An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()A、Issue the show ip route command on Router AB、Issue the show ip route command on Router BC、Issue the show cdp neighbors command on Router BD、Issue the show cdp neighbors detail command on Router CE、Issue the show arp command on Router AF、Issue the show arp command on Router B

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

  • A、Issue the show ip route command on Router A
  • B、Issue the show ip route command on Router B
  • C、Issue the show cdp neighbors command on Router B
  • D、Issue the show cdp neighbors detail command on Router C
  • E、Issue the show arp command on Router A
  • F、Issue the show arp command on Router B

相关考题:

请根据短文内容判断给出的语句是否正确,正确的写“T”,错误的写“F”。Hiring the right employee is a challenging process for a company. A bad hire not just wastes your time and money, but also impacts the team spirit and company morale. A good hire, however, pays you back in employee productivity, successful employment relationship, and business culture enhancement. Here are certain rules that you can use to select the right employee.Design an effective advertisement. A clearly targeted ad. attracts qualified candidates and discourages others. You can make your ad. More effective with a precise and specific job description.Ask the right job interview questions. The purpose of the interview is to find out if the candidate is a strong fit to your business. By using a sequence of particularly designed questions, you are able to get a true picture of your potential employee.Check backgrounds and references. Background checking helps you reduce risks and improve the overall quality of hire. You need to verify that all the presented credentials, skills, and experience are actually possessed by your candidate.( ) 26. Hiring the wrong employee is expensive, costly to a company, and time consuming.( ) 27. A company has to spend a lot of money hiring a right employee.( ) 28. An advertisement with a clear target will make all candidates lose courage.( ) 29. Well designed interview questions can help you know more about the candidates.( ) 30. Work experience is one of the primary things for an employer to verify in background checking.

I have never worked for such a considerate________; I think all the other________ have the same opinion. A.employee...employerB.employee...employersC.employer...employeeD.employer...employees

Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()A.Modify the time zone for the computer.B.Modify the IPv4 settings on the computer.C.Create an A record for the computer in an internal DNS zone.D.Request that an administrator create a prestaged computer account in the domain.

While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop.Which of these can you implement to prevent future occurrences of this issue?()A.RSTPB.root guardC.BPDU guardD.GLBP

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()A. Issue the show ip route command on Router AB. Issue the show ip route command on Router BC. Issue the show cdp neighbors command on Router BD. Issue the show cdp neighbors detail command on Router CE. Issue the show arp command on Router AF. Issue the show arp command on Router B

The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A. Lower the bridge priority number.B. Change the MAC address of the switch.C. Increase the VTP revision number for the domain.D. Lower the root path cost on the switch ports.E. Assign the switch an IP address with the lowest value.

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

What are two reasons a network administrator would use CDP?() A. to verify the type of cable interconnecting two devicesB. to determine the status of network services on a remote deviceC. to obtain VLAN information from directly connected switchesD. to verify Layer 2 connectivity between two devices when Layer 3 failsE. to obtain the IP address of a connected device in order to telnet to the deviceF. to determine the status of the routing protocols between directly connected routers

A medium-sized company has a Class C IP address. It has two Cisco routers and one non-Cisco router. All three routers are using RIP version 1. The company network is using the block of 198.133.219.0/24. The company has decided it would be a good idea to split the network into three smaller subnets and create the option of conserving addresses with VLSM. What is the best course of action if the company wants to have 40 hosts in each of the three subnets?()A.Convert all the routers to EIGRP and use 198.133.219.32/27, 198.133.219.64/27, and 198.133.219.92/27 as the new subnetworks.B.Maintain the use of RIP version 1 and use 198.133.219.32/27, 198.133.219.64/27, and 133.219.92/27 as the new subnetworks.C.Convert all the routers to EIGRP and use 198.133.219.64/26, 198.133.219.128/26, and 133.219.192/26 as the new subnetworks.D.Convert all the routers to RIP version 2 and use 198.133.219.64/26, 198.133.219.128/26, and 133.219.192/26 as the new subnetworks.E.Convert all the routers to OSPF and use 198.133.219.16/28, 198.133.219.32/28, and 198.133.219.48/28 as the new subnetworks.F.Convert all the routers to static routes and use 198.133.219.16/28, 198.133.219.32/28, and

You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()A、Verify that different native VLANs exist between two switches for security purposes.B、Verify that the switch is configured to allow for trunking on the switch ports.C、Verify that each switch port has the proper IP address space assigned to it for the new VLAN. D、Verify that the VLAN virtual interface has been correctly created and enabled.

While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop. Which of these can you implement to prevent future occurrences of this issue?()A、RSTPB、root guardC、BPDU guardD、GLBP

You have just created a new VLAN on your network.  What is one step that  you should include in your VLAN based implementation and verification plan? ()A、Verify that different native VLANs exist between two switches for security purposes.B、Verify that the VLAN was added on all switches with the use of the show vlan command. C、Verify that the switch is configured to allow for trunking on the switch ports.D、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.

