The network administrator has di

题目

The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()

  • A、One router is running RIPv1.
  • B、RIP neighbor is 224.0.0.9.
  • C、The network contains a loop.
  • D、Network 10.10.1.0 is reachable.
参考答案和解析
正确答案:A
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()

A. Logical network diagram

B. History logs

C. Baseline configurations

D. Wiring schematics


参考答案:A

第2题:

The Ezonexam network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)

A.ARP

B.CDP

C.DHCP

D.DNS

E.ICMP


正确答案:AE
解析:Explanation:ARPfindsthehardwareaddressofahostfromaknownIPaddress.Here'showitworks:whenIPhasadatagramtosend,itmustinform.aNetworkAccessprotocol,suchasEthernetorTokenRing,ofthedestination'shardwareaddressonthelocalnetwork.(Ithasalreadybeeninformedbyupper-layerprotocolsofthedestination'sIPaddress.)IfIPdoesn'tfindthedestinationhost'shardwareaddressintheARPcache,itusesARPtofindthisinformation.ICMPworksattheNetworklayerandisusedbyIPformanydifferentservices.ICMPisamanagementprotocolandmessagingserviceproviderforIP.ItsmessagesarecarriedasIPdatagrams.RFC1256isanannextoICMP,whichaffordshosts'extendedcapabilityindiscoveringroutestogateways.Periodically,routeradvertisementsareannouncedoverthenetwork,reportingIPaddressesfortherouter'snetworkinterfaces.Hostslistenforthesenetworkinfomercialstoacquirerouteinformation.Aroutersolicitationisarequestforimmediateadvertisementsandmaybesentbyahostwhenitstartsup.

第3题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?

A.To prevent unauthorized hosts from getting access to the LAN

B.To limit the number of Layer 2 broadcasts on a particular switch port

C.To prevent unauthorized Telnet or SSH access to a switch port

D.To prevent the IP and MAC address of the switch and associated ports

E.None of the above


正确答案:A
解析:Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

第4题:

Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network.The network administrator connected to console port,issued the show ip route command,and was able to ping the server.Based on the output of the show ip route command topology shown in the graphic,what is the cause of the failure?()

A.IP routing is not enabled

B.A static route is configured incorrectly

C.The network has not fully converged

D.The FastEthernet interface on Coffee is disabled

E.The routing table on Coffee has not updated

F.The neighbor relationship table is not correctly updated


参考答案:D

第5题:

You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()

A.14

B.16

C.30

D.32

E.62

F.64


参考答案:C

第6题:

You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


正确答案:B
解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

Incorrect answers:
A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

第7题:

A company is experiencing network delays. The network administrator discovers that a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network.How could this action be responsible for the impaired network performance?()

A. Connecting a host to the old switch has created a broadcast storm.

B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.

C. The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network.

D. The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network.

E. Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network.


参考答案:E

第8题:

An administrator has found interference on a network. Which of the following cable types is thenetwork MOST likely composed of?()

A. UTP

B. Fiber

C. RG-6

D. STP


参考答案:A

第9题:

A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?()

A.ARP

B.CDP

C.DHCP

D.DNS

E.ICMP


参考答案:A, E

第10题:

An administrator has provided a 24 bit netmask.  Which of the following options indicates the number of host addresses that are available in a network?()

  • A、24
  • B、126
  • C、128
  • D、254

正确答案:D

更多相关问题