单选题While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()Aping 192.168.1.255Bping with sweep optionCping 192.168.1.127Dping 192.168.1.64Eping with broadcast option

单选题
While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()
A

ping 192.168.1.255

B

ping with sweep option

C

ping 192.168.1.127

D

ping 192.168.1.64

E

ping with broadcast option


参考解析

解析: 暂无解析

相关考题:

While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out."At which OSI layer is this problem associated with?A.The data link layerB.The application layerC.The access layerD.The session layerE.The network layer

While troubleshooting an issue in the Ezonexam LAN you notice that a network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?A. This is an Ethernet port operating at half duplexB. This is an Ethernet port operating at full duplexC. This is a port on a network interface card in a PCD. This is 10 MB/s switch portE. This is a 100 MB/s switch portF. None of the above

Your network contains a server named Server1 that runs Windows Server 2008 R2.You discover that the server unexpectedly shut down several times during the past week.You need to identify what caused the shutdowns and which software was recently installed.What should you click from Action Center?()A. Maintenance, and then View reliability historyB. Troubleshooting, and then ProgramsC. Troubleshooting, and then System and SecurityD. Troubleshooting, and then View history

Your network uses the172.12.0.0 class B address. You need to support 459 hosts per subnet, while accommodating the maximum number of subnets. Which mask would you use?A.255.255.0.0.B.255.255.128.0.C.255.255.224.0.D.255.255.254.0.E.None of the above

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()A.AB.BC.CD.D

Certkiller .com has asked you to develop an application that displays the properties for all Certkiller.com‘s network drives.The information generated by this application will be utilized by Certkiller .com‘s network administrators to verify client setups.You need to ensure that these requirements are fully satisfied.What should you do?()A.B.C.D.

While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop.Which of these can you implement to prevent future occurrences of this issue?()A.RSTPB.root guardC.BPDU guardD.GLBP

While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()A. pingB. traceC. show ip routeD. show interfaceE. show cdp neighbors

On your OSPF network, routers TK1 and TK2 belong to the same Ethernet network. However, they are unable to establish an adjacency over this link. While troubleshooting this problem, you issue the show ip ospf interface Ethernet 0command on each router. The output from these commands is displayed below:What is the underlying cause of the routers failing to become adjacent?()A. The OSPF area is misconfigured.B. The priority on TK2 should be set lower.C. The cost on TK2 should be set lower.D. The hello and dead timers are misconfigured.E. You need to add a backup designated router to the network.F. The OSPF process ID numbers do not match.

While troubleshooting a routing problem on the company EIGRP network you discover that one ofthe routers is failing to establish adjacencies with its neighbor. What is a likely cause of thisproblem between neighbors?()A、The K-values do not matchB、The hold times do not matchC、The hello times do not matchD、The AS numbers do not match

While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()A、ping 192.168.1.255B、ping with sweep optionC、ping 192.168.1.127D、ping 192.168.1.64E、ping with broadcast option

While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out."At which OSI layer is this problem associated with?()A、The data link layerB、The application layerC、The access layerD、The session layerE、The network layer

While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()A、pingB、traceC、show ip routeD、show interfaceE、show cdp neighbors

Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft   Online Responder on the internal network.   You need to recommend a secure method for Internet users to verify the validity of individual certificates.   The solution must minimize network bandwidth. What should you recommend?()A、Deploy a subordinate CA on the perimeter network.B、Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.C、Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication  requests to a server on the internal network.D、Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS  to redirect requests to the Online Responder on the internal network.

Your network contains an Active Directory domain that has two sites.    You need to identify whether logon scripts are replicated to all domain controllers.   Which folder should you verify()A、GroupPolicyB、NTDSC、SoftwareDistributionD、SYSVOL

You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.  Which inbound traffic should be allowed? ()A、 VPN TrafficB、 DNS TrafficC、 LDAP TrafficD、 HTTP TrafficE、 HTTPS TrafficF、 Traffic from the network address of 192.168.10/24

You are the administrator of an Active Directory domain. The network contains a Windows Server 2003 domain controller named Server1Users report that they experience intermittent delays when they log on to Server1. Administrators report that replication attempts between Server1 and other domain controllers are occasionally delayed.You need to verify the cause of the intermittent connection delays to Server1. You also need to find out whether the problem is related to a hardware deficiency on Server1. You need to track these delays over a period of one day.   What should you do first?()A、Run the netdiag /verbose command to perform a network diagnostic test on Server1.B、Run the replmon command to view the Active Directory replication status on Server1.C、Use Network Monitor to view the network traffic packet contents between Server1 and all other computers.D、Create a System Monitor counter to track the queue lengths on the network adapter on Server1.

You work as an Exchange Administrator for Xxx .The company has a Windows 2008 Active  Directorybased network.You have just finished deploying an Exchange 2010 server and migrating all mailboxes including resource mailboxes from Exchange Server 2003. After the migration from the Exchange 2003 server was complete, you noticed that the resource mailboxes were showing up as a shared mailbox and not a resource mailbox.You realize that you need to convert them to Exchange 2010 resource mailboxes.While logged into the Exchange Management Console, you do not see any option to convert a mailbox. What should you use to convert this Exchange 2010 shared mailbox to an Exchange 2010 resource mailbox?()A、Exchange Troubleshooting AssistantB、Exchange System ManagerC、Exchange Management ShellD、Command prompt

You are designing a Windows 7 deployment image.   You receive a baseline image over the network, from a different geographic location.   You need to verify that the baseline image is valid.   Which tool should you use?()A、ImageXB、Windows Compatibility EvaluatorC、Windows System Image Manager (Windows SIM)D、the Deployment Image Servicing and Management (DISM) tool

Your network contains a server named Server1 that runs Windows Server 2008 R2.You discover that the server unexpectedly shut down several times during the past week.You need to identify what caused the shutdowns and which software was recently installed. What should you click from Action Center?()A、Maintenance, and then View reliability historyB、Troubleshooting, and then ProgramsC、Troubleshooting, and then System and SecurityD、Troubleshooting, and then View history

You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.

单选题While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()ApingBtraceCshow ip routeDshow interfaceEshow cdp neighbors

单选题While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop. Which of these can you implement to prevent future occurrences of this issue?()ARSTPBroot guardCBPDU guardDGLBP

单选题You are the network administrator of a small Layer 2 network with 50 users. Lately, users have beencomplaining that the network is very slow. While troubleshooting, you notice that the CAM table of yourswitch is full, although it supports up to 12, 000 MAC addresses. How can you solve this issue and preventit from happening in the future?()AUpgrade the switchesBConfigure BPDU guardCConfigure VLAN access listsDConfigure port securityEConfigure Dynamic ARP inspection

单选题You are designing a Windows 7 deployment image.   You receive a baseline image over the network, from a different geographic location.   You need to verify that the baseline image is valid.   Which tool should you use?()AImageXBWindows Compatibility EvaluatorCWindows System Image Manager (Windows SIM)Dthe Deployment Image Servicing and Management (DISM) tool

多选题You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.  Which inbound traffic should be allowed? ()AVPN TrafficBDNS TrafficCLDAP TrafficDHTTP TrafficEHTTPS TrafficFTraffic from the network address of 192.168.10/24

单选题You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()AUpgrade the switchesBConfigure BPDU guardCConfigure VLAN access listsDConfigure port securityEConfigure Dynamic ARP inspection