A network administrator is troubleshooing an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information?()A、Router# show ip eigrp adjacencyB、Router# show ip eigrp topologyC、Router# show ip eigrp interfacesD、Router# show ip eigrp neighbors
A network administrator is troubleshooing an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information?()
- A、Router# show ip eigrp adjacency
- B、Router# show ip eigrp topology
- C、Router# show ip eigrp interfaces
- D、Router# show ip eigrp neighbors
相关考题:
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA
A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()A.B.C.D.
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place. Who can authorize the DHCP servers?()A、 Chief information officerB、 IT support staff in BostonC、 IT support staff in New YorkD、 Network administrator in ChicagoE、 Network administrator in New York
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter
Before inserting a new switch in the network,the network administrator checks that the VTP domain name is correct,the VTP mode is set to server, and revision is lower than the switches in the network. The administrator then configures interfaces and trunks,erases existing VLANs,and connects the switch to the network. Following that procedure,there is no connectivity in the network. What is a possible cause of this problem?()A、Because the configuration revision of the new switches is lower than the rest of the network, it can change the VLAN database of the other switches.B、As a VTP server, the new switch deleted all VLANs of the network.C、Erasing VLANs increases the VTP configuration revision.D、Since the configuration revision of the network is higher than the new switch, the VLAN database was automatically synchronized.
The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management domain?()A、Enable VTP pruning on any switch in the management domainB、Enable VTP pruning on any client switch in the domainC、Enable VTP pruning on a VTP server in the management domainD、Enable VTP pruning on every switch in the domainE、None of the other alternatives apply
A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A、 That there are no DHCP relay serversB、 That the user account on Active Directory is not lockedC、 That the network card driver is not installed incorrectlyD、 The network connection is functioning
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable
Which of the following configuration management documentation types would an administrator useto know how and when to property install new network devices on the LAN?()A、Baseline configurationB、Logical network diagramC、Network policyD、Wiring schematic
Which of the following would help a new administrator quickly determine if a network had a VLANfor its publicly accessible servers?()A、BaselinesB、RegulationsC、Logical network diagramsD、Wiring schematics
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic
Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS
On which of the following network devices would an administrator configure an ACL?()A、RouterB、HubC、RepeaterD、NIC
单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()ADefault gatewayBThe ports on the switchCPort security on the server's switch portDEthernet cable
单选题A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A That there are no DHCP relay serversB That the user account on Active Directory is not lockedC That the network card driver is not installed incorrectlyD The network connection is functioning
单选题An administrator is notified that all network printers are not printing. The administrator reviews the server and the print service is started. Which of the following is the cause of the problem?()AThe drivers for the printers are failing.BThe spool folder is full.CThe spool folder is not on the C drive.DA network printer was disconnected.
单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()ADisable SSIDBWPACMAC filteringDRAS
单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()ABPDUBPort securityCRSTPDSTPEVTPFBlocking mode
单选题The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management domain?()AEnable VTP pruning on any switch in the management domainBEnable VTP pruning on any client switch in the domainCEnable VTP pruning on a VTP server in the management domainDEnable VTP pruning on every switch in the domainENone of the other alternatives apply