网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A company is experiencing network delays. The network administrator discovers that a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network. How could this action be responsible for the impaired network performance?()
A

Connecting a host to the old switch has created a broadcast storm.

B

The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.

C

The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network.

D

The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network.

E

Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A company is experiencing network delays. The network administrator discovers that a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network. How could this action be responsible for the impaired network performance?()A Connecting a host to the old switch has created a broadcast storm.B The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.C The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network.D The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network.E Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network.” 相关考题
考题 ● A (75) system placed between the company network and the outside world may limit outside access to the internal network.(75)A. firewallB. modemC. gatewayD. key

考题 A(75)system placed between the company network and the outside world may limit outside access to the internal network.A.firewallB.modemC.gatewayD.key

考题 Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?() A. Network diagramB. Performance baselineC. Network security procedureD. Company policy

考题 You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

考题 A ______ system placed between the company network and the outside world may limit outside access to the internal network.A.firewallB.modemC.gatewayD.key

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center

考题 A company is experiencing network delays. The network administrator discovers that a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network.How could this action be responsible for the impaired network performance?()A. Connecting a host to the old switch has created a broadcast storm.B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.C. The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network.D. The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network.E. Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network.

考题 VOIP is being implemented on the Company network. In a properly designed network,  what is the  maximum amount of time a voice package should spend crossing a network?  ()A、90 millisecondsB、120 millisecondsC、150 millisecondsD、240 milliseconds

考题 A new client of yours is experiencing a growth spurt. The client s IT staff is making network changes manually and, as a consequence, is extremely overworked, You suggest the client implement a network management system, citing which important business benefit?()A、 potential for outsourcing the IT staffB、 provision of an out-of-band managementarchitetureC、 threat mitigationD、 reduction in network downtime

考题 Jitter is causing problems with the VOIP application in the Company network.  What causes  network jitter?()A、Variable queue delaysB、Packet dropsC、Transmitting too many small packetsD、Compression

考题 You are the network administrator for Company. Company’s network consists of 200 Windows 2000 Professional computers. CompanyW1 is a Windows 2000 Server computer that hosts Company’s intranet site. CompanyP1 is a computer running Microsoft Proxy Server that is used by all computers on the network to access the Internet. You discover that CompanyP1 is experiencing performance degradation due to large number of requests to authenticate with the proxy server. You want to minimize the number of authentication requests to the proxy server. What should you do on each computer?()A、Configure the proxy server settings to have a Secure proxy address of CompanyP1.B、Configure the proxy server settings to bypass the proxy server for local addresses.C、Add CompanyW1 to the Local intranet zone.D、Add the CompanyW1 to the list of trusted sites.

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

考题 Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()A、AshortB、Open pairsC、ESDD、EMI

考题 Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A、Network diagramB、Performance baselineC、Network security procedureD、Company policy

考题 A DNS server for a large network is experiencing performance problems.  Which of the following options is the best solution to fix the problem?()A、Enable NISB、Purchase a larger serverC、Use /etc/hosts on all of the systemsD、Create secondary name servers throughout the network

考题 Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

考题 You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.

考题 You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box. 

考题 单选题A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A RIP v1B RIP v2C IGRPD OSPFE EIGRP

考题 单选题Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()A Configure the NWLink frame type of the network adapters to be ethernet 802.3.B Configure the NWLink frame type of the network adapters to be ethernet II.C Replace the network adapters with 10/100 BNC adapters.D Replace the network adapters with 10/100 UTP network adapters.

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 单选题You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()A  Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B  Configure the network adapter on the test network to disable IEEE 802.1x authentication.C  Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D  Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E  Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.

考题 单选题VOIP is being implemented on the Company network. In a properly designed network,  what is the  maximum amount of time a voice package should spend crossing a network?  ()A 90 millisecondsB 120 millisecondsC 150 millisecondsD 240 milliseconds

考题 单选题A new client of yours is experiencing a growth spurt. The client s IT staff is making network changes manually and, as a consequence, is extremely overworked, You suggest the client implement a network management system, citing which important business benefit?()A  potential for outsourcing the IT staffB  provision of an out-of-band managementarchitetureC  threat mitigationD  reduction in network downtime

考题 单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()A You should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.B You should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.C You should consider having the new server joined to an Active Directory domain.D You should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.

考题 单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A  Create an IPsec Enforcement Network policyB  Create an 802.1X enforcement network policyC  Create a wired network (IEEE 802.3) Group PolicyD  Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy

考题 单选题A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?()A CoaxialB CAT3C CAT5D CAT5e