网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()

A. RIP v1

B. RIP v2

C. IGRP

D. OSPF

E. EIGRP


参考答案

更多 “ A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A. RIP v1B. RIP v2C. IGRPD. OSPFE. EIGRP ” 相关考题
考题 An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?() A.IDSB.IPSC.FirewallD.Managed PKI

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center

考题 A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()A.B.C.D.

考题 A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A、RIP v1B、RIP v2C、IGRPD、OSPFE、EIGRP

考题 Which statement is true about the Cisco Self-Defending Network?()A、The Cisco Self-Defending Network defines the physical position of the firewall to protect against internal and external attacksB、The Cisco Self-Defending Network Provides static filtering against known and unknown internal and external attacksC、The Cisco Self-defending Network Provides dynamic protection against known and unknown internal and external attacksD、The Cisco Self-defending Network Provides the Elements to install the antivirus software on the End-User Workstation

考题 What are three factors a network administrator must consider before implementing Netflow in the network?()A、CPU utilizationB、where Netflow data will be sentC、number of devices exporting Netflow dataD、port availabilityE、SNMP versionF、WAN encapsulation

考题 You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()A、 Chief information officerB、 IT support staff in BostonC、 IT support staff in New YorkD、 Network administrator in ChicagoE、 Network administrator in New York

考题 The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.

考题 You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

考题 Which three of these are elements of the Cisco Unified Wireless Network architecture?()A、cell phonesB、remote accessC、mobility servicesD、network managementE、network unificationF、network decentralization

考题 As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()A、using DHCP snoopingB、snooping the incoming 802.1Q VLAN tagC、using CDPD、snooping the CoS marking on the incoming frames

考题 As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you how to create separate networks on one Storage Area Network so as to provide enhanced availability, security, etc. Which of the following solution will enable that?()A、Cisco Direct Attached StorageB、Cisco Virtual Attached Storage NetworkC、Cisco Virtual Storage Area NetworkD、Cisco Direct Storage Area Network

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

考题 Which one is not the feature of the Cisco Unified Wireless Network architecture?()A、network unificationB、remote accessC、mobility servicesD、network management

考题 An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

考题 You are designing a Windows Server 2008 R2 Hyper-V virtualization environment. Your host servers must have the following elements:  A dedicated management network adapter.A dedicated virtual network for child iSCSI network traffic.A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing.  Which adapters should you choose?()A、three network adapters that support 802.1pB、two network adapters that support 802.1q, and one iSCSI host bus adapterC、two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyD、two network adapters that support 802.1q, and one network adapter that supports Jumbo frames

考题 You are the network administrator for your company. The network contains 12 Windows Server 2003 computers and 300 Windows XP Professional computers. Three servers named Server4, Server5, and Server6 run a critical business application. When performing performance baselining on these three servers, you notice that Server6 has a larger number of concurrently connected users at any given moment than Server4 or Server5. The additional workload is causing performance problems on Server6. You need to identify which client computers are connecting to Server6.You plan to run Network Monitor on Server6 to capture all packets sent to Server6. The capture task must be configured to meet the following requirements.To reduce the size of the captured data, you want to capture only the packet headers.If a large number of packets are captured, the packets must be retained on the server. Captured packets must not overwrite previously captured packets.   Which two tasks should you perform to configure Network Monitor?()A、Configure the Network Monitor display filters.B、Configure the Network Monitor capture filters.C、Increase the Network Monitor buffer size setting.D、Decrease the Network Monitor buffer size setting.E、Increase the Network Monitor frame size setting.F、Decrease the Network Monitor frame size setting.

考题 单选题A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A RIP v1B RIP v2C IGRPD OSPFE EIGRP

考题 单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A One router is running RIPv1.B RIP neighbor is 224.0.0.9.C The network contains a loop.D Network 10.10.1.0 is reachable.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

考题 单选题As an experienced network administrator, you are aware of the knowledge that it is unnecessary to configure complex overlay network topologies while applying Cisco Wide Area Application Services (WAAS) technology. What is most probably the reason for that?()A Content pre-positioningB Automatic discovery of Cisco WAEsC Comprehensive logs, reports, and graphsD Remote scheduling of software distribution

考题 单选题You are designing a Windows Server 2008 R2 Hyper-V Virtualization environment. Your host servers must have the following elements: - A dedicated management network adapter. - A dedicated virtual network for child iSCSI network traffic. - A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()A Two network adapters that support 802.1p, and one iSCSI host bus adapterB Two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyC Two network adapters that support 802.lq, and one network adapter that supports Jumbo framesD Three network adapters that support 802. 1p

考题 单选题You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()A  Chief information officerB  IT support staff in BostonC  IT support staff in New YorkD  Network administrator in ChicagoE  Network administrator in New York

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()A Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.B Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.C Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.D Create a Pattern Match capture trigger for the 131.107.0.1 IP address.

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB detailed security device specificationsC results from pilot network testingD results from a network audit

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A a list of applications currently in use in the networkB IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsC detailed security device specificationsD results from pilot network testing