单选题An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()AHubBBridgeCSwitchDRouter
单选题
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()
A
Hub
B
Bridge
C
Switch
D
Router
参考解析
解析:
暂无解析
相关考题:
Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?() A.HubB.VLANC.RouterD.Server
An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router
An administrator is unable to ping a workstation. Which of the following tools would BEST help toresolve the issue?() A. Cable testerB. MultimeterC. Toner probeD. Protocol analyzer
Which of the following tools can an administrator use to get a server baseline?() A. System Resource MonitorB. Microsoft Baseline Security Analyzer (MBSA)C. Replication MonitorD. Performance Monitor
Several reports are logged stating that an application server is performing slowly. During the investigation, the administrator notices that the hard drives on the server appear to have a high level of activity.Which items should the administrator monitor using performance monitoring tools?()A. Page FileB. Disk UtilizationC. System TemperatureD. Processor UtilizationE. Network Utilization
You are a network administrator and you need to implement a routing protocol onyour network that provides:* Scalability* VLSM support* Minimal overhead* Support for connecting networks using routers of multiple vendorsWhich of the following routing protocol would best serve your needs?()A. VTPB. RIP version 1C. EIGRPD. OSPFE. IGRPF. CDP
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A. applicationB. presentationC. sessionD. transportE. internetF. data link
You are a network administrator and you need to implement a routing protocol on your network that provides: * Scalability * VLSM support * Minimal overhead * Support for connecting networks using routers of multiple vendors Which of the following routing protocol would best serve your needs?()A、VTPB、RIP version 1C、EIGRPD、OSPFE、IGRPF、CDP
A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A、applicationB、presentationC、sessionD、transportE、internetF、data link
While using a packet analyzer, you notice four additional bytes being added to the packets in the Company network. Which protocol inserts a four byte tag into the Ethernet frame and recalculates CRC value? ()A、 DTPB、 VTPC、 802.1QD、 ISLE、 None of the other alternatives apply
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A、applicationB、presentationC、sessionD、transportE、internetF、datalink
An administrator is unable to ping a workstation. Which of the following tools would BEST help toresolve the issue?()A、Cable testerB、MultimeterC、Toner probeD、Protocol analyzer
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router
Which of the following tools can an administrator use to get a server baseline?()A、System Resource MonitorB、Microsoft Baseline Security Analyzer (MBSA)C、Replication MonitorD、Performance Monitor
Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()A、HubB、VLANC、RouterD、Server
Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()A、The endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,B、The endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.C、The endpoint is using EAP-FAST with EAP-GTC as the inner protocol,D、The endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor. B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet. What are two possible ways to achieve this goal?()A、Monitor the events in the application log on Server1.B、Monitor the events in the security log on Server1.C、Monitor the Web server connections on Server1 by using a performance log.D、Monitor network traffic to Server1 by using Network Monitor.E、Monitor the IIS logs on Server1.
单选题An administrator is configuring an application monitor. Upon encountering an unrecoverable error the administrator does not want the resource group to failover. How can the application monitor be configured toachieve this?()AConfigure the application monitor with a restart count of 0BConfigure the application monitor with a monitor mode of NotifyCConfigure the application monitor with a notify method of MonitorDConfigure the application monitor with a failure action of Notify
单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A Enable audit object access and specify files and folders to monitor using Task Manager.B Enable audit policy change and specify files and folders to monitor using Windows Explorer.C Enable audit object access and specify files and folders to monitor using Windows Explorer.D Open Performance Monitor and monitor folder activity.
单选题While using a packet analyzer, you notice four additional bytes being added to the packets in the Company network. Which protocol inserts a four byte tag into the Ethernet frame and recalculates CRC value? ()A DTPB VTPC 802.1QD ISLE None of the other alternatives apply
单选题A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()AapplicationBpresentationCsessionDtransportEinternetFdata link
单选题A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()AapplicationBpresentationCsessionDtransportEinternetFdatalink
多选题Several reports are logged stating that an application server is performing slowly. During the investigation, the administrator notices that the hard drives on the server appear to have a high level ofactivity. Which items should the administrator monitor using performance monitoring tools? ()APage FileBDisk UtilizationCSystem TemperatureDProcessor UtilizationENetwork Utilization
单选题You are a network administrator and you need to implement a routing protocol on your network that provides: * Scalability * VLSM support * Minimal overhead * Support for connecting networks using routers of multiple vendors Which of the following routing protocol would best serve your needs?()AVTPBRIP version 1CEIGRPDOSPFEIGRPFCDP
多选题Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()AThe endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,BThe endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.CThe endpoint is using EAP-FAST with EAP-GTC as the inner protocol,DThe endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.
多选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet. What are two possible ways to achieve this goal?()AMonitor the events in the application log on Server1.BMonitor the events in the security log on Server1.CMonitor the Web server connections on Server1 by using a performance log.DMonitor network traffic to Server1 by using Network Monitor.EMonitor the IIS logs on Server1.