A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()A、Two switch ports will be needed on a switch,two Ethernet cables will be needed for theserver each connecting to two different Ethernet cards,and one IP address will be neededB、Two switch ports will be needed on two different switches two Ethernet cables will beneeded for the server each connecting to two different Ethernet cards,and one IP address will be neededC、Two switch ports will be needed on two different switches,two Ethernet cables will be needed for the server each connecting to two different Ethernet cards,two different IP addresses will be neededD、One switch port will be needed on one switch,a splitter will be needed to split the connection,two Ethernet cables will be needed for the server each connecting to two different Ethernet cards,and two different IP addresses will be needed

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

What are two reasons a network administrator would use CDP (Choose two.)()。A、to verify the type of cable interconnecting two devicesB、to determine the status of network services on a remote deviceC、to obtain VLAN information from directly connected switchesD、to verify Layer 2 connectivity between two devices when Layer 3 failsE、to obtain the IP address of a connected device in order to telnet to the deviceF、to determine the status of the routing protocols between directly connected routers

What are two reasons a network administrator would use CDP?()A、to verify the type of cable interconnecting two devicesB、to determine the status of network services on a remote deviceC、to obtain VLAN information from directly connected switchesD、to verify Layer 2 connectivity between two devices when Layer 3 failsE、to obtain the IP address of a connected device in order to telnet to the deviceF、to determine the status of the routing protocols between directly connected routers

An administrator has set up a company’s intranet server.Users should be able to access it but nousers are able to.The administrator verifies that the website is accessible by IP address.Which of the following should the administrator look at FIRST to resolve the issue?()A、WINS serverB、DNS serverC、Lmhosts fileD、DHCP cache

An administrator is overseeing the backup process and tapes utilized by a former employee.Which of the following is the BEST way for the administrator to proceed?()A、Utilize differential backups.B、Verify the tape drives are functional.C、Verify that the backups are functional.D、Utilize incremental backups.

Several users are sending emails to CompTIA.org. but they are not being received. Which of thefollowing commands could be used to verify that the company is able to connect to the mailservice at CompTIA.org?()A、PingB、ArpC、DigD、telnet

A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()A、Two switch ports will be needed on a switch, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.B、Two switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.C、Two switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, two different IP addresses will be needed.D、One switch port will be needed on one switch, a splitter will be needed to split the connection, two ethernet cables will be needed for the server each connecting to two different Ethernet cards, and two different IP addresses will be needed.

You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.The organization contains 1,200 mailboxes with an average size of 700 MB.Company.com employees make use of Microsoft Office Outlook 2010 or Outlook Web App to access their email.Company.com employees who run Microsoft Office Outlook 2010 are configured to make use of the Cached Exchange Mode.During the course of the day you receive an instruction from the CIO to devise a mailbox solution for the organization.Management wants you to make sure that administrators are able to search and locate any message.You should also ensure that the size of the offline store (OST) for every employee is decreased as well as providing access to e-mail messages using Outlook 2010 or Outlook Web App. What should you do?()A、You should consider having a second disabled user account as well as second mailbox created for every employee.Thereafter the journal rules should be configured in order to journal all the messages for every employee to the second mailbox of the employees.B、You should consider having a Personal Archive created for every employee.Then a retention policy should be created.C、Thereafter employees should be instructed to compact the OST file.D、You should consider having a new disabled user account as well as a new mailbox named Journaling Mailbox created.Thereafter journal rules should be configured in order to journal all the messages for employees to the Journaling Mailbox.E、You should consider having a personal folder (PST) file created for every employee.Then the PST files should be stored on the network share.Thereafter employees should be instructed to compact the OST file.

Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()A、Modify the time zone for the computer.B、Modify the IPv4 settings on the computer.C、Create an A record for the computer in an internal DNS zone.D、Request that an administrator create a prestaged computer account in the domain.

单选题An employee named Drew is leaving your company. A new employee named Adam will replace him. Drew has a local user account on a Windows 2000 Professional computer, with rights and permissions to multiple files and folders on the computer. You want Adam to have the same rights and permissions. How will you achieve this with the least administrative efforts? ()ARename Drew’s user account to Adam, and change the account password.BCreate a new account and link it to the previous users account.CDelete the account and create a new one.DAdd a new user account to all the groups that the previous employee was added.

单选题A medium-sized company has a Class C IP address. It has two Cisco routers and one non-Cisco router. All three routers are using RIP version 1. The company network is using the block of 198.133.219.0/24. The company has decided it would be a good idea to split the network into three smaller subnets and create the option of conserving addresses with VLSM. What is the best course of action if the company wants to have 40 hosts in each of the three subnets?()AConvert all the routers to EIGRP and use 198.133.219.32/27, 198.133.219.64/27, and 198.133.219.92/27 as the new subnetworks.BMaintain the use of RIP version 1 and use 198.133.219.32/27, 198.133.219.64/27, and 133.219.92/27 as the new subnetworks.CConvert all the routers to EIGRP and use 198.133.219.64/26, 198.133.219.128/26, and 133.219.192/26 as the new subnetworks.DConvert all the routers to RIP version 2 and use 198.133.219.64/26, 198.133.219.128/26, and 133.219.192/26 as the new subnetworks.EConvert all the routers to OSPF and use 198.133.219.16/28, 198.133.219.32/28, and 198.133.219.48/28 as the new subnetworks.FConvert all the routers to static routes and use 198.133.219.16/28, 198.133.219.32/28, and

单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A Lower the bridge priority number.B Change the MAC address of the switch.C Increase the VTP revision number for the domain.D Lower the root path cost on the switch ports.E Assign the switch an IP address with the lowest value.

单选题An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()AIssue the show ip route command on Router ABIssue the show ip route command on Router BCIssue the show cdp neighbors command on Router BDIssue the show cdp neighbors detail command on Router CEIssue the show arp command on Router AFIssue the show arp command on Router B

问答题Practice 7  ● A new designer, Mary Watts, has just joined your company.  ● Write a memo to all staff:  ● Telling them who the new employee is;  ● Saying what her responsibilities will be;  ● Explaining where her office is located.  ● Write about 30—40 words.