网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A company is experiencing network delays. The network administrator discovers that a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network.How could this action be responsible for the impaired network performance?()

A. Connecting a host to the old switch has created a broadcast storm.

B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.

C. The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network.

D. The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network.

E. Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network.


参考答案

更多 “ A company is experiencing network delays. The network administrator discovers that a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network.How could this action be responsible for the impaired network performance?()A. Connecting a host to the old switch has created a broadcast storm.B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.C. The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network.D. The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network.E. Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network. ” 相关考题
考题 An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?() A.IDSB.IPSC.FirewallD.Managed PKI

考题 Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()A.AB.BC.CD.D

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center

考题 A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A. RIP v1B. RIP v2C. IGRPD. OSPFE. EIGRP

考题 A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A、RIP v1B、RIP v2C、IGRPD、OSPFE、EIGRP

考题 A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()A、255.255.240.0B、255.255.248.0C、255.255.252.0D、255.255.254.0E、255.255.255.0F、255.255.255.192

考题 An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

考题 You are the network administrator for Company. Company’s network consists of 200 Windows 2000 Professional computers. CompanyW1 is a Windows 2000 Server computer that hosts Company’s intranet site. CompanyP1 is a computer running Microsoft Proxy Server that is used by all computers on the network to access the Internet. You discover that CompanyP1 is experiencing performance degradation due to large number of requests to authenticate with the proxy server. You want to minimize the number of authentication requests to the proxy server. What should you do on each computer?()A、Configure the proxy server settings to have a Secure proxy address of CompanyP1.B、Configure the proxy server settings to bypass the proxy server for local addresses.C、Add CompanyW1 to the Local intranet zone.D、Add the CompanyW1 to the list of trusted sites.

考题 The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.

考题 The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management  domain?()A、Enable VTP pruning on any switch in the management domainB、Enable VTP pruning on any client switch in the domainC、Enable VTP pruning on a VTP server in the management domainD、Enable VTP pruning on every switch in the domainE、None of the other alternatives apply

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

考题 An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI

考题 Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

考题 You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.

考题 You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box. 

考题 You are a systems engineer for your company. Your company has 20,000 users in a large campus environment located in Los Angeles. Each department in the company is located in its own building. Each department has its own IT staff, which is responsible for all network administration within the building.   The company’s network is divided into several IP subnets that are connected to one another by using dedicated routers. Each building on the company’s main campus contains at least one subnet, and possibly up to five subnets. Each building has at least one router. All routers use RIP version 2 (RIPv2) broadcasts.   The company acquires a new business unit located in Denver. The Denver office has 25 users. The network in the Denver office is connected to the network at the main campus by using a leased frame relay connection. The network administrator at the Denver office installs a Windows Server 2003 computer and configures Routing and Remote Access on this server. The network administrator at the Denver office configures this server as a router and implements RIPv2 in Routing and Remote Access.   Later, the Denver administrator reports that his router is not receiving routing table updates from the routers on the main campus network. He must manually add routing entries to the routing table to enable connectivity between the locations. You investigate and discover that the RIPv2 broadcasts are not being received at the Denver office. You also discover that no routing table announcements from the Denver office are being received on the main campus network.  You need to ensure that the network in the Denver office can communicate with the main campus network and can send and receive automatic routing table updates as network conditions change.   What should you do on the router in the Denver office?()A、 Configure the router to use RIPv1 broadcasts.B、 Configure the router to use auto-static update mode.C、 Add the IP address ranges of the main campus network to the router’s Accept list and Announce list.D、 Add the IP addresses of the main campus routers to the router’s Neighbors list.

考题 单选题A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A RIP v1B RIP v2C IGRPD OSPFE EIGRP

考题 单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A One router is running RIPv1.B RIP neighbor is 224.0.0.9.C The network contains a loop.D Network 10.10.1.0 is reachable.

考题 单选题You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()A  Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B  Configure the network adapter on the test network to disable IEEE 802.1x authentication.C  Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D  Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E  Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.

考题 单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()A msiB mstC zapD zip

考题 单选题A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()A 255.255.240.0B 255.255.248.0C 255.255.252.0D 255.255.254.0E 255.255.255.0F 255.255.255.192

考题 单选题The server administrator discovers that a server, which has not been patched, is runningextremely slow and suspects that the server may have been compromised. Which of the following commands should the administrator use to check the number of network connections the server is making?()A netstatB pingC nslookupD grep

考题 单选题The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management  domain?()A Enable VTP pruning on any switch in the management domainB Enable VTP pruning on any client switch in the domainC Enable VTP pruning on a VTP server in the management domainD Enable VTP pruning on every switch in the domainE None of the other alternatives apply

考题 单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()A You should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.B You should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.C You should consider having the new server joined to an Active Directory domain.D You should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.

考题 单选题Users are reporting that they are still experiencing network issues even though a fix was recentlyapplied. Which of the following troubleshooting methodology steps is the administrator using?()A Escalating the problemB Testing the solution and identifying the effectsC Continuing to gather information about the same symptomsD Documenting the solution and the entire process

考题 单选题A system administrator is trying to troubleshoot company wide email problems that may be related to DNS.  Which of the following network tools would be MOST useful to determine if it is a DNS issue?()A netstatB tracertC nslookupD ping