUse the Emergency Repair Disk to repair the Master Boot Record.

考题 单选题You are the administrator of your company’s network. Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled.   A user named John leaves the company. You move all of the files from John’s home folder to his manager’s folder. When the manager attempts to open any of the files, she receives the following error message. “Access denied.”   You want the manager to be able to access the files. What should you do?()A Grant the manager NTFS Full Control permission to the files.B Grant the manager NTFS Take Ownership permission to the files.C Log on to the network as a recovery Agent.  Decrypt the files for the manager.D Log on to the network as a member of the Backup Operators group. Decrypt the files for the manager.

考题 多选题You are the network administrator of a medium-sized company, and users are complaining that they cannot send emails to some organizations. During your troubleshooting, you notice that your DNS MX record is blacklisted by several public blacklist filters. After clearing these listings for your IP address, and assuming that your email server has the right virus protection in place, what are two possible solutions to prevent this from happening in the future?()AChange your Internet provider.BChange your public IP address.CAllow the email server to send traffic only to TCP port 25.DPut your email server in a DMZ.EUse a separate public IP address for your email server only.

考题 多选题A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? ()AARPBCDPCDHCPDDNSEICMP

考题 单选题You are the network administrator at TestKing. TestKing has been provided withthe network address 165.100.27.0/24. The TestKing CEO wants to know how many subnetworks this address provides, and how many hosts can be supported on each subnet. What would your reply be?()A One network with 254 hosts.B 254 networks with 254 hosts per network.C 65,534 networks with 255 hosts per network.D 30 networks with 64 hosts per network.E 254 networks with 65,534 per network.

考题 单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()A Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.B Log on by using your Administrator account and run the ntbackup /D command.C Log on by using your Administrator account and run the schtasks /delete command.D Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.