单选题How should TCP/IP be configured on the ent0 network adapter?()Aifconfig en0 192.168.10.1 netmask 255.255.255.0 gateway 192.168.10.254Bifconfig ent0 192.168.10.1 netmask 255.255.255.0 gateway 192.168.10.254Cmktcpip h test61 -a 192.168.10.1 -i en0 m 255.255.255.0 g 192.168.10.254 -sDmktcpip h test61 -a 192.168.10.1 -i ent0 m 255.255.255.0 g 192.168.10.254 -

单选题
How should TCP/IP be configured on the ent0 network adapter?()
A

ifconfig en0 192.168.10.1 netmask 255.255.255.0 gateway 192.168.10.254

B

ifconfig ent0 192.168.10.1 netmask 255.255.255.0 gateway 192.168.10.254

C

mktcpip h test61 -a 192.168.10.1 -i en0 m 255.255.255.0 g 192.168.10.254 -s

D

mktcpip h test61 -a 192.168.10.1 -i ent0 m 255.255.255.0 g 192.168.10.254 -


参考解析

解析: 暂无解析

相关考题:

A network technician is installing a new managed 10/100 Mbps switch on the network. The network has an older printer with a 10Mbps network adapter that will be moved to the new switch.Which of the following settings on the switch will need to be configured to support the printer?()A. MAC filteringB. IP addressC. PoED. Port speed

OSPF is configured over a Frame Relay network as shown in the exhibit. All PVCs are active.However, R1 and R3 fail to see all OSPF routes in their routing tables. The show ip ospf neighbor command executed on R2 shows the state of t he neighbors. What should be done to fix the problem? ()A. The ip ospf network broadcast command should be configured on each Frame Relay interfaceB. The ip ospf network non -broadcast command should be configured on each Frame Relay interfaceC. Th e ip ospf priority value on the spoke routers should be set to 0D. The ip ospf priority value on the hub router should be set to 0E. The neighbor command should be configured under the OSPF routing process on all routers

A network technician is installing a new managed 10/100 Mbps switch on the network. The network has an older printer with a 10Mbps network adapter that will be moved to the new switch. Which of the following settings on the switch will need to be configured to support the printer?()A、MAC filteringB、IP addressC、PoED、Port speed

An administrator has decided to use a Shared Ethernet Adapter (SEA) as part of a virtualized environment. Due to the expected traffic across the SEA, the administrator has decided to use an aggregation of two physical Ethernet adapters, ent0 and ent1 as the backing device in the VIO server to increase the available network bandwidth.  Which of the following commands would successfully create an aggregation device within a VIO server? ()A、 mkvdev -lnagg ent0,ent1B、 mkdev -lnagg -d ent0,ent1C、 mkvdev -t etherchannel -a ent0,ent1D、 mkdev -c adapter -s pseudo -t etherchannel ent0,ent1

Company.com has a cluster with nodes that support "hot swap" adapters. During an upgrade of  The network infrastructure,an additional network adapter has been added to the nodes and configured in AIX.  What is the next step required to add this adapter to HACMP?()  A、 Stop the node.B、 Stop the cluster.C、 Run autodiscovery.D、 Configure the IP adapter.

A pSeries technical specialist is configuring the network adapters for an HACMP cluster.  The plan is to use a four-port Ethernet adapter with IPAT via IP aliasing for the two service IP labels.  Which of the following would be a critical concern with the proposed configuration?()A、A four-port adapter is not supported.B、The four-port adapter is a single point of failure.C、There should be a spare port for each service IP label.D、The four-port adapter could be a potential performance bottleneck.

After making changes to IP aliasing and rebooting the system, an AIX server is unable to communicate with other hosts.  Which command can be run to check ent0 adapter configuration relative to IP address and network mask?()A、ifconfig -aB、errpt -aC、cfgmgr -vD、entstat -d ent0

How is an IP address removed from a network interface?()A、rmdev -dl ent0B、ifconfig en0 downC、ifconfig en0 deleteD、ifconfig ent0 detach

A two-node cluster is configured for mutual takeover with two service IP labels. The cluster is Being tested for fallover behavior. Both nodes in the cluster have two network interfaces (ent0’ and ’ent1’) configured with IPAT via IP Replacement. When the network cable is removed from the interface card with the service address (’ent0’), the service address is moved to ’ent1’, and ’ent0’ is reconfigured on its boot address. When the network cable is replaced on ’ent0,the service address does not switch back to ’ent0’.  What statement most accurately describes this situation?()   A、 EtherChannel is needed to automatically switch the service IP address back to ’ent0’.B、 This is the default behavior for a network interface failure with this configuration.C、 Gratuitous ARP support needs to be enabled for the IP Network Interface Module in SMIT.D、 The Inactive Network Takeover option should be set to "true" to forece the service addressback to ’ent0’.

