You replaced your Layer 3 switch, which is the default gateway of the end users. Many users cannot access anything now, including email, Internet, and other applications, although other users do not have any issues. All of the applications are hosted in an outsourced data center. In order to fix the problem, which one of these actions should you take?()A、Clear the MAC address table in the switch.B、Clear the ARP cache in the switch.C、Clear the ARP cache in the end devices.D、Clear the ARP cache in the application servers.

You replaced your Layer 3 switch, which is the default gateway of the end users. Many users cannot access anything now, including email, Internet, and other applications, although other users do not have any issues. All of the applications are hosted in an outsourced data center. In order to fix the problem, which one of these actions should you take?()

  • A、Clear the MAC address table in the switch.
  • B、Clear the ARP cache in the switch.
  • C、Clear the ARP cache in the end devices.
  • D、Clear the ARP cache in the application servers.

相关考题:

You share your computer with other users. You install a new Microsoft add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require.You need to ensure that you are able to view videos without affecting other users.What should you do?()A.AB.BC.CD.D

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A. The switch name must match the workgroup name of the local network.B. The switch must be configured with an IP address and default gateway.C. The remote workstations must have access to the management VLAN of the switch.D. CDP must be enabled on the switch so that it can be located by other devices on the network.

You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()A、Upgrade the switchesB、Configure BPDU guardC、Configure VLAN access listsD、Configure port securityE、Configure Dynamic ARP inspection

You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining that access to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue, and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely the cause of this issue?()A、routing issueB、denial-of-service attackC、MAC floodingD、spanning-tree recalculationE、Layer 2 loopF、ARP spoofing attack

You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()A、authorization allow users="?"/ /authorizationB、authorization deny users="?"/ /authorizationC、authorization deny users="*"//authorizationD、authorization allow users="*"/ /authorization

You share your computer with other users.  You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users.  What should you do?()A、Uninstall the new Windows Internet Explorer add-on.B、Log on as an administrator and disable the new Windows Internet Explorer add-on.C、Direct other users to log on and disable the new Windows Internet Explorer add-on.D、Select the Turn off Automatic Website Checking option for the Phishing filter.

You want to install Windows 2000 Professional on 45 new computers on your company’s network. You first install Windows 2000 Professional on one of the new computers. You log on to the computer by using the local administrator account.  You install Microsoft Office 97, a virus scanner, and other company-standard applications. You then create a RIS image of the computer you configured. You want to configure the RIS image so that the standard applications will be accessible to the user when the user first logs on to the network.  What should you do?()A、Run Rbfg.exe before installing the standard applications. B、Run RIPrep.exe before installing the standard applications. C、Copy the all users profile to the default users profile.D、Copy the local administrator account profile to the default users profile

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A、The switch name must match the workgroup name of the local network.B、The switch must be configured with an IP address and default gateway.C、The remote workstations must have access to the management VLAN of the switch.D、CDP must be enabled on the switch so that it can be located by other devices on the network.

An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A、Router routes traffic between different networks and a switch does notB、The new switch is faulty and needs to be replaced and configured correctlyC、The firewall needs to be setup to allow traffic to reach the InternetD、The switch needs to be setup to forward data traffic to the Internet

You are the network administrator for .Your network consists of a single Active Directory domain named . The Default Domain Group Policy object (GPO) uses all default settings. The network contains five servers running Windows Server 2003 and 800 client computers. Half of the client computers are portable computers. The other half are desktop computers. Users of portable computers often work offline, but users of desktop computers do not. You install Windows XP Professional on all client computers with default settings. Then you configure user profiles and store them on the network. Some users of portable computers now report that they cannot log on to their computers. Other users of portable computers do not experience this problem. You need to ensure that all users of portable computers can log on successfully,whether they are working online or offline. What should you do?()A、Configure all portable computers to cache user credentials locally.B、Ensure that all users of portable computers log on to the network at least once before working offline.C、In all portable computers, rename Ntuser.dat to Ntuser.man.D、For all portable computers, configure the Loopback policy setting.

You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings.   After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers.   You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications.   What should you do?()A、Add each user account to the Power Users group on that user’s computer.B、Configure the financial and credit applications to run as services on the computers in the accounting department.C、Apply the Compatws.inf security template to the local security policy of the computers in the accounting department.D、Use the Computer Management console to configure separate memory spaces for each financial and credit application on the accounting department computers.

