Your network has a mixture of Fast Ethernet and Gigabit Ethernet links. What needs t o be done to ensure optimal data routing when using OSPF?()A、Nothing. OSPF will determine the most optimal path for routing data by default.B、Adjust the hello and dead timers for more rapid detection of link failures.C、Increase the reference - bandw idth used to calculate the interface default metrics, on all routers in your network.D、Set the priority values on every broadcast interface to ensure that the designated and backup designated routers are the routers with the most processor and memory resources.

Your network has a mixture of Fast Ethernet and Gigabit Ethernet links. What needs t o be done to ensure optimal data routing when using OSPF?()

  • A、Nothing. OSPF will determine the most optimal path for routing data by default.
  • B、Adjust the hello and dead timers for more rapid detection of link failures.
  • C、Increase the reference - bandw idth used to calculate the interface default metrics, on all routers in your network.
  • D、Set the priority values on every broadcast interface to ensure that the designated and backup designated routers are the routers with the most processor and memory  resources.

相关考题:

Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?() A.Local Security PolicyB.ScwC.SeceditD.Services console

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()A.AB.BC.CD.D

Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network.What should you do?()A.AB.BC.CD.D

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E

Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN.What should you do?() A.AB.BC.CD.D

Network management helps you to(66)the strengths and weaknesses of your network, as well as determine any configuration changes that may be necessary. Any controlled changes to your network and its components-especially configurations, software and(67), can have an effect on its overall efficiency. To maintain control, you need the tools and knowledge to manage all activity that has the potential to affect your(68).A.seeB.knowC.monitorD.control

You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts.Which network mask should you use?()A.255.255.255.192B.255.255.255.224C.255.255.255.240D.255.255.255.248E.255.255.255.252F.255.255.255.254

You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts. Which network mask should you use?()A、255.255.255.192B、255.255.255.224C、255.255.255.240D、255.255.255.248E、255.255.255.252F、255.255.255.254

Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network.  You need to ensure that the computer is able to connect to the wireless network.  What should you do?()A、Change the Network Category setting of the wireless connection to Public.B、Enable the Internet Connection Sharing feature on the wireless network adapter.C、Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.D、Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.

You have a multi-area OSPF network and you’re concerned because one of the sites is havingconnectivity problem to resources in a different area. Which IOS privileged mode command wouldyou enter to confirm that your network:  (A) has a path to its ABR,  (B) has a path to its ASBR, and  (C)the SPF calculation is functional?()A、show ip protocolsB、show running-configC、show ip ospf neighborD、show ip ospf border-routers

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network

Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN.  What should you do?()A、Use the Mobile PC program.B、Use the Ease of Access program.C、Use the System and Maintenance program.D、Use the Network and Sharing Center program.

Your network contains a domain controller that has two network connections named Internal and  Private. Internal has an IP address of 192.168.0.20. Private has an IP address of 10.10.10.5.  You need to prevent the domain controller from registering Host (A) records for the 10.10.10.5 IP address.   What should you do()A、Modify the netlogon.dns file on the domain controller.B、Modify the Name Server settings of the DNS zone for the domain.C、Modify the properties of the Private network connection on the domain controller.D、Disable netmask ordering on the DNS server that hosts the DNS zone for the domain.

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

Your network contains an Active Directory domain that has two sites.    You need to identify whether logon scripts are replicated to all domain controllers.   Which folder should you verify()A、GroupPolicyB、NTDSC、SoftwareDistributionD、SYSVOL

You are the administrator of WXYZ.com Incorporation. Your company’s network consists of Windows 2000 Professional clients and Windows 2000 Servers. Users have started reporting that the network performance has degraded in recent times. Most of the Windows 2000 Professional clients on your network use the TCP/IP protocol to communicate with the Server. You want to increase network performance. Where do you change the binding order?()A、Windows 2000 Server  Network  Binding  Server  TCP/IP on the top.B、Windows 2000 Server  Network  Binding  Workstation  TCP/IP on the top.C、Windows 2000 Professional  Network  Binding  Server  TCP/IP on the top.D、Windows 2000 Professional  Network  Binding  Server  TCP/IP on the bottom.E、Windows 2000 Professional  Network  Binding  Workstation  TCP/IP on the top.F、Windows 2000 Professional  Network  Binding  Workstation  TCP/IP on thebottom.

Your network administrator has assigned you an IP address of 192.168.0.20 with subnet mask of 255.255.255.0.Your network is running in pure Windows 2000 domain. What else should know in order to join your computer to the Windows 2000 domain. ()A、 Address of DHCP server.B、 Address of WINS server.C、 Address of DNS server.D、 Address of default gateway

单选题Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()AConfigure the NWLink frame type of the network adapters to be ethernet 802.3.BConfigure the NWLink frame type of the network adapters to be ethernet II.CReplace the network adapters with 10/100 BNC adapters.DReplace the network adapters with 10/100 UTP network adapters.

单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()ASet the driver signing option to block.BSet the driver signing option to ignore.CIn the computer’s BIOS, reserve an unused IRQ for ISA devices.DIn the Device Manager, configure the second ISA network adapter to use an unused IRQ.

单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP

单选题Your company has an IPv6 Ethernet network. A router named R1 connects your segment to the internet. A router named R2 joins your subnet with a segment named Private1. The Private1 segment has a network address of 10.128.4.0/26. Your computer named WKS2 required access to servers on the Private1 network. The WKS1 computer configuration in shown in the following table. (again table missing). The routers are configured as shown in the following table. (missing too)WKS1 is unable to connect to the Private1 network by using the current configuration. You need to add a persistent route for the Private1 network to the routing table on WKS1.()ARout add -p 10.128.4.0/22 10.128.4.1BRoute add Cp 10.128.4.0/26 10.128.64.10CRoute add Cp 10.128.4.0 mask 255.255.255.192 10.12.64.1DRoute add Cp 10.128.64.10 mask 255.255.255.192 10.128.4.0

单选题Your network administrator has assigned you an IP address of 192.168.0.20 with subnet mask of 255.255.255.0.Your network is running in pure Windows 2000 domain. What else should know in order to join your computer to the Windows 2000 domain. ()A Address of DHCP server.B Address of WINS server.C Address of DNS server.D Address of default gateway

单选题Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()ALocal Security PolicyBScwCSeceditDServices console

多选题You are a network administrator for ExamSheet.net’s Windows 2000 network. Your computer has Windows 2000 Professional installed. Your office has a power utage while you are running the Windows 2000 disk defragmenter. When you restart your computer, you receive the following error message: "Bad or missing operating system". You want your computer to start properly. You want to do this with least amount of administrative effort. What should you do?()AReinstall the operating systemBStart the computer by using the Windows 2000 Professional CD-ROM.CUse the Recovery Console to repair the Master Boot Record.DUse the Emergency Repair Disk to repair the Master Boot Record.

单选题You report to the IT department in your company that your computer has a connectivity problem. The department requests that you configure your system with the following value:  2001::f85c:494e:7:4bd4  You need to configure your computer accordingly.  What should you do?()AUse the given value as an IPv6 address.BUse the given value as a DNS suffix search item.CUse the given value as a WEP key for a wireless network.DUse the given value as a manually assigned MAC address.

单选题One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()AVirtual GatewayBReal-IP GatewayCNAT GatewayDCentral Gateway

单选题If the diesel fuel vapors present are within the flammable range ().Athe vapor air mixture is too rich to burnBan explosion may occur if a source of ignition is presentCthe vapor air mixture is too lean to bum the upper explosiveDlimit has been exceeded