网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()

  • A、RIP v1
  • B、RIP v2
  • C、IGRP
  • D、OSPF
  • E、EIGRP

参考答案

更多 “A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A、RIP v1B、RIP v2C、IGRPD、OSPFE、EIGRP” 相关考题
考题 An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA

考题 A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()A.B.C.D.

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()A、 Chief information officerB、 IT support staff in BostonC、 IT support staff in New YorkD、 Network administrator in ChicagoE、 Network administrator in New York

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

考题 Before inserting a new switch in the network,the network administrator checks that the VTP domain name is correct,the VTP mode is set to server, and revision is lower than the switches in the network. The administrator then configures interfaces and trunks,erases existing VLANs,and connects the switch to the network. Following that procedure,there is no connectivity in the network. What is a possible cause of this problem?()A、Because the configuration revision of the new switches is lower than the rest of the network, it can change the VLAN database of the other switches.B、As a VTP server, the new switch deleted all VLANs of the network.C、Erasing VLANs increases the VTP configuration revision.D、Since the configuration revision of the network is higher than the new switch, the VLAN database was automatically synchronized.

考题 The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management  domain?()A、Enable VTP pruning on any switch in the management domainB、Enable VTP pruning on any client switch in the domainC、Enable VTP pruning on a VTP server in the management domainD、Enable VTP pruning on every switch in the domainE、None of the other alternatives apply

考题 A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A、 That there are no DHCP relay serversB、 That the user account on Active Directory is not lockedC、 That the network card driver is not installed incorrectlyD、 The network connection is functioning

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable

考题 Which of the following configuration management documentation types would an administrator useto know how and when to property install new network devices on the LAN?()A、Baseline configurationB、Logical network diagramC、Network policyD、Wiring schematic

考题 Which of the following would help a new administrator quickly determine if a network had a VLANfor its publicly accessible servers?()A、BaselinesB、RegulationsC、Logical network diagramsD、Wiring schematics

考题 An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA

考题 Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic

考题 Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram

考题 An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS

考题 On which of the following network devices would an administrator configure an ACL?()A、RouterB、HubC、RepeaterD、NIC

考题 单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A Default gatewayB The ports on the switchC Port security on the server's switch portD Ethernet cable

考题 单选题A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A  That there are no DHCP relay serversB  That the user account on Active Directory is not lockedC  That the network card driver is not installed incorrectlyD  The network connection is functioning

考题 单选题An administrator is notified that all network printers are not printing. The administrator reviews the server and the print service is started. Which of the following is the cause of the problem?()A The drivers for the printers are failing.B The spool folder is full.C The spool folder is not on the C drive.D A network printer was disconnected.

考题 单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A Disable SSIDB WPAC MAC filteringD RAS

考题 单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A BPDUB Port securityC RSTPD STPE VTPF Blocking mode

考题 单选题The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management  domain?()A Enable VTP pruning on any switch in the management domainB Enable VTP pruning on any client switch in the domainC Enable VTP pruning on a VTP server in the management domainD Enable VTP pruning on every switch in the domainE None of the other alternatives apply