网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
The network administrator is trying to add Switch1 to the network, but the 802.1Q trunk is not coming up. Switch1 was previously tested in the laboratory and its trunk configuration worked fine. What are three possible causes of this problem? ()
A

The trunking configuration mode on Switch1 is set to Off.

B

The trunking configuration mode on the other end is set to On.

C

The trunking configuration mode on the other end is set to Desirable.

D

Cisco Discovery Protocol is not running on the other end.

E

There is a VTP domain name mismatch.

F

Switch1 does not support 802.1Q.


参考答案

参考解析
解析: 暂无解析
更多 “多选题The network administrator is trying to add Switch1 to the network, but the 802.1Q trunk is not coming up. Switch1 was previously tested in the laboratory and its trunk configuration worked fine. What are three possible causes of this problem? ()AThe trunking configuration mode on Switch1 is set to Off.BThe trunking configuration mode on the other end is set to On.CThe trunking configuration mode on the other end is set to Desirable.DCisco Discovery Protocol is not running on the other end.EThere is a VTP domain name mismatch.FSwitch1 does not support 802.1Q.” 相关考题
考题 You are the administrator for your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 20 new PXE-compliant computers on the marketing segment of your network. The new computers do not have operating systems installed.You create a RIS image. You load the image onto the RIS server. You then start the new computers.You find that the new computers cannot connect to the RIS server. You verify that the new computers cannot connect to the RIS server. You verify that the existing client computers in the network can connect to the network servers, including the RIS server. You want to enable the new computers to connect to the RIS server.What should you do?A.Add a Windows 2000 Server computer running WINS to the network.B.Add a Windows 2000 Server computer running DHCP to the network.C.Add the domain Everyone group to the RIS OS image security settings.D.Place the new computers on the same segment as the RIS server.

考题 You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?A.Configure an ADM template and add the template to the GPO.B.Configure an INF policy and add the policy to the GPO.C.Configure a Microsoft Windows installer package and add the package to the GPO.D.Configure RIS to include the registry entry.

考题 Refer to the exhibit. ROUTE.com has just implemented this EIGRP network. A network administrator came to you for advice while trying to implement load balancing across part of their EIGRP network. If the variance value is configured as 2 on all routers and all o ther metric and K values are configured to their default values, traffic from the Internet to the data center will be load balanced across how many paths? ()A. 1B. 2C. 3D. 4E. 5

考题 The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()A. Switch1(config)# i nterface fa0 /1 Switch1(config-if)# ip address 192.168.24.3.255.255.255.0B. Switch1 (config)#interface fa0/1 Switch1 (config-if)# switchport mode trunkC. Switch 1 (config)# i nterface fa0 /1 Switch1 (config-if)# duplex full Switch1 (config-if)# speed 100D. Switch1 (config-if)# default-gateway 192.168.24.1E. Switch1 (config)# line con 0 Switch1(config-line)# password cisco Switch1 (config-line)#login

考题 下列哪些命令中需指明关联NE的ID()A、equipbscxblB、equipbscaxcdrC、equipbsccicD、add_conn

考题 The network security policy requires that only one host be permitted to attach dynamically to each switch interfacE.If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? ()A、Switch1(config-if)# switchport port-security maximum 1B、Switch1(config)# mac-address-table secureC、Switch1(config)# access-list 10 permit ip hostD、Switch1(config-if)# switchport port-security violation shutdownE、Switch1(config-if)# ip access-group 10

考题 A network associate is trying to understand the operation of the FLD Corporation by studying the network in the exhibit. The associate knows that the server in VLAN 4 provides the necessary resources to support the user hosts in the other VLANs. The associate needs to determine which interfaces are access ports. Which interfaces are access ports? ()A、Switch1 - Fa 0/2B、Switch1 - Fa 0/9C、Switch2 - Fa 0/3D、Switch2 - Fa 0/4E、Switch2 - Fa 0/8F、Router - Fa 1/0

考题 The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。A、Switch1(config-if)# switchport port-security maximum 1B、Switch1(config)# mac-address-table secureC、Switch1(config)# access-list 10 permit ip hostD、Switch1(config-if)# switchport port-security violation shutdownE、Switch1(config-if)# ip access-group 10

考题 The network administrator is trying to add Switch1 to the network, but the 802.1Q trunk is not coming up. Switch1 was previously tested in the laboratory and its trunk configuration worked fine. What are three possible causes of this problem? ()A、The trunking configuration mode on Switch1 is set to Off.B、The trunking configuration mode on the other end is set to On.C、The trunking configuration mode on the other end is set to Desirable.D、Cisco Discovery Protocol is not running on the other end.E、There is a VTP domain name mismatch.F、Switch1 does not support 802.1Q.

