the network administrator has been asked to give reasons for moving from ipv4 to ipv6. what are two valid reasons for adopting ipv6 over ipv4?()A、telnet access does not require a passwordB、natC、no broadcastD、chanage of destination address in the ipv6 headerE、chanage of source address in the ipv6 headerF、autoconfiguration
the network administrator has been asked to give reasons for moving from ipv4 to ipv6. what are two valid reasons for adopting ipv6 over ipv4?()
- A、telnet access does not require a password
- B、nat
- C、no broadcast
- D、chanage of destination address in the ipv6 header
- E、chanage of source address in the ipv6 header
- F、autoconfiguration
相关考题:
The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above
An administrator has found interference on a network. Which of the following cable types is thenetwork MOST likely composed of?() A. UTPB. FiberC. RG-6D. STP
An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?() A. Logical network diagramB. History logsC. Baseline configurationsD. Wiring schematics
You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.
The Ezonexam network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)A.ARPB.CDPC.DHCPD.DNSE.ICMP
A company is experiencing network delays. The network administrator discovers that a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network.How could this action be responsible for the impaired network performance?()A. Connecting a host to the old switch has created a broadcast storm.B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.C. The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network.D. The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network.E. Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network.
You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A.14B.16C.30D.32E.62F.64
A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?() A.ARPB.CDPC.DHCPD.DNSE.ICMP
Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network.The network administrator connected to console port,issued the show ip route command,and was able to ping the server.Based on the output of the show ip route command topology shown in the graphic,what is the cause of the failure?()A.IP routing is not enabledB.A static route is configured incorrectlyC.The network has not fully convergedD.The FastEthernet interface on Coffee is disabledE.The routing table on Coffee has not updatedF.The neighbor relationship table is not correctly updated
An administrator has provided a 24 bit netmask. Which of the following options indicates the number of host addresses that are available in a network?()A、24B、126C、128D、254
A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? ()A、ARPB、CDPC、DHCPD、DNSE、ICMP
The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.
The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?()A、Lower the bridge priority number.B、Change the MAC address of the switch.C、Increase the VTP revision number for the domain.D、Lower the root path cost on the switch ports.E、Assign the switch an IP address with the lowest value.
An etwork administrator has enabled OSPF across an NBMA network and has issued the command ip ospf network nonbroadcast. Given those facts, which two statements are true?()A、Interfaces will automatically detect and build adjacencies with neighbor routersB、DR and BDR elections will not occurC、DR and BDR elections will occurD、The neighbor command is required to build adjacenciesE、All routers must be configured in a fully meshed topology with all other routers
A natural disaster has occurred and the administrator must return the network to a healthy status.Which of the following should the administrator do in this case?()A、Follow the emergency action plan.B、Wait for an issue to be reported.C、Establish a new baseline.D、Determine if escalation is necessary.
For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).A、Disable all 802.11 trafficB、Disable the SSID from broadcastingC、Disable WPAD、Enable Bluetooth only communicationE、Change the default admin passwordF、Disable WEP
A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?()A、IPv6B、RIPC、IGRPD、RIPv2
An administrator has found interference on a network. Which of the following cable types is thenetwork MOST likely composed of?()A、UTPB、FiberC、RG-6D、STP
An administrator only has one public IP address that must be shared among five employees. Which of the following network schemes should be used?() A、SNATB、SNAPC、NACD、MPLS
A network administrator has a 10base2 network. A card is provided that has both 10base2 and 10base5 ports. Which of the following types of cables should be selected in SMIT during configuration of the adapter?()A、TPB、BNCC、DIXD、CAT5
An AIX server has 2 network interfaces and the system administrator wants to enable the users on the locally configured network interface to be able to connect to systems configured on the global network interface. How is it accomplished?()A、Enable routed on the serverB、Enable gated on the serverC、Enable ipforwarding on the serverD、Set network options back to default
单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()AOne router is running RIPv1.BRIP neighbor is 224.0.0.9.CThe network contains a loop.DNetwork 10.10.1.0 is reachable.
单选题You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A14B16C30D32E62F64
单选题An administrator has a single 14U rack. The administrator needs to install fifteen servers; rack-mounted redundant uninterruptible power supplies (UPSs), a network switch, and a KVM. Which of the following server types would be BEST suited for this scenario?()ABlade serversBRackmount serversCTower serversDWeb servers
单选题The server administrator discovers that a server, which has not been patched, is runningextremely slow and suspects that the server may have been compromised. Which of the following commands should the administrator use to check the number of network connections the server is making?()AnetstatBpingCnslookupDgrep
多选题A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? ()AARPBCDPCDHCPDDNSEICMP
单选题A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?()AIPv6BRIPCIGRPDRIPv2
多选题For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).ADisable all 802.11 trafficBDisable the SSID from broadcastingCDisable WPADEnable Bluetooth only communicationEChange the default admin passwordFDisable WEP