Your company includes mobile computer users who frequently work offline. You are planning to deploy Windows 7 by using an image.   You have the following requirements:   Provide access to all applications when mobile computer users first start their computers. Minimize network and local storage requirements.  Provide language-pack support based on the geographic location of the user.    You need to ensure that your image-creation strategy meets the requirements.   What should you do?()A、Create a single thin image for all computers.B、Create a single hybrid image for all computers.C、Create one thin image for the mobile computers. Create one thick image for all other computers.D、Create one thick image for the mobile computers. Create one thin image for all other computers.

Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer.  You need to ensure that other users are able to access only the shared files.  What should you do? ()A、Restart the Workstation service on your computer.B、Change all of your TCP port exceptions to UDP port exceptions.C、Ensure parental controls are not configured to block file sharing.D、Clear the Block all incoming connections check box in Windows Firewall.

You have an Exchange Server 2010 organization. Your company’s compliance policy states the following:.Delete e-mail messages sent to legal department users that are older than 180 days. .Delete e-mail messages sent to all other users that are older than 60 days You need to recommend a solution that meets the requirements of the compliance policy. What should you recommend?()A、Configure deleted item retention for all users.B、Configure Personal Archives for the legal department users.C、Create two Managed Folder mailbox policies. Use one policy for the legal department users. Use the other policy for all other users.D、Create two new message classifications. Use one message classification for the e-mails sent to legal department users. Use the other message classification for the e-mails sent to all other users.

You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner.  What should you modify?()A、the Federation TrustB、the EWS virtual directoryC、the default sharing policyD、the Organizational Relationship

You are the network administrator for The network consists of a single Active Directory domain named A Windows Server 2003 computer named TestKing3 is configured as a member server in your domain. You install Terminal Services on TestKing3. You also install several legacy applications on TestKing3. Users report that they cannot run many of the legacy applications on TestKing3 through their Terminal Services sessions. You establish a Terminal Services session by using the Administrator account, and you verify that you can run the legacy applications. You need to ensure that users can run the legacy applications on TestKing3 while they are connected through Terminal Services. What should you do?()A、Add all Terminal Services users to the domain Server Operators group.B、Share the C:/Program Files folders on TestKing2. Assign the Domain Users group the Allow - Full Control share permissions.C、Install Terminal Server Licensing Server on TestKing3.D、Use Terminal Services Configuration to change the Permissions Compatibility setting.

You need to design access to e-mail by Internet users. What should you do?()A、Configure front-end servers to use HTTP to communicate with back-end serversB、Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange serversC、Require all users to encrypt all outbound e-mail messagesD、Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You have a Remote Desktop Session Host (RD Session Host) server and a Remote Desktop Web Access (RD Web Access) server. You enable several RemoteApp applications on the RD Session Host server. You need to configure access to RemoteApp applications so that RD Web Access users see only applications to which they have been granted access. What should you do?()A、Use the RemoteApp Wizard to add to the RemoteApp Programs list setting.B、Assign domain users and domain security groups to each RemoteApp application.C、Use the RemoteApp Wizard to configure the RemoteApp program is available through RD Web Access setting.D、Specify custom menu locations on the RD Session Host server for each domain security group by using a Group Policy object (GPO).

单选题You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining that access to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue, and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely the cause of this issue?()Arouting issueBdenial-of-service attackCMAC floodingDspanning-tree recalculationELayer 2 loopFARP spoofing attack

单选题You are a Windows Server 2008 systems administrator responsible for configuring FTP Publishing Servicefor use by members of your organization’s engineering department. The name of the server is FTPServer01. Several users have reported that they are able to access most files through the FTP site,but they cannot access the contents of the Drawings folder. You have verified that these users. Windowsaccounts have the correct file system permissions for this folder. You want to minimize the permissionsgranted to all the users. Which of the following changes should you make to enable users to access thisfolder?()AChange the permissions for the IUSR_FTPServer01 account on the Drawings folder.BCreate new TCP/IP Address Restrictions entries for the users who cannot access the Drawings folder.CDisable the Allow Only Anonymous Connections option.DAdd the users to the local Administrators group on FTPServer02.

单选题You replaced your Layer 3 switch, which is the default gateway of the end users. Many users cannot access anything now, including email, Internet, and other applications, although other users do not have any issues. All of the applications are hosted in an outsourced data center. In order to fix the problem, which one of these actions should you take? ()A Clear the MAC address table in the switch.B Clear the ARP cache in the switch.C Clear the ARP cache in the end devices.D Clear the ARP cache in the application servers.