How should TCP/IP be configured on the ent0 network adapter?()A、ifconfig en0 192.168.10.1 netmask 255.255.255.0 gateway 192.168.10.254B、ifconfig ent0 192.168.10.1 netmask 255.255.255.0 gateway 192.168.10.254C、mktcpip h test61 -a 192.168.10.1 -i en0 m 255.255.255.0 g 192.168.10.254 -sD、mktcpip h test61 -a 192.168.10.1 -i ent0 m 255.255.255.0 g 192.168.10.254 -

A technical specialist defined a virtual Ethernet ent2 on the VIO server that has a physical  adapter, ent0. Which of the following commands should be used to configure the Shared Ethernet  Adapter?()A、mkvdev -sea ent2 -vadapter ent0 -default ent0 -defaultid 1B、mkdev -virtual ent0 -adapter ent3 -default en2 -defaultid 1C、mkvdev -sea ent0 -vadapter ent2 -default ent2 -defaultid 1D、mkvdev ent0 -sea -vadapter ent2 -default ent2 -defaultid 1

How should TCP/IP be configured on the ent0 network adapter?()A、ifconfig en0 192.168.10.1 netmask 255.255.255.0 gateway 192.168.10.254B、ifconfig ent0 192.168.10.1 netmask 255.255.255.0 gateway 192.168.10.254C、mktcpip test61 -a 192.168.10.1 -i en0 255.255.255.0 192.168.10.254 -smktcpip ? test61 -a 192.168.10.1 -i en0 ? 255.255.255.0 ? 192.168.10.254 -sD、mktcpip test61 -a 192.168.10.1 -i ent0 255.255.255.0 192.168.10.254 -smktcpip ? test61 -a 192.168.10.1 -i ent0 ? 255.255.255.0 ? 192.168.10.254 -s

Company.com has I/O slot constraints on two nodes that are going to be configured in an  HACMP cluster. There is room for only one Network Interface Card in each node,in addition to the built-in Ethernet port on the system planer.  The best HACMP configuration for these servers is to implement:()  A、 A single adapter network using the Network Interface Card in each nodeB、 A single adapter network using persistent addresses on the Network Interface Card in each nodeC、 A dual adapter network using the internal Ethernet adapters as an non-service interface with IPAT via IP Replacement.D、 EtherChannel high availability for the network connections with HACMP cascading resource groups for data and application fallover

You are the administrator of ExamSheet.net's network.  ExamSheet upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings so that IP and DNS addresses are obtained automatically. When you restart the computer you cannot access the network. When you attempt toPINGaddress 127.0.0.1 you receive the following error message: "Request timed out."  You want this computer to communicate on the network. What should you do?()A、Configure IP address settings manually.B、Replace the network adapter.C、Disable TCP/IP filtering for all network adapters.D、Configure DNS server address settings manually.E、Enable IEEE 802.1x authentication.

You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()A、Enable DHCP in the TCP/IP properties.B、Replace the Token Ring network adapter with an Ethernet network adapter.C、Configure a different TCP/IP address on the same subnet.D、Configure a valid DNS Server in the TCP/IP properties.

You are the administrator of a small server based network. While installing Windows 2000 Professional on your computer, you configure the network adapter card for each computer to use TCP/IP and assign static IP setting information. During installation the setup detects and installs the 10/100 MBPS UTP only network adepter card on computers 6  8 and 10 MBPS/UTP combination adapter card on the other 7 computers. You accept the default settings for the network adapter card and finish installing the network adapter card. All computers are connected to 10/100 switch that has category 5 UTP cabling. After installation you find that computer 6 and 8 can communicate with each other. You want all 9 computers on your network to be able to communicate with each other.   What should you do?()A、Configure the 10/100 switch to transfer only at the 100 MBPS rate.B、Configure 10/100 MBPS network adapter card to switch all the computers at 10 MBPS rate.C、Change the combination network adapter card to use the BNC transceiver setting.D、Change the combination network adapter card to use the UTP transceiver setting.