考题 A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem? ()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0A、The process id is configured improperlyB、The OSPF area is configured improperlyC、The network wildcard mask is configured improperlyD、The network number is configured improperlyE、The AS is configured improperlyF、The network subnet mask is configuerd improperly

考题 You are subneting in the network, out of network address,what’s feature can add one more address?

考题 A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?()A、CAT3 cableB、Serial cableC、Crossover cableD、Rollover cable

考题 An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again.  Which of the following is the MOST likely reason for this?()A、 The administrator improperly configured the virtual memory settings on the server.B、 The administrator is using incorrect patch switches for the install.C、 The administrator is trying to install security patches for software that is not installed.D、 The administrator is trying to install patches that require hard drive encryption on the server.

考题 A system administrator received the following message while trying to ssh to a server:  connection timed out.The administrator pinged the server and had no response. The administrator then pinged the gateway, and was successful. Which tool could the administrator use next to isolate the problem?()A、routeB、tracerouteC、netstat -nrD、broadcast ping

考题 The system administrator notices that IP packets are not getting forwarded. The system administrator wants to use an AIX machine as an internetwork router over TCP/IP networks. Which of the following commands will allow this change on the fly?()A、 Some network attributes are runtime attributes that can be changed at any time. Others are loadtime attributes that must be set before the netinet kernel extension is loaded and be placed in the /etc/rc.net or /etc/rc.bsdnet file. This parameter cannot be done on the fly, since a reboot is required.B、 Add to the /etc/rc.net file or if a Berkelye-style network configuration, /etc/rc.bsdnet, and issue the command: no -a ipforwarding=1 to start ipforwarding immediately.C、 Add to the /etc/rc.net file or if a Berkeley-style network configuration, /etc/rc.bsdnet, and issue the command: no -o ipforwarding=0 to start ipforwarding immediately.D、 Add to the /etc/rc.net file or if a Berkeley-style network configuration, /etc/rc.bsdnet, and issue the command: no -o ipforwarding=1 to start ipforwarding immediately.

考题 A network administrator wants to analyze the historical performance of the servers in the organization and forecast the system performance needs into the future.  Which add-on component of IBM Director would be used to assist with this task?()A、Capacity ManagerB、Resource MonitorsC、System AvailabilityD、System Performance Monitor

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

考题 Your network contains a Hyper-V host named Hyperv1 that runs Windows Server 2012 R2. Hyperv1 has a virtual switch named Switch1. You replace all of the network adapters on Hyperv1 with new network adapters that support singleroot I/O virtualization (SR-IOV). You need to enable SR-IOV for all of the virtual machines on Hyperv1. Which two actions should you perform?()A、On each virtual machine, modify the Advanced Features settings of the network adapterB、Modify the settings of the Switch1 virtual switchC、Delete, and then recreate the Switch1 virtual switchD、On each virtual machine, modify the BIOS settingsE、On each virtual machine, modify the Hardware Acceleration settings of the network adapter

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TestKing17 hosts several shared folders. Users report that they receive an error message when they try to connect to the shared folders. The error message states: "No more connections can be made to this remote computer at this time because there are already as many connections as the computer can accept." How should you solve the problem?()A、Add an additional network adapter to TestKing17. Configure a network bridge between the new network adapter and the original network adapter.B、Purchase additional per-seat licenses for TestKing17. In Control Panel on TestKing17, run the Licensing application. Add the additional licenses to TestKing17.C、Disable quota management on TestKing17.D、In Active Directory Sites and Services, select the site that contains TestKing17. Add an additional Active Directory connection object to the domain controller for the site.

