You are a senior network administrator at TestKing and your trusty junior administrator tells you that he failed his task of adding VLAN 50 to a Catalyst switch in the network. You enter in the 'show vtp status' command and get this output: TK2# show vtp status VTP Version :2 Configuration Revision :7 Maximum VLANs supported local :68 Number of existing VLANs :8 VTP Operating Mode :Client VTP Domain Name :corp VTP Pruning Mode :Disabled VTP V2 Mode :Disabled VTP Traps Generation :Disabled MD5 digest :0x22 0xF3 0x1A Configuration last modified by 172.18.22.15 at 5-28-03 1t:53:20 What commands must be issued on this switch to add VLAN 50 to the database?()A、TK2(config-if)# switchport access vlan 50B、TK2(vlan)# vtp serverC、TK2(config)# config-revision 20D、TK2(config)# vlan 50 name TechE、TK2(vlan)# vlan 50F、TK2(vlan)# switchport trunk vlan 50
You are a senior network administrator at TestKing and your trusty junior administrator tells you that he failed his task of adding VLAN 50 to a Catalyst switch in the network. You enter in the 'show vtp status' command and get this output: TK2# show vtp status VTP Version :2 Configuration Revision :7 Maximum VLANs supported local :68 Number of existing VLANs :8 VTP Operating Mode :Client VTP Domain Name :corp VTP Pruning Mode :Disabled VTP V2 Mode :Disabled VTP Traps Generation :Disabled MD5 digest :0x22 0xF3 0x1A Configuration last modified by 172.18.22.15 at 5-28-03 1t:53:20 What commands must be issued on this switch to add VLAN 50 to the database?()
- A、TK2(config-if)# switchport access vlan 50
- B、TK2(vlan)# vtp server
- C、TK2(config)# config-revision 20
- D、TK2(config)# vlan 50 name Tech
- E、TK2(vlan)# vlan 50
- F、TK2(vlan)# switchport trunk vlan 50
相关考题:
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()A.AB.BC.CD.D
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D
You connect your computer to a wireless network. You discover that this new connection fails to show in the Connect to a network window.You need to view this connection in the Connect to a network window.What should you do?()A.AB.BC.CD.D
You are a senior network administrator at TestKing, and while performing thepassword recovery procedure on your 2500 series Cisco router, you type in thefollowing command:o/r 0x2142What is the purpose of this command?()A、It is used to restart the router.B、It is used to bypass the configuration in NVRAM.C、It is used to enter ROM Monitor mode.D、It is used to view the lost password.E、It is used to save the changes to the configuration.
You work as a senior administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com.All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing storage pools.Which of the following are TRUE with regards to storage pools?()A、It allows you to group physical disks into one or more containers.B、It prevents you from grouping physical disks into one or more containers.C、It allows you to easily add storage without impacting users.D、It allows you to easily add storage with minor impact on users.
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A、Content storage networkingB、Network optimizationC、Network managementD、Network security
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()A、You should assign the network 172.16.0.0/16.B、You should assign the network 172.16.0.0/17.C、You should assign the network 172.16.0.0/18.D、You should assign the network 172.16.0.0/19.E、You should assign the network 172.16.0.0/20.F、You should assign the network 172.16.0.0/22.
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter
You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed, and all workstations have Windows 8 installed. You are running a training exercise for junior administrators.You are currently discussing the Always Offline Mode. Which of the following is TRUE with regards to the Always Offline Mode?()A、It allows for swifter access to cached files and redirected folders.B、To enable Always Offline Mode,you have to satisfy the forest and domain functional-level requirements, as well as schema requirements.C、It allows for lower bandwidth usage due to users are always working offline.D、To enable Always Offline Mode, you must have workstations running Windows 7 or Windows Server 2008 R2.
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling. You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home. What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.
You are the administrator of ExamSheet.net's network. ExamSheet upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings so that IP and DNS addresses are obtained automatically. When you restart the computer you cannot access the network. When you attempt toPINGaddress 127.0.0.1 you receive the following error message: "Request timed out." You want this computer to communicate on the network. What should you do?()A、Configure IP address settings manually.B、Replace the network adapter.C、Disable TCP/IP filtering for all network adapters.D、Configure DNS server address settings manually.E、Enable IEEE 802.1x authentication.
You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet.Which of the following describes the results of running this cmdlet?()A、It removes one or more network adapters from a specified NIC team.B、It removes a team interface from a NIC team.C、It removes a specified NIC team from the host.D、It removes a network adapter member from a switch team.
