As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose

题目

As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()

  • A、GLBP
  • B、RSTP
  • C、BPDU guard
  • D、root guard

相似考题
更多“As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose ”相关问题
  • 第1题:

    As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop.Enabling which of the following feature will be able to prevent this problem from happening again?()

    A.GLBP

    B.RSTP

    C.BPDU guard

    D.root guard


    参考答案:C

  • 第2题:

    While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop.Which of these can you implement to prevent future occurrences of this issue?()

    A.RSTP

    B.root guard

    C.BPDU guard

    D.GLBP


    参考答案:C

  • 第3题:

    As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()

    • A、Enable the highest level of Syslogging available to ensure you log all possible event messages
    • B、Use SSH to access your Syslog information
    • C、Log all messages to the system buffer so that they can be displayed when accessing the router
    • D、Syncronize clocks on the network with a protocol such as Network Time Protocol

    正确答案:D

  • 第4题:

    You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()

    • A、 Only use fiber in pairs.
    • B、 Configure root guard on your switches.
    • C、 Do not use fiber but use copper.
    • D、 Configure UDLD to prevent one-way link conditions.

    正确答案:D

  • 第5题:

    You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()

    • A、Set the driver signing option to block.
    • B、Set the driver signing option to ignore.
    • C、In the computer’s BIOS, reserve an unused IRQ for ISA devices.
    • D、In the Device Manager, configure the second ISA network adapter to use an unused IRQ.

    正确答案:D

  • 第6题:

    As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()

    • A、An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.
    • B、The counters were deleted.
    • C、The ARP cache was removed.
    • D、The IP EIGRP neighbor relationship was cleared manually.

    正确答案:A,D

  • 第7题:

    As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)

    • A、cost savings
    • B、product variety
    • C、well-tested interoperability
    • D、regular upgrade process

    正确答案:A,C

  • 第8题:

    You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

    • A、Disable the Connect even if the network is not broadcasting option.
    • B、In the Network and Sharing Center window, click the Diagnose and repair option.
    • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
    • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

    正确答案:D

  • 第9题:

    You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured.   What should you do?()

    • A、From a command prompt, run the diskperf command.
    • B、Run Network Monitor in dedicated capture mode.
    • C、Configure a Network Monitor capture filter.
    • D、Increase the buffer size in Network Monitor.

    正确答案:B

  • 第10题:

    You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()

    • A、You should use /63.
    • B、You should use /64.
    • C、You should use /61.
    • D、You should use /62.

    正确答案:B

  • 第11题:

    多选题
    You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()
    A

    Restart the computer in the docking station.

    B

    Run the Add/Remove Hardware wizard.

    C

    Use Device Manager to scan for hardware changes.

    D

    Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.

    E

    Install the new network adapter driver.


    正确答案: C,E
    解析: 暂无解析

  • 第12题:

    单选题
    You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()
    A

     Only use fiber in pairs.

    B

     Configure root guard on your switches.

    C

     Do not use fiber but use copper.

    D

     Configure UDLD to prevent one-way link conditions.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)

    A. It provides reliable input for verifying network consistency.

    B. It requires a network audit to support some upgrade decisions.

    C. It requires a network audit to support any network restructuring.

    D. It begins with gathering organizational input that may be inaccurate.


    参考答案:A, C, D

  • 第14题:

    You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()

    • A、Upgrade the switches
    • B、Configure BPDU guard
    • C、Configure VLAN access lists
    • D、Configure port security
    • E、Configure Dynamic ARP inspection

    正确答案:D

  • 第15题:

    While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop. Which of these can you implement to prevent future occurrences of this issue?()

    • A、RSTP
    • B、root guard
    • C、BPDU guard
    • D、GLBP

    正确答案:C

  • 第16题:

    Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()

    • A、Set the security type to the No authentication (Open) option.
    • B、Configure the wired and wireless network adapters as a network bridge.
    • C、Modify the wireless network profile type to the Use all-user profiles only (recommended) option.
    • D、On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.

    正确答案:B

  • 第17题:

    As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()

    • A、NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
    • B、NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
    • C、NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.
    • D、NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.

    正确答案:B

  • 第18题:

    As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()

    • A、Perform a network audit.
    • B、Form an impression about the network.
    • C、Use traffic analysis to augment organizational input.
    • D、Prepare and add to the network description.

    正确答案:C

  • 第19题:

    You are the network administrator for Company.  Your network consists of one Windows NT Server 4.0 domain and 35 Windows 2000 Professional computers. The network consists of five interconnected TCP/IP subnets. All of the computers use TCP/IP as the only network protocol. You are adding 15 Windows 2000 Professional computers  to the network.   You configure each of the new computers to use DHCP. The computers can communicate with each other but are unable to communicate outside their own subnet.    You run the ipconfig command to examine the UP address on one of the new computers. The IP address is 169.254.101.72   You want to enable the Windows 2000 Professional computers to communicate outside their own subnet.   What should you do?()

    • A、Install a DHCP server.
    • B、Install a WINS server. Configure each computer to use WINS.
    • C、Create an Lmhost file on each computer.
    • D、Create a Hosts file on each computer.

    正确答案:A

  • 第20题:

    You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()

    • A、Restart the computer in the docking station.
    • B、Run the Add/Remove Hardware wizard.
    • C、Use Device Manager to scan for hardware changes.
    • D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.
    • E、Install the new network adapter driver.

    正确答案:B,E

  • 第21题:

    Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()

    • A、When you configure access to the wired network at home, set the wired network adapter location type to Public.
    • B、When you configure access to the wired network at home, set the wired network adapter location type to Private.
    • C、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.
    • D、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.

    正确答案:B,C

  • 第22题:

    多选题
    As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)
    A

    It provides reliable input for verifying network consistency.

    B

    It requires a network audit to support some upgrade decisions.

    C

    It requires a network audit to support any network restructuring.

    D

    It begins with gathering organizational input that may be inaccurate.


    正确答案: B,C
    解析: 暂无解析

  • 第23题:

    单选题
    As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()
    A

    Perform a network audit.

    B

    Form an impression about the network.

    C

    Use traffic analysis to augment organizational input.

    D

    Prepare and add to the network description.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()
    A

    You should use /63.

    B

    You should use /64.

    C

    You should use /61.

    D

    You should use /62.


    正确答案: C
    解析: 暂无解析