GLBP
RSTP
BPDU guard
root guard
第1题:
While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop.Which of these can you implement to prevent future occurrences of this issue?()
A.RSTP
B.root guard
C.BPDU guard
D.GLBP
第2题:
While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop. Which of these can you implement to prevent future occurrences of this issue?()
第3题:
Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network. What should you do? ()
第4题:
As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()
第5题:
You are the network administrator for Company. Your network consists of one Windows NT Server 4.0 domain and 35 Windows 2000 Professional computers. The network consists of five interconnected TCP/IP subnets. All of the computers use TCP/IP as the only network protocol. You are adding 15 Windows 2000 Professional computers to the network. You configure each of the new computers to use DHCP. The computers can communicate with each other but are unable to communicate outside their own subnet. You run the ipconfig command to examine the UP address on one of the new computers. The IP address is 169.254.101.72 You want to enable the Windows 2000 Professional computers to communicate outside their own subnet. What should you do?()
第6题:
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home. Which two actions should you perform?()
第7题:
It provides reliable input for verifying network consistency.
It requires a network audit to support some upgrade decisions.
It requires a network audit to support any network restructuring.
It begins with gathering organizational input that may be inaccurate.
第8题:
Only use fiber in pairs.
Configure root guard on your switches.
Do not use fiber but use copper.
Configure UDLD to prevent one-way link conditions.
第9题:
Install a DHCP server.
Install a WINS server. Configure each computer to use WINS.
Create an Lmhost file on each computer.
Create a Hosts file on each computer.
第10题:
NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.
NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.
第11题:
RSTP
root guard
BPDU guard
GLBP
第12题:
You should use /63.
You should use /64.
You should use /61.
You should use /62.
第13题:
As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()
第14题:
You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()
第15题:
You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()
第16题:
As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)
第17题:
You are the network administrator for ExamSheet.net. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()
第18题:
You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()
第19题:
Set the driver signing option to block.
Set the driver signing option to ignore.
In the computer’s BIOS, reserve an unused IRQ for ISA devices.
In the Device Manager, configure the second ISA network adapter to use an unused IRQ.
第20题:
Set the security type to the No authentication (Open) option.
Configure the wired and wireless network adapters as a network bridge.
Modify the wireless network profile type to the Use all-user profiles only (recommended) option.
On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.
第21题:
Restart the computer in the docking station.
Run the Add/Remove Hardware wizard.
Use Device Manager to scan for hardware changes.
Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.
Install the new network adapter driver.
第22题:
Perform a network audit.
Form an impression about the network.
Use traffic analysis to augment organizational input.
Prepare and add to the network description.
第23题:
Only use fiber in pairs.
Configure root guard on your switches.
Do not use fiber but use copper.
Configure UDLD to prevent one-way link conditions.