You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed, and all workstations have Windows 8 installed. You are running a training exercise for junior administrators.You are currently discussing a Windows PowerShell cmdlet that activates previously de-activated firewall rules. Which of the following is the cmdlet being discussed?()A、Set-NetFirewallRuleB、Enable-NetFirewallRuleC、Set-NetIPsecRuleD、Enable-NetIPsecRule
You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. You are in the process of enabling journaling within the TestKing.com organization. During the course ofday you receive an instruction form the CIO to stop administrators form reading classified e-mailmessages that is sent between senior management. What should you do?()A、Your best option would be to deploy an X.509 certificate from an enterprise certification authority (CA)to all senior management.B、Your best option would be to deploy Active Directory Rights Management Services (AD RMS)Templates.C、Your best option would be to deploy an X.509 certificate from a trusted third-party certification authority(CA) to all senior management.D、Your best option would be to deploy Active Directory Rights Management Services (AD RMS)Templates.Thereafter Transport Protection Rules should be created.
You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing Storage Spaces.Which of the following is TRUE with regards to Storage Spaces?()A、Mirroring and parity are optional resilient storage modes of Storage Spaces.B、Failover clustering is not supported by Storage Spaces.C、Storage spaces are virtual disks with associated attributes such as a preferred level of resiliency,and thin or fixed provisioning.D、Storage spaces are a collection of physical disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning.
You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing spanned volumes.Which of the following is TRUE with regards to spanned volumes?()A、Spanned volumes do not provide fault tolerance.B、Spanned volumes are a fault tolerant solution.C、You can extend a spanned volume onto a maximum of 16 dynamic disks.D、You cannot create a spanned volume using a system volume or boot volume.
单选题You are a senior network administrator at TestKing, and while performing thepassword recovery procedure on your 2500 series Cisco router, you type in thefollowing command:o/r 0x2142What is the purpose of this command?()AIt is used to restart the router.BIt is used to bypass the configuration in NVRAM.CIt is used to enter ROM Monitor mode.DIt is used to view the lost password.EIt is used to save the changes to the configuration.
多选题You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature. Which of the following is TRUE with regards to Windows Firewall with Advanced Security?()AIt provides host-based,two-way network traffic filtering for a computer.BIt provides host-based,one-way network traffic filtering for a computer.CIt blocks unauthorized network traffic flowing into or out of the local computer.DIt only blocks unauthorized network traffic flowing into the local computer.EIt only blocks unauthorized network traffic flowing out of the local computer.
多选题You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing NIC Teaming.Which of the following is TRUE with regards to NIC Teaming?()AIt allows for traffic failover to prevent connectivity loss if a network component fails.BIt prevents bandwidth aggregation.CThe Windows Server 2012 R2 implementation of NIC Teaming supports a maximum of 5 NICs in a team.DThe Windows Server 2012 R2 implementation of NIC Teaming supports a maximum of 32 NICs in a team.
单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP
多选题Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home. Which two actions should you perform?()AWhen you configure access to the wired network at home, set the wired network adapter location type to Public.BWhen you configure access to the wired network at home, set the wired network adapter location type to Private.CWhen you configure access to the public wireless access points, set the wireless network adapter location type to Public.DWhen you configure access to the public wireless access points, set the wireless network adapter location type to Private.
多选题You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing spanned volumes.Which of the following is TRUE with regards to spanned volumes?()ASpanned volumes do not provide fault tolerance.BSpanned volumes are a fault tolerant solution.CYou can extend a spanned volume onto a maximum of 16 dynamic disks.DYou cannot create a spanned volume using a system volume or boot volume.
单选题You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed, and all workstations have Windows 8 installed. You are running a training exercise for junior administrators.You are currently discussing a Windows PowerShell cmdlet that activates previously de-activated firewall rules. Which of the following is the cmdlet being discussed?()ASet-NetFirewallRuleBEnable-NetFirewallRuleCSet-NetIPsecRuleDEnable-NetIPsecRule
单选题Your Company upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart eh computer, however, you cannot access the network. You try to ping your network adapter’s TCP/IP address locally. You receive the following error message. “Request timed out.” Next, you try to ping 127.0.0.1 and receive the same error message. What must you do?()AConfigure a different TCP/IP addressBEnable DHCP in the TCP/IP propertiesCEnable DNS in the TCP/IP propertiesDConfigure the network adapter to run at 100 Mbps onlyEReplace the network adapter.
多选题You work as a senior administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com.All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing storage pools.Which of the following are TRUE with regards to storage pools?()AIt allows you to group physical disks into one or more containers.BIt prevents you from grouping physical disks into one or more containers.CIt allows you to easily add storage without impacting users.DIt allows you to easily add storage with minor impact on users.