As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop.Enabling which of the following feature will be able to prevent this problem from happening again?()
A.GLBP
B.RSTP
C.BPDU guard
D.root guard
第1题:
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()

A.A
B.B
C.C
D.D
第2题:
A new router, named TK1, is being installed. You wish to add this router to your existing OSPF network. In doing so, you configure the following: TK1(config)# router ospf 1 TK1(config-router)# network 10.10.10.0 255.255.255.0 area 0 After making this change, you notice that the networks attached to TK1 are not being learned by the other OSPF routers. What could be the cause of this?()
第3题:
As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()
第4题:
As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()
第5题:
As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you how to create separate networks on one Storage Area Network so as to provide enhanced availability, security, etc. Which of the following solution will enable that?()
第6题:
As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)
第7题:
Your network contains a server named Server1 that runs Windows Server 2008 R2.You discover that the server unexpectedly shut down several times during the past week.You need to identify what caused the shutdowns and which software was recently installed. What should you click from Action Center?()
第8题:
Only use fiber in pairs.
Configure root guard on your switches.
Do not use fiber but use copper.
Configure UDLD to prevent one-way link conditions.
第9题:
Enable the highest level of Syslogging available to ensure you log all possible event messages
Use SSH to access your Syslog information
Log all messages to the system buffer so that they can be displayed when accessing the router
Syncronize clocks on the network with a protocol such as Network Time Protocol
第10题:
Upgrade the switches
Configure BPDU guard
Configure VLAN access lists
Configure port security
Configure Dynamic ARP inspection
第11题:
Only use fiber in pairs.
Configure root guard on your switches.
Do not use fiber but use copper.
Configure UDLD to prevent one-way link conditions.
第12题:
Upgrade the switches
Configure BPDU guard
Configure VLAN access lists
Configure port security
Configure Dynamic ARP inspection
第13题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()

A.A
B.B
C.C
D.D
第14题:
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()
第15题:
As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()
第16题:
As an experienced Network Engineer, you are responsible for network connectivity and system configuration. Which of the following protocols will be supported by Cisco Nonstop Forwarding (NSF)?()
第17题:
As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)
第18题:
You are the network administrator for ExamSheet.net. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()
第19题:
You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured. What should you do?()
第20题:
Set the driver signing option to block.
Set the driver signing option to ignore.
In the computer’s BIOS, reserve an unused IRQ for ISA devices.
In the Device Manager, configure the second ISA network adapter to use an unused IRQ.
第21题:
RSTP
root guard
BPDU guard
GLBP
第22题:
An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.
The counters were deleted.
The ARP cache was removed.
The IP EIGRP neighbor relationship was cleared manually.
第23题:
NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.
NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.
第24题:
It provides reliable input for verifying network consistency.
It requires a network audit to support some upgrade decisions.
It requires a network audit to support any network restructuring.
It begins with gathering organizational input that may be inaccurate.