考题 You work as an Exchange Administrator for Xxx Inc.The company has a Windows 2008 Active Directorybased network.The network contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG attachments be filtered so that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of the following commands will you use to accomplish the task?()A、Add-AttachmentFilterEntry -Name *.jpeg -Type ContentTypeB、Add-AttachmentFilterEntry -Name *.exe -Type FileNameC、Add-AttachmentFilterEntry -Name image/jpeg -Type ContentTypeD、Add-AttachmentFilterEntry -Name image/jpeg -Type FileName

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TK1 contains a large number of files that are frequently accessed by network users. Users report unacceptable response times on TK1. You compare the current performance of TK1 to a system performance baseline that you created several weeks ago. You decide that TK1 needs a higher-performance network adapter. After you add the appropriate network adapter, users report satisfactory performance. You need to gather new server performance data so you can establish a new performance baseline for TK1. You open the Performance console. What should you do next?()A、Add all counters for the Network Interface object to the System Monitor object.B、Create a new trace log object. Under Events logged by system provider in the new object, select the Network TCP/IP setting. Start the trace log.C、Create a new counter log object. Add all counters for the Network Interface object to the new object. Start the counter.D、Create a new alert object.

考题 You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .The Xxx network has a mail server named XXX-EX01.What actions must you take to do an unattended installation of Exchange Server 2010 server on XXXEX01?()A、You should add recipient filter.B、You should add create Send connectors.C、You should run setup /ps.D、You should add setup.com in the script.

考题 Your companys network includes an Active Directory Domain Services (AD DS) domain. You manage Hyper-V servers by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You install Windows Server 2008 R2 Datacenter (Server Core Installation) on 100 new servers, and you add the servers to the domain. You need to add the Hyper-V role to the 100 new servers. You must accomplish this goal by using the least amount of administrative effort. What should you do?()A、Run the Add-WindowsFeature RSAT-Hyper-V PowerShell cmdlet.B、In Server Manager, use the Add Roles Wizard to add the Hyper-V role.C、In the VMM Administrator Console, use the Add Hosts Wizard to individually add each new server to VMM.D、In the VMM Administrator Console, use the Add Hosts Wizard to simultaneously add all 100 new servers to VMM.

考题 You are the administrator of a small network supporting Windows NT 4.0 computers. You configure a setup script to automatically upgrade Windows NT Workstation 4.0 computers to Windows 2000 Professional. When you attempt to test the process on a single computer, you receive this error message:  "The specified Setup script file (path:/unattend.txt) is inaccessible or invalid.  Contact your system administrator."    Which action will most likely resolve this error? ()A、Add the UnattendedInstall="Yes" parameter to the [Unattended] section of your Unattend.txt fileB、Add the UnattendMode=FullUnattended parameter to the [Data] section of your Unattend.txt fileC、Add the UnattendedInstall="Yes" parameter to the [GuiUnattended] section   of your Unattend.txt fileD、Add the UnattendMode=FullUnattended parameter to the [Unattended] section of your Unattend.txt file

考题 单选题An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?()A The administrator improperly configured the virtual memory settings on the server.B The administrator is using incorrect patch switches for the install.C The administrator is trying to install security patches for software that is not installed.D The administrator is trying to install patches that require hard drive encryption on the server.

考题 多选题The network administrator is trying to add Switch1 to the network, but the 802.1Q trunk is not coming up. Switch1 was previously tested in the laboratory and its trunk configuration worked fine. What are three possible causes of this problem?()AThe trunking configuration mode on Switch1 is set to Off.BThe trunking configuration mode on the other end is set to On.CThe trunking configuration mode on the other end is set to Desirable.DCisco Discovery Protocol is not running on the other end.EThere is a VTP domain name mismatch.FSwitch1 does not support 802.1Q.

考题 单选题A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?() Router(config)#router ospf 1 Router(config-router)#network 10.0.0.0 255.0.0.0 area 0A The process id is configured improperlyB The OSPF area is configured improperlyC The network wildcard mask is configured improperlyD The network number is configured improperlyE The AS is configured improperlyF The network subnet mask is configuerd improperly

考题 单选题A system administrator is trying to troubleshoot company wide email problems that may be related to DNS.  Which of the following network tools would be MOST useful to determine if it is a DNS issue?()A netstatB tracertC nslookupD ping