单选题You have just configured the network interface on systemA . The following information is  From systemB, you test the network connectivity by sending ICMP ECHO_REQUEST packets to  systemA. The following message is displayed: no answer from systemA  What

题目
单选题
You have just configured the network interface on systemA . The following information is  From systemB, you test the network connectivity by sending ICMP ECHO_REQUEST packets to  systemA. The following message is displayed: no answer from systemA  What is most likely the problem?()
A

 The interface is not plumbed.

B

 The interface is not configured.

C

 The interface does not have valid routes configured.

D

 The interface is not marked as

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You have just installed a new web server on the Testking network. You are required to ensure that the web server is accessible from the Internet. The network uses private addressing, so an IP-to-registered address mapping is required.To do this, you enter the following command:TestKing(config) ip nat inside source static 192.168.2.1 198.18.1.254 You unsuccessfully try to ping the Internet from a PC host on the LAN. During the troubleshooting process, you enter the "show ip nat translations" command but the output is blank.What is the most likely cause of the problem?()

A. The keyword overload is missing from the command.

B. The NAT pool must be defined first.

C. An access list must be defined to create static NAT translations.

D. The interfaces must be configured for NAT.

E. None of the above


参考答案:D

第2题:

As a Network Engineer, you have to master how to deploy Virtual Storage Area Network and what are the results of the deployment. Which two of the following are resulting from its deployment?()

  • A、reduced backup
  • B、increased security
  • C、greater storage demand
  • D、improved availability

正确答案:B,D

第3题:

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()

A. from source-port

B. from source-address

C. from destination-address

D. from destination-port


参考答案:B

第4题:

A banking user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA. No other users are experiencing the same issue.  Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem()

  • A、User ’joe’ is specified in the /etc/nologin on SYSTEMb.
  • B、User ’joe’ is specified in the /etc/nologin on SYSTEMa.
  • C、The file permissions on the /home/joe/.rhosts file on SYSTEMA are incorrect.
  • D、The file permissions on the /home/joe/.rhosts file on SYSTEMB are incorrect.

正确答案:D

第5题:

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()

  • A、from source-port
  • B、from source-address
  • C、from destination-address
  • D、from destination-port

正确答案:B

第6题:

You are implementing a new frame relay network to provide connectivity between you offices. To do this, you set up the frame relay network using point-to-point subinterfaces.Which of the following does NOT need to be configured?()

A. The Frame Relay encapsulation on the physical interface.

B. The local DLCI on each subinterface.

C. An IP address on the physical interface.

D. The subinterface type as point-to-point.


参考答案:C

第7题:

You work as a network engineer at TestKing.com. TestKing users have noticed extremely slow network performance, intermittent connectivity, and connection loss. After entering the show interfaces command, you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that there is evidence of late collisions. What could be the cause of this problem?()

  • A、duplex mismatch
  • B、a routing loop
  • C、trunking mode mismatch
  • D、improperly configured root bridge
  • E、improperly configured static VLAN

正确答案:A

第8题:

The router SIS-R has been configured in a CIS network. As a network administrator, you were required to enable MPLS on that router.Which of the following description is making sense on the basis of the output information?()

A. CEF switching is only needed to forward labeled packets.

B. CEF switching is needed on both ingress and egress interfaces on which MPLS is enabled.

C. Interface-level CEF switching is needed only on egress interfaces that are sending IP packets on which the egress LSR performs the label imposition process.

D. Interface-level CEF switching is needed only on ingress interfaces that are receiving IP packets on which the ingress LSR performs the label imposition process.


参考答案:D

第9题:

A user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA.  No other users are experiencing the same issue.Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem?()

  • A、User ’joe’ is specified in the /etc/nologin on SYSTEMA
  • B、User ’joe’ is specified in the /etc/nologin on SYSTEMB
  • C、The file permissions on the /home/joe/.rhosts file on SYSTEMA is correct.
  • D、The file permissions on the /home/joe/.rhosts file on SYSTEMB is incorrect.

正确答案:D

第10题:

You have a Web server that runs Windows Server 2003 Service Pack 2 (SP2). You need to collect the following information from the Web server:  (1)Unauthorized attempts to upload files  (2)Unsuccessful commands that try to run executables  You must achieve this goal by using the minimum amount of administrative effort.What should you do?()

  • A、From Network Monitor, start a capture.
  • B、From the Performance snap-in, create a counter log.
  • C、From Internet Information Services (IIS) Manager, enable logging.
  • D、From Computer Management, modify the properties of the application log.

正确答案:C

更多相关问题