单选题As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()AGLBPBRSTPCBPDU guardDroot guard

单选题
As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()
A

GLBP

B

RSTP

C

BPDU guard

D

root guard


参考解析

解析: 暂无解析

相关考题:

When you are(71)a home or small office network, it is recommended that you use the Network Setup Wizard in Windows XP Home Edition to enable Internet Connection Sharing. The Network Setup Wizard automatically provides all of the network settings you need to(72)one Internet connection with all the computers in your network.After ICS is enabled, and you make sure that all of your computers can(73)with each other and they have Internet(74), you can use programs such as Internet Explorer and Outlook Express as if they were(75)connected to the Internet service provider(ISP). When a request to the Internet is made, the ICS host computer connects to the ISP and creates the connection so that other computers can reach a specified Web address or download E-mail.A.creatingB.reachC.going forD.setting up

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()A.AB.BC.CD.D

As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop.Enabling which of the following feature will be able to prevent this problem from happening again?()A.GLBPB.RSTPC.BPDU guardD.root guard

As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)A. It provides reliable input for verifying network consistency.B. It requires a network audit to support some upgrade decisions.C. It requires a network audit to support any network restructuring.D. It begins with gathering organizational input that may be inaccurate.

While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop.Which of these can you implement to prevent future occurrences of this issue?()A.RSTPB.root guardC.BPDU guardD.GLBP

As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()A、Enable the highest level of Syslogging available to ensure you log all possible event messagesB、Use SSH to access your Syslog informationC、Log all messages to the system buffer so that they can be displayed when accessing the routerD、Syncronize clocks on the network with a protocol such as Network Time Protocol

While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop. Which of these can you implement to prevent future occurrences of this issue?()A、RSTPB、root guardC、BPDU guardD、GLBP

You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()A、 Only use fiber in pairs.B、 Configure root guard on your switches.C、 Do not use fiber but use copper.D、 Configure UDLD to prevent one-way link conditions.

Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()A、Set the security type to the No authentication (Open) option.B、Configure the wired and wireless network adapters as a network bridge.C、Modify the wireless network profile type to the Use all-user profiles only (recommended) option.D、On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.

You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()A、Set the driver signing option to block.B、Set the driver signing option to ignore.C、In the computer’s BIOS, reserve an unused IRQ for ISA devices.D、In the Device Manager, configure the second ISA network adapter to use an unused IRQ.

As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()A、Perform a network audit.B、Form an impression about the network.C、Use traffic analysis to augment organizational input.D、Prepare and add to the network description.

As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)A、cost savingsB、product varietyC、well-tested interoperabilityD、regular upgrade process

You are the network administrator for Company.  Your network consists of one Windows NT Server 4.0 domain and 35 Windows 2000 Professional computers. The network consists of five interconnected TCP/IP subnets. All of the computers use TCP/IP as the only network protocol. You are adding 15 Windows 2000 Professional computers  to the network.   You configure each of the new computers to use DHCP. The computers can communicate with each other but are unable to communicate outside their own subnet.    You run the ipconfig command to examine the UP address on one of the new computers. The IP address is 169.254.101.72   You want to enable the Windows 2000 Professional computers to communicate outside their own subnet.   What should you do?()A、Install a DHCP server.B、Install a WINS server. Configure each computer to use WINS.C、Create an Lmhost file on each computer.D、Create a Hosts file on each computer.

You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()A、When you configure access to the wired network at home, set the wired network adapter location type to Public.B、When you configure access to the wired network at home, set the wired network adapter location type to Private.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.

You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.

多选题As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)AIt provides reliable input for verifying network consistency.BIt requires a network audit to support some upgrade decisions.CIt requires a network audit to support any network restructuring.DIt begins with gathering organizational input that may be inaccurate.

单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()ASet the driver signing option to block.BSet the driver signing option to ignore.CIn the computer’s BIOS, reserve an unused IRQ for ISA devices.DIn the Device Manager, configure the second ISA network adapter to use an unused IRQ.

单选题You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs?()AOnly use fiber in pairs.BConfigure root guard on your switches.CDo not use fiber but use copper.DConfigure UDLD to prevent one-way link conditions.

单选题Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()ASet the security type to the No authentication (Open) option.BConfigure the wired and wireless network adapters as a network bridge.CModify the wireless network profile type to the Use all-user profiles only (recommended) option.DOn each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.

单选题You are the network administrator for ExamSheet. Your network consists of one Windows NT Server 4.0 domain and 35 Windows 2000 Professional computers. The network consists of five interconnected TCP/IP subnets. All of the computers use TCP/IP as the only network protocol. You are adding 15 Windows 2000 Professional computers to the network. You configure each of the new computers to use DHCP. The computers can communicate with each other but are unable to communicate outside their own subnet. You run the ipconfig command to examine the IP address on one of the new computers. The IP address is 169.254.101.72 You want to enable the Windows 2000 Professional computers to communicate outside their own subnet. What should you do?()AInstall a DHCP server.BInstall a WINS server. Configure each computer to use WINS.CCreate an Lmhost file on each computer.DCreate a Hosts file on each computer.

多选题You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()ARestart the computer in the docking station.BRun the Add/Remove Hardware wizard.CUse Device Manager to scan for hardware changes.DCopy the network adapter driver to the Winnt/Driver Cache/i386 folder.EInstall the new network adapter driver.

单选题As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()ANetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.BNetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.CNetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.DNetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.

单选题As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()APerform a network audit.BForm an impression about the network.CUse traffic analysis to augment organizational input.DPrepare and add to the network description.

单选题While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop. Which of these can you implement to prevent future occurrences of this issue?()ARSTPBroot guardCBPDU guardDGLBP

单选题You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()A Only use fiber in pairs.B Configure root guard on your switches.C Do not use fiber but use copper.D Configure UDLD to prevent one-way link conditions.

单选题You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()AYou should use /63.BYou should use /64.CYou should use /61.DYou should use /62.