单选题The network administrator has asked you to check the status of the workstation’s IP stack by pinging the loopback address.Which address would you ping to perform this task?()A10.1.1.1B127.0.0.1C192.168.0.1D239.1.1.1

单选题
The network administrator has asked you to check the status of the workstation’s IP stack by pinging the loopback address.Which address would you ping to perform this task?()
A

10.1.1.1

B

127.0.0.1

C

192.168.0.1

D

239.1.1.1


参考解析

解析: 暂无解析

相关考题:

You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with the IP protocol stack in your PC. Which of the following actions is most likely to confirm your diagnosis?A. ping 127.0.0.0B. ping 203.125.12.1C. telnet 127.0.0.1D. ping 127.0.0.1E. tracert 203.125.12.1F. None of the above

A network technician wants to use a packet analyzer to troubleshoot a reported problem with auser‘s workstation with IP address 192.168.1.45. To identify the workstation‘s packets thetechnician wants to use the workstation‘s MAC address.Which of the following protocols would provide the needed information?()A.DHCPB.ARPC.DNSD.PING

You‘re working at TestKing as a network administrator when your MCSE assistant calls you for help. He has attempted to configure Router TK1 and incorrectly configured the router interface with a subnet broadcast address. You have to correct this by first removing the incorrect IP address and then re-entering the first usable IP address of the same subnet.How will you do this?()A.B.C.D.E.

The network administrator has asked you to check the status of the workstation’s IP stack by pinging the loopback address.Which address would you ping to perform this task?() A.10.1.1.1B.127.0.0.1C.192.168.0.1D.239.1.1.1

A technician is troubleshooting a network connectivity issue on a MFD and would like to eliminate the possibility of another device on the network having the same IP address. The technician should:()A、disconnect the MFD and ping the IP address.B、disconnect the MFD and ping the subnet mask.C、disconnect the MFD and ping the loopback address.D、run the ipconfig command from the command prompt.

You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with your protocol stack. Which of the following actions is most likely to confirm your diagnosis?()A、ping 127.0.0.0B、ping 203.125.12.1C、telnet 127.0.0.1D、ping 127.0.0.1E、tracert 203.125.12.1

The network administrator has asked you to check the status of the workstation’s IP stack by pinging the loopback address.Which address would you ping to perform this task?()A、10.1.1.1B、127.0.0.1C、192.168.0.1D、239.1.1.1

You are the administrator of a Windows 2000 Professional computer.  You schedule a task to run after 15 minutes. One hour later, the task still has not run. Using the Task Scheduler you check the status of the task. The status says "Could not start". You also notice that your Event Viewer Security Log has a logon failure event. You want to run the scheduled task.  What should you do?()A、Restart the RunAs service.B、Verify the account and password information for the task.C、Set the Task Scheduler service to allow the service to interact with the desktop.D、Set the Task Scheduler service to log on as the local Administrator account.

An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?()A、NATB、DynamicC、SubnettingD、Static

You are the network administrator for All network servers run Windows Server 2003. Recently, another network administrator create a scheduled task to perform a normal backup of Microsoft Exchange Server 2003 compuer every Saturday night. You need to perform maintenance tasks on the Exchange server on this Saturday night only. If the backup starts while you are performing the maintenance tasks,data might be corrupted. You need to ensure that the backup task does not start while you perform the maintenance tasks. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.()Choose two.)A、In the Backup utility, clear the Enabled (scheduled tasks runs at specified time) check box.B、In Control Panel, use Scheduled Tasks to pause Task Scheduler.C、Run the Schtasks command with the /end /p parameters.D、Use the Services snap-in to change the startup type of the Task Scheduler service from Automatic to Manual.

A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING

Which of the following IP addresses would a technician ping to verify the integrity of the local TCP/IP stack?()A、10.0.0.1B、127.0.0.1C、169.254.0.1D、192.168.0.1

You were recently hired by Certkiller .com as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()A、 by using the STATUS command of the Listener control utilityB、 by using the STATUS L1 command of the Listener control utilityC、 by using the SHOW RULES command of the Listener control utilityD、 by using the SET PASSWORD command of the Listener control utilityE、 by searching for the PASSWORD_LISTENER entry in the listener.ora file

You are the administrator of WXYZ.com Incorporation. Your company’s network consists of Windows 2000 Professional clients and Windows 2000 Servers. Users have started reporting that the network performance has degraded in recent times. Most of the Windows 2000 Professional clients on your network use the TCP/IP protocol to communicate with the Server. You want to increase network performance. Where do you change the binding order?()A、Windows 2000 Server  Network  Binding  Server  TCP/IP on the top.B、Windows 2000 Server  Network  Binding  Workstation  TCP/IP on the top.C、Windows 2000 Professional  Network  Binding  Server  TCP/IP on the top.D、Windows 2000 Professional  Network  Binding  Server  TCP/IP on the bottom.E、Windows 2000 Professional  Network  Binding  Workstation  TCP/IP on the top.F、Windows 2000 Professional  Network  Binding  Workstation  TCP/IP on thebottom.

