A network administrator receives an error message while trin

题目
单选题
A network administrator receives an error message while tring to configure the Ethernet interface of a router with IP address 10.24.24.24/29. which statement explains the reason for this issue?()
A

The address is abroadcast address.

B

The Ehernet interface is faulty.

C

VLSM-capable routing protocols must be enable first on the router.

D

This address is a network address.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

While configuring a new adapter using cfgmgr, an administrator receives a warning message indicating that some device packages are not installed. Additionally, the adapter displays in the Defined state.Which command will resolve the issue and make the adapter available?()

A.shutdown -Fr

B.cfgmgr -i <lpp_source>

C.mkdev -l <device_name>

D.mknode /dev/<device_name>


参考答案:B

第2题:

A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? ()

A.informational

B.emergency

C.warning

D.critical

E.debug

F.error


参考答案:B, D, F

第3题:

A router receives a packet from a neighbor with an MPLS shim header value of 0.What does the router do with this packet?()

A. It performs a label pop operation and an IP lookup.

B. It performs a label swap operation and an IP lookup.

C. It sends an error message toward the egress router.

D. It sends an error message toward the ingress router.


参考答案:A

第4题:

A network administrator receives an error message while tring to configure the Ethernet interface of a router with IP address 10.24.24.24/29. which statement explains the reason for this issue?()

  • A、The address is abroadcast address.
  • B、The Ehernet interface is faulty.
  • C、VLSM-capable routing protocols must be enable first on the router.
  • D、This address is a network address.

正确答案:D

第5题:

A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? ()

  • A、informational
  • B、emergency
  • C、warning
  • D、critical 
  • E、debug
  • F、error

正确答案:B,D,F

第6题:

An administrator attempts a traceroute but receives a "Destination Unreadable" message. Which protocol is responsible for that message?()

A. RARP

B. RUDP

C. ICMP

D. SNMP


参考答案:C

第7题:

An administrator attempts a traceroute but receives a "Destination Unreadable" messagE.Which protocol is responsible for that message?()

A.RARP

B.RUDP

C.ICMP

D.SNMP


参考答案:C

第8题:

You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


正确答案:B
解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

Incorrect answers:
A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

第9题:

When upgrading the IOS image, the network administrator receives the exhibited error message. What could be the cause of this error?()

  • A、The new IOS image is too large for the router flash memory.
  • B、The TFTP server is unreachable from the router.
  • C、The new IOS image is not correct for this router platform.
  • D、The IOS image on the TFTP server is corrupt.
  • E、There is not enough disk space on the TFTP server for the IOS image.

正确答案:B

第10题:

A technician receives a boot error message OS not found. Which of the following should thetechnician check? ()

  • A、The boot order in the BIOS
  • B、If Plug and Play is enabled
  • C、If the computer is in Safe Mode
  • D、If the BIOS is current

正确答案:A

更多相关问题