网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

A. Switch1(config)# i nterface fa0 /1 Switch1(config-if)# ip address 192.168.24.3.255.255.255.0

B. Switch1 (config)#interface fa0/1 Switch1 (config-if)# switchport mode trunk

C. Switch 1 (config)# i nterface fa0 /1 Switch1 (config-if)# duplex full Switch1 (config-if)# speed 100

D. Switch1 (config-if)# default-gateway 192.168.24.1

E. Switch1 (config)# line con 0 Switch1(config-line)# password cisco Switch1 (config-line)#login


参考答案

更多 “ The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()A. Switch1(config)# i nterface fa0 /1 Switch1(config-if)# ip address 192.168.24.3.255.255.255.0B. Switch1 (config)#interface fa0/1 Switch1 (config-if)# switchport mode trunkC. Switch 1 (config)# i nterface fa0 /1 Switch1 (config-if)# duplex full Switch1 (config-if)# speed 100D. Switch1 (config-if)# default-gateway 192.168.24.1E. Switch1 (config)# line con 0 Switch1(config-line)# password cisco Switch1 (config-line)#login ” 相关考题
考题 The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

考题 The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)A.Configure port Fa0/1 to accept connections only from the static IP address of the serverB.Configure the MAC address of the server as a static entry associated with port Fa0/1C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectorsD.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverE.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode

考题 A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()A. Micro segmentationB. Transparent switchingC. peer-to-peer networkingD. port securityE. store-and-forward switchingF. virtual local area networks

考题 Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrators attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A.Host B and the switch need to be in the same subnet.B.The switch needs and appropriate default gateway assigned.C.The switch interface connected to the router is down.D.Host B need to be assigned an IP address in vlan 1.E.The switch interfaces need the appropriate IP addresses assigned.

考题 Why would a network administrator configure port security on a switch()。 A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports

考题 Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()A、A level 5 password is not setB、The vty password is missingC、The console password is missingD、An ACL is blocking Telnet access

考题 Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.

考题 Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

考题 A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()A、Configure port Fa0/1 to accept connections only from the static IP address of the server.B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C、Configure the MAC address of the server as a static entry associated with port Fa0/1.D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.

考题 A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?()A、A switch in the VTP client mode cannot update its local VLAN database.B、A trunk link must be configured between the switches to forward VTP updates.C、A switch in the VTP server mode can update a switch in the VTP transparent mode.D、A switch in the VTP transparent mode will forward updates that it receives to other switches.E、A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.F、A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.

考题 A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()A、Micro segmentationB、Transparent switchingC、peer-to-peer networkingD、port securityE、store-and-forward switchingF、virtual local area networks

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable

考题 单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A Default gatewayB The ports on the switchC Port security on the server's switch portD Ethernet cable

考题 单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A One router is running RIPv1.B RIP neighbor is 224.0.0.9.C The network contains a loop.D Network 10.10.1.0 is reachable.

考题 单选题Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A Host B and the switch need to be in the same subnet.B The switch needs and appropriate default gateway assigned.C The switch interface connected to the router is down.D Host B need to be assigned an IP address in vlan 1.E The switch interfaces need the appropriate IP addresses assigned.

考题 单选题A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()A Micro segmentationB Transparent switchingC peer-to-peer networkingD port securityE store-and-forward switchingF virtual local area networks

考题 单选题Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()A A level 5 password is not setB The vty password is missingC The console password is missingD An ACL is blocking Telnet access

考题 单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A  Default gatewayB  The ports on the switchC  Port security on the servers switch portD  Ethernet cable

考题 单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A BPDUB Port securityC RSTPD STPE VTPF Blocking mode

考题 多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server onlinE.What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? ()AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 单选题The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management  domain?()A Enable VTP pruning on any switch in the management domainB Enable VTP pruning on any client switch in the domainC Enable VTP pruning on a VTP server in the management domainD Enable VTP pruning on every switch in the domainE None of the other alternatives apply

考题 单选题Why would a network administrator configure port security on a switch()。A to prevent unauthorized Telnet access to a switch portB to limit the number of Layer 2 broadcasts on a particular switch portC to prevent unauthorized hosts from accessing the LAND to protect the IP and MAC address of the switch and associated portsE to block unauthorized access to the switch management interfaces over common TCP ports

考题 单选题Why would a network administrator configure port security on a switch?()A To prevent unauthorized Telnet access to a switch port.B To limit the number of Layer 2 broadcasts on a particular switch port.C To prevent unauthorized hosts from accessing the LAN.D To protect the IP and MAC address of the switch and associated ports.E To block unauthorized access to the switch management interfaces over common TCP ports.