单选题The network administrator is asked to configure 113 point-to-point links. Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?()A10.10.0.0/18 subnetted with mask 255.255.255.252B10.10.0.0/25 subnetted with mask 255.255.255.252C10.10.0.0/24 subnetted with mask 255.255.255.252D10.10.0.0/23 subnetted with mask 255.255.255.252E10.10.0.0/16 subnetted with mask 255.255.255.252
单选题
The network administrator is asked to configure 113 point-to-point links. Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?()
A
10.10.0.0/18 subnetted with mask 255.255.255.252
B
10.10.0.0/25 subnetted with mask 255.255.255.252
C
10.10.0.0/24 subnetted with mask 255.255.255.252
D
10.10.0.0/23 subnetted with mask 255.255.255.252
E
10.10.0.0/16 subnetted with mask 255.255.255.252
参考解析
解析:
暂无解析
相关考题:
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?() A. ICMPB. SNMPC. TCPD. HTTPS
Using network monitoring tools would allow an administrator to do which of the following?() A. Configure offline devicesB. Examine performance issuesC. Install additional software and updatesD. View syslog events
In a point-to point network, which address are OSPF hello packets sent to?() A.127.0.0.1B.192.168.0.5C.223.0.0.1D.172.16.0.1E.224.0.0.5F.254.255.255.255.255
The network administrator has asked you to check the status of the workstation’s IP stack by pinging the loopback address.Which address would you ping to perform this task?() A.10.1.1.1B.127.0.0.1C.192.168.0.1D.239.1.1.1
A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()A.B.C.D.
You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()A、Upgrade the switchesB、Configure BPDU guardC、Configure VLAN access listsD、Configure port securityE、Configure Dynamic ARP inspection
You are the network administrator of a small Layer 2 network with 50 users. Lately, users have beencomplaining that the network is very slow. While troubleshooting, you notice that the CAM table of yourswitch is full, although it supports up to 12, 000 MAC addresses. How can you solve this issue and preventit from happening in the future?()A、Upgrade the switchesB、Configure BPDU guardC、Configure VLAN access listsD、Configure port securityE、Configure Dynamic ARP inspection
The network administrator has asked you to check the status of the workstation’s IP stack by pinging the loopback address.Which address would you ping to perform this task?()A、10.1.1.1B、127.0.0.1C、192.168.0.1D、239.1.1.1
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
Using network monitoring tools would allow an administrator to do which of the following?()A、Configure offline devicesB、Examine performance issuesC、Install additional software and updatesD、View syslog events
A network administrator repeatedly receives support calls about network issues. After investigating the issues, the administrator finds that the source NAT pool is running out of addresses.To be notified that the pool is close to exhaustion, what should the administrator configure?()A、Use the pool-utilization-alarm raise-threshold under the security nat source stanza.B、Use a trap-group with a category of services under the SNMP stanza.C、Use an external script that will run a show command on the SRX Series device to see when the pool is close to exhaustion.D、Configure a syslog message to trigger a notification when the pool is close to exhaustion.
You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network. What should you do?()A、Configure a DNS suffix.B、Configure a subnet mask.C、Configure an LMHOSTS file.D、Configure an Interface metric.E、Configure at least one DNS address.
Users report an intermittent degradation of sound on their IP phones. Which of the following woulda network administrator do to alleviate the problem?()A、Use plenum cablesB、Provide fault tolerance for the switchC、Configure VLAN trunking on the switchD、Configure QoS
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS
A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()A、Configure roles based on departments and assign access based on source IP address.B、Configure roles based on the user's manager and assign access based on the user's MAC addressC、Configure roles based on group memberships and assign a specific VLAN to the role.D、Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.
Certkiller .com has a domain controller that runs Windows Server 2008. The Certkiller .com network boosts 40 Windows Vista client machines. As an administrator at Certkiller .com, you want to deploy Active Directory Certificate service (AD CS) to authorize the network users by issuing digital certificates. What should you do to manage certificate settings on all machines in a domain from one main location()A、Configure Enterprise CA certificate settingsB、Configure Enterprise trust certificate settingsC、Configure Advance CA certificate settingsD、Configure Group Policy certificate settingsE、All of the above
Cisco IOS is the software used on the vast majority of Cisco Systems routers and current Cisco network switches. As a network administrator, you are required to configure MPLS on Cisco IOS. In such a situation, which three of the following steps are necessary to take?()A、Start LDP.B、Enable CEF switching.C、Configure conditional label advertising.D、Enable label switching on frame mode interfaces.E、disable IP TTL propagationF、configure conditional label advertising
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge()。A、Establish a direct link from the switch to all other switches in the network.B、Assign the switch a higher MAC address than the other switches in the network have.C、Configure the switch so that it has a lower priority than other switches in the network.D、Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.E、Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.
The network administrator is asked to configure 113 point-to-point links.Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?()A、10.10.0.0/18 subnetted with mask 255.255.255.252B、10.10.0.0/25 subnetted with mask 255.255.255.252C、10.10.0.0/24 subnetted with mask 255.255.255.252D、10.10.0.0/23 subnetted with mask 255.255.255.252E、10.10.0.0/16 subnetted with mask 255.255.255.252
You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication. What supported authentication server should be chosen?()A、TACACS with LEAP extensionsB、RADIUS with EAP extensionsC、TACACS+D、LDAP
On which of the following network devices would an administrator configure an ACL?()A、RouterB、HubC、RepeaterD、NIC
You are the administrator of Company.com’s Windows 2000 Network. Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer. You want to complete the configuration to allow the computers to communicate on the network. What should you do?()A、Configure a HOSTS file.B、Configure a LMHOSTS file.C、Configure a WINS server database.D、Configure a DHCP server address.E、Configure at least one DNS address.
You are a network administrator for ExamSheet.net's Windows 2000 network. Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully. What should you do? ()A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B、Start the RunAs service and configure the service to start automatically.C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D、Use Scheduled Tasks to configure the task to run under the security context of your account.
You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()A、Enable Internet Connection SharingB、Enable on-demand dialingC、Enable sharing a modem on one computer on the networkD、Configure a DHCP ServerE、Disable Internet Connection SharingF、Configure all the other computers to be DHCP enabled.
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.
You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.
单选题The network administrator is asked to configure 113 point-to-point links.Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?()A10.10.0.0/18 subnetted with mask 255.255.255.252B10.10.0.0/25 subnetted with mask 255.255.255.252C10.10.0.0/24 subnetted with mask 255.255.255.252D10.10.0.0/23 subnetted with mask 255.255.255.252E10.10.0.0/16 subnetted with mask 255.255.255.252