网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()
A

Setup an ACL that allows and logs all IP traffic between the two computers

B

Configure a spanning tree to check for a loop

C

Setup a span port on the switch to watch for CRC errors

D

Connect both computers using a crossover cable


参考答案

参考解析
解析: 暂无解析
更多 “单选题An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()A Setup an ACL that allows and logs all IP traffic between the two computersB Configure a spanning tree to check for a loopC Setup a span port on the switch to watch for CRC errorsD Connect both computers using a crossover cable” 相关考题
考题 An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A. Router routes traffic between different networks and a switch does notB. The new switch is faulty and needs to be replaced and configured correctlyC. The firewall needs to be setup to allow traffic to reach the InternetD. The switch needs to be setup to forward data traffic to the Internet

考题 An administrator is troubleshooting a communication issue between two computers on the sameLayer 2 switch.Which of the following is the BEST way to determine if the switch is causing the issue?() A. Setup an ACL that allows and logs all IP traffic between the two computersB. Configure a spanning tree to check for a loopC. Setup a span port on the switch to watch for CRC errorsD. Connect both computers using a crossover cable

考题 An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()A. Issue the show ip route command on Router AB. Issue the show ip route command on Router BC. Issue the show cdp neighbors command on Router BD. Issue the show cdp neighbors detail command on Router CE. Issue the show arp command on Router AF. Issue the show arp command on Router B

考题 When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?() A.show ip access-listB.show access-listC.list ip interfaceD.show interfaceE.show ip interface

考题 Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()A、 Layer 3 routing between the Access and Aggregation layers facilities the ability to span VLANsacross multiple access switches, which is a requirement for many server virtualization andclustering technologies.B、 “East-west” server-to-server traffic can travel between aggregation modules by way of the core,but backup and replication traffic typically remains within an aggregation module.C、 Load balancing, firewall service, and other network service are commonly integrated by the useof service modules that are inserted in the aggregation switched.D、 Virtualization tools allow a cost effective approach for redundancy in the network design byusing two or four VDCs from the same physical switch.

考题 A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable,  where are the two optimal locations for trust boundaries to be configured by the network administrator?()A、hostB、IP phoneC、access layer switchD、distribution layer switchE、core layer switch

考题 Which of the following troubleshooting targets is considered to be a Layer 2 issue?(Choose allthat apply.)()A、Spanning Tree ProtocolB、CablingC、Frame forwardingD、Packet forwardingE、EtherChannelF、Routing protocols

考题 An administrator wants to limit how much data each user is storing. Which of the following will BEST address this issue?()A、 QuotasB、 SNMPC、 Disk managementD、 ACL

考题 An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()A、Setup an ACL that allows and logs all IP traffic between the two computersB、Configure a spanning tree to check for a loopC、Setup a span port on the switch to watch for CRC errorsD、Connect both computers using a crossover cable

考题 An administrator has implemented a solution to resolve a server’s problem in which the server unexpectedly reboots.  Which of the following should be the administrator’s NEXT troubleshooting step?()A、Test the theory to determine if the solution will correct the issue, list all other possible causes.B、Verify full system functionality.C、Document the issue; include details regarding findings, actions taken to resolve the issue, and the outcome.D、Establish a theory of probable cause based on previous tests and determine next steps toresolve

考题 An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()A、Issue the show ip route command on Router AB、Issue the show ip route command on Router BC、Issue the show cdp neighbors command on Router BD、Issue the show cdp neighbors detail command on Router CE、Issue the show arp command on Router AF、Issue the show arp command on Router B

考题 For what two purposes does the Ethernet protocol use physical addresses?()A、to uniquely identify devices at Layer 2B、to allow communication with devices on a different networkC、to differentiate a Layer 2 frame from a Layer 3 packetD、to establish a priority system to determine which device gets to transmit firstE、to allow communication between different devices on the same networkF、to allow detection of a remote device when its physical address is unknown

考题 When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()A、show ip access-listB、show access-listC、list ip interfaceD、show interfaceE、show ip interface

考题 An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A、Router routes traffic between different networks and a switch does notB、The new switch is faulty and needs to be replaced and configured correctlyC、The firewall needs to be setup to allow traffic to reach the InternetD、The switch needs to be setup to forward data traffic to the Internet

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue

考题 An administrator is troubleshooting issues on an application server.After a root cause analysis,the administrator has determined that there were some unauthorized logins to the server.Which of the following locations would BEST help to determine details about the unauthorized logins?()A、Active DirectoryB、DHCP logsC、Security logsD、System logs

考题 多选题A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable,  where are the two optimal locations for trust boundaries to be configured by the network administrator?()AhostBIP phoneCaccess layer switchDdistribution layer switchEcore layer switch

考题 单选题When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()A show ip access-listB show access-listC list ip interfaceD show interfaceE show ip interface

考题 单选题An administrator wants to limit how much data each user is storing. Which of the following will BEST address this issue?()A  QuotasB  SNMPC  Disk managementD  ACL

考题 单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A  Implement preventative measures.B  Close the issue.C  Document the outcome.D  Question other users to make sure they are not having the same issue.

考题 单选题An administrator has implemented a solution to resolve a server’s problem in which the server unexpectedly reboots.  Which of the following should be the administrator’s NEXT troubleshooting step?()A Test the theory to determine if the solution will correct the issue, list all other possible causes.B Verify full system functionality.C Document the issue; include details regarding findings, actions taken to resolve the issue, and the outcome.D Establish a theory of probable cause based on previous tests and determine next steps toresolve

考题 单选题Data transfer is slow between the source and destination. The quality of service requested by the transport layer in the OSI reference model is not being maintained. To fix this issue, at which layer should the troubleshooting process begin?()A presentationB sessionC transportD networkE physical

考题 单选题An administrator is troubleshooting issues on an application server.After a root cause analysis,the administrator has determined that there were some unauthorized logins to the server.Which of the following locations would BEST help to determine details about the unauthorized logins?()A Active DirectoryB DHCP logsC Security logsD System logs

考题 单选题An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A Router routes traffic between different networks and a switch does notB The new switch is faulty and needs to be replaced and configured correctlyC The firewall needs to be setup to allow traffic to reach the InternetD The switch needs to be setup to forward data traffic to the Internet

考题 单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A Implement preventative measures.B Close the issue.C Document the outcome.D Question other users to make sure they are not having the same issue

考题 多选题Which of the following troubleshooting targets is considered to be a Layer 2 issue?(Choose allthat apply.)()ASpanning Tree ProtocolBCablingCFrame forwardingDPacket forwardingEEtherChannelFRouting protocols