You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()A、Enable DHCP in the TCP/IP properties.B、Replace the Token Ring network adapter with an Ethernet network adapter.C、Configure a different TCP/IP address on the same subnet.D、Configure a valid DNS Server in the TCP/IP properties.

Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.  Certkiller .com requires every server in the company to access Internet.  Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.  Which two actions should you perform to achieve this task()A、Trigger the Virtual DHCP server for the external virtual network and run  ipconfig/renew command on each virtual serverB、On CKT’s physical network interface, activate the Internet Connection Sharing (ICS)C、Use Certkiller .com intranet IP addresses on all virtual servers on CKT.D、Add and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.E、None of the above

Your Company upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings to be the same as they were for the previously installed network adapter.   When you restart eh computer, however, you cannot access the network. You try to ping your network adapter’s TCP/IP address locally. You receive the following error message. “Request timed out.” Next, you try to ping 127.0.0.1 and receive the same error message.   What must you do?()A、Configure a different TCP/IP addressB、Enable DHCP in the TCP/IP propertiesC、Enable DNS in the TCP/IP propertiesD、Configure the network adapter to run at 100 Mbps onlyE、Replace the network adapter.

单选题You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()AEnable DHCP in the TCP/IP properties.BReplace the Token Ring network adapter with an Ethernet network adapter.CConfigure a different TCP/IP address on the same subnet.DConfigure a valid DNS Server in the TCP/IP properties.

单选题A technician is troubleshooting a network connectivity issue on a MFD and would like to eliminate the possibility of another device on the network having the same IP address. The technician should:()Adisconnect the MFD and ping the IP address.Bdisconnect the MFD and ping the subnet mask.Cdisconnect the MFD and ping the loopback address.Drun the ipconfig command from the command prompt.

单选题You are the administrator of WXYZ.com Incorporation. Your company’s network consists of Windows 2000 Professional clients and Windows 2000 Servers. Users have started reporting that the network performance has degraded in recent times. Most of the Windows 2000 Professional clients on your network use the TCP/IP protocol to communicate with the Server. You want to increase network performance. Where do you change the binding order?()AWindows 2000 Server  Network  Binding  Server  TCP/IP on the top.BWindows 2000 Server  Network  Binding  Workstation  TCP/IP on the top.CWindows 2000 Professional  Network  Binding  Server  TCP/IP on the top.DWindows 2000 Professional  Network  Binding  Server  TCP/IP on the bottom.EWindows 2000 Professional  Network  Binding  Workstation  TCP/IP on the top.FWindows 2000 Professional  Network  Binding  Workstation  TCP/IP on thebottom.

单选题An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?()ANATBDynamicCSubnettingDStatic

单选题Your Company upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings to be the same as they were for the previously installed network adapter.   When you restart eh computer, however, you cannot access the network. You try to ping your network adapter’s TCP/IP address locally. You receive the following error message. “Request timed out.” Next, you try to ping 127.0.0.1 and receive the same error message.   What must you do?()AConfigure a different TCP/IP addressBEnable DHCP in the TCP/IP propertiesCEnable DNS in the TCP/IP propertiesDConfigure the network adapter to run at 100 Mbps onlyEReplace the network adapter.

单选题You have a windows server 2008 compute that has an IP address of 172.16.45.9/21. The server is configured to use ipv6 addressing. You need to test IPv6 communication to a server that has an ip address of 172.16.40.18/21, what should you do from a command prompt?()AType ping 172.16.45.9::::.BType ping ::9.45.16.172.CType ping followed by the link-local address of the server.DType ping followed by the site-local address of the server.

单选题You are a network administrator for ExamSheet.net's Windows 2000 network.  You use a user account named User1 to log on tot a Windows 2000 Professional computer. The computer is used by different students in a classroom. User1 does not have administrative rights. However, you prefer to use this account for your daily activities. Using the Task Scheduler you schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. You configure the task to run as the administrator account.  After the task was scheduled to have run you open the Task Scheduler and discover a status of "Could not start" for the task. You also discover account logon failure audit events in the computer's Security log.You want the scheduled task to successfully run AddUsers.cmd. You want to accomplish this with the least amount of administrative effort.  What should you do?()ASchedule the task using theATcommand.BReenter the password for the administrator account using the Task Scheduler.CLog on with an administrative account and reschedule the task.DLog on by using the local Administrator account. Then schedule the task to run under User1.

单选题You were recently hired by an organization as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()Aby using the STATUS command of the Listener control utilityBby using the STATUS L1 command of the Listener control utilityCby using the SHOW RULES command of the Listener control utilityDby using the SET PASSWORD command of the Listener control utilityEby searching for the PASSWORD_LISTENER entry in the listener.ora file

单选题You are the administrator of a Windows 2000 Professional computer.  You schedule a task to run after 15 minutes. One hour later, the task still has not run. Using the Task Scheduler you check the status of the task. The status says "Could not start". You also notice that your Event Viewer Security Log has a logon failure event. You want to run the scheduled task.  What should you do?()ARestart the RunAs service.BVerify the account and password information for the task.CSet the Task Scheduler service to allow the service to interact with the desktop.DSet the Task Scheduler service to log on as the local Administrator account.

单选题A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()ADHCPBARPCDNSDPING