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server is configured as a network address translation (NAT) router. The server has two network adapters and provides Internet access for the network.You need to prevent traffic on port 21 from being sent to the Internet. All other outbound traffic must be allowed.What should you do?() A、On the network adapter that is connected to the LAN, enable TCP/IP filtering. B、On the network adapter that is connected to the Internet, enable TCP/IP filtering. C、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the Services and Ports tab, and define a new service. D、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the NAT/Basic Firewall tab, and define a new static packet filter.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The Web Server(IIS) server role and the FTP Publishing Service role service are installed on the server. You have a newFTP site added to the server. You have to make sure that the new FTP site is available. In order to makesure of this,what action should you perform?()A、In order to make sure of this, the iisreset command should be run on the server.B、In order to make sure of this, a host header file should be configured in the default Web site properties.C、In order to make sure of this, an alternate IP address should be configured in the default Web siteproperties.D、In order to make sure of this, an alternate TCP port should be configured in the FTP site properties.E、In order to make sure of this, an alternate IP address should be configured in the FTP site properties.

You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

单选题Company.com has I/O slot constraints on two nodes that are going to be configured in an  HACMP cluster. There is room for only one Network Interface Card in each node,in addition to the built-in Ethernet port on the system planer.  The best HACMP configuration for these servers is to implement:()A A single adapter network using the Network Interface Card in each nodeB A single adapter network using persistent addresses on the Network Interface Card in each nodeC A dual adapter network using the internal Ethernet adapters as an non-service interface with IPAT via IP Replacement.D EtherChannel high availability for the network connections with HACMP cascading resource groups for data and application fallover

单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()ASet the driver signing option to block.BSet the driver signing option to ignore.CIn the computer’s BIOS, reserve an unused IRQ for ISA devices.DIn the Device Manager, configure the second ISA network adapter to use an unused IRQ.

单选题Company.com has a cluster with nodes that support "hot swap" adapters. During an upgrade of  The network infrastructure,an additional network adapter has been added to the nodes and configured in AIX.  What is the next step required to add this adapter to HACMP?()A Stop the node.B Stop the cluster.C Run autodiscovery.D Configure the IP adapter.

单选题You have a Windows Server 2008 R2 Hyper-V server with a single network adapter that is connected to a virtual network. The virtual network is configured as External. Virtual machines (VMs) running on the server are not able to communicate with the host server over the network. You need to ensure that VMs running on the server are able to communicate with the host server over the network.  In Virtual Network Manager,what should you do?()ASelect the Internal only connection type.BSelect the Private virtual machine network connection type.CSelect the Allow management operating system to share this network adapter check box.DClear the Allow management operating system to share this network adapter check box.

单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

单选题A pSeries technical specialist is configuring the network adapters for an HACMP cluster.  The plan is to use a four-port Ethernet adapter with IPAT via IP aliasing for the two service IP labels.  Which of the following would be a critical concern with the proposed configuration?()AA four-port adapter is not supported.BThe four-port adapter is a single point of failure.CThere should be a spare port for each service IP label.DThe four-port adapter could be a potential performance bottleneck.

单选题You configure a new file server that runs Windows Server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files. The TCP/IP properties for the file server are configured as shown in the following exhibit.(exhibit not there again wtf!) You need to ensure that users are able to access the shared files. How should you configure the TCP/IP properties in the file server?()AConfigure a static IP addressBConfigure the default gatewayCConfigure the DNS server addressDAdd the domain to the DNS suffix on the network interface

单选题Your Company upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings to be the same as they were for the previously installed network adapter.   When you restart eh computer, however, you cannot access the network. You try to ping your network adapter’s TCP/IP address locally. You receive the following error message. “Request timed out.” Next, you try to ping 127.0.0.1 and receive the same error message.   What must you do?()AConfigure a different TCP/IP addressBEnable DHCP in the TCP/IP propertiesCEnable DNS in the TCP/IP propertiesDConfigure the network adapter to run at 100 Mbps onlyEReplace the network adapter.

单选题You are the administrator of a Windows 2000 network. You install Windows 2000 Professional on a new computer and configure the TCP/IP settings to have a static IP address. While testing network connectivity from the new computer, you discover an error in the DNS server address that is configured in the TCP/IP settings. You configure the correct DNS server address, which is 10.1.1.5. However, you are still unable to successfully connect to network resources by name. You run the IPconfig/all command. The results indicate that the DNS server address is now configured as 0.0.0.0 You need to ensure that the computer can connect to network resources by name. What should you do?()AStop and restart the DNS Client service.BAdd 10.1.1.5 to the DNS server list on the TCP/IP Advanced Properties tab.CAdd an A (host) record for the computer to the DNS server’s zone file.DConfigure your DHCP server to have a DNS server address of 10.1.1.5.