Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network.The network administrator connected to console port,issued the show ip route command,and was able to ping the server.Based on the output of the show ip route command topology shown in the graphic,what is the cause of the failure?()A.IP routing is not enabledB.A static route is configured incorrectlyC.The network has not fully convergedD.The FastEthernet interface on Coffee is disabledE.The routing table on Coffee has not updatedF.The neighbor relationship table is not correctly updated
Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network.The network administrator connected to console port,issued the show ip route command,and was able to ping the server.Based on the output of the show ip route command topology shown in the graphic,what is the cause of the failure?()
A.IP routing is not enabled
B.A static route is configured incorrectly
C.The network has not fully converged
D.The FastEthernet interface on Coffee is disabled
E.The routing table on Coffee has not updated
F.The neighbor relationship table is not correctly updated
相关考题:
Users on the 192.168.1.0/24 network must access files located on the Server 1. What route could be configured on router R1 for file requests to reach the server()。 A.ip route 0.0.0.0 0.0.0.0 s0/0/0B.ip route 0.0.0.0 0.0.0.0 209.165.200.226C.ip route 209.165.200.0 255.255.255.0 192.168.1.250D.ip route 192.168.1.0 255.255.255.0 209.165.100.250
Users on the 192.168.1.0/24 network must access files located on the Server 1. What route could be configured on router R1 for file requests to reach the server()。A、ip route 0.0.0.0 0.0.0.0 s0/0/0B、ip route 0.0.0.0 0.0.0.0 209.165.200.226C、ip route 209.165.200.0 255.255.255.0 192.168.1.250D、ip route 192.168.1.0 255.255.255.0 209.165.100.250
You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining thataccess to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue,and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely thecause of this issue?()A、routing issueB、denial-of-service attackC、MAC floodingD、spanning-tree recalculationE、Layer 2 loopF、ARP spoofing attack
What must be configured on the network in order for users on the Internet to view web pages located on Web Server 2?()A、On router R2, configure a default static route to the 192.168.1.0 network.B、On router R2, configure DNS to resolve the URL assigned to Web Server 2 to the 192.168.1.10 address.C、On router R1, configure NAT to translate an address on the 209.165.100.0/24 network to 192.168.1.10.D、On router R1, configure DHCP to assign a registered IP address on the 209.165.100.0/24 network to Web Server 2.
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable
On a Windows network, users are reporting that they cannot access any network resources. The users can ping the IP address and connect to the network resource using the IP address. Which of the following is the cause of the problem?()A、The file server is offline.B、The DNS server is not resolving correctly.C、The DHCP server is not assigning correct IP addresses.D、The domain controller is not responding.
A gateway machine has access to the Internet and is trying to reach a machine on the Internet called cactus.org. Although the gateway machine cannot reach cactus.org, another network across town is able to reach cactus.org. Furthermore, the gateway machine can reach the network across town, but cannot ping the cactus.org. Which of the following tools will best help diagnose the location of the problem?()A、iptraceB、netstatC、tcpdumpD、traceroute
Your network consists of two subnets named Subnet1 and Subnet2. You have a server named Server1 that runs Windows Sever 2003 Service Pack 2 (SP2). Server1 is located on Subnet1. Users from Subnet1 report poor performance when they connect to Server1. Users from Subnet2 report that they are unable to connect to Server1.You monitor both network segments and discover a large number of NetBIOS broadcasts on both network segments.You need to reduce the number of broadcasts on the network. What should you deploy?()A、a DHCP Relay Agent B、a WINS server C、Connection Point Services (CPS) D、Simple TCP/IP Services on all computers
You are the network administrator for The network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is exposed to the Internet. You are deploying 10 Windows Server 2003 computers as Web servers. The servers will be located in the perimeter network. The servers will host only publicly available Web pages. You want to reduce the possibility that users can gain unauthorized access to the servers. You are concerned that a user will probe the Web servers and find ports or services to attack. What should you do?()A、Disable File and Printer Sharing on the servers.B、Disable the IIS Admin service on the servers.C、Enable Server Message Block (SMB) signing on the servers.D、Assign the Secure Server (Require Security) IPSec policy to the servers.
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do( )? A、Create a network policy for VPN connections. modify the Day and time restrictions.B、Create a network policy for VPN connections. apply an ip filter to deny access to the corporate network.C、Modify the Logon hours for all users objects to specify only the VPN server otn he computer restrictions optionD、Modify the Logon hours for the default domain policy to enable the Force logoff when logon hours expire option.
Your network contains 20 subnets. You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has an IP address of 192.168.10.10 and is located on a subnet named Subnet10. All client computers run Windows XP Professional Service Pack 3 (SP3). Users on a subnet named Subnet1 report that they cannot connect to Server1. Users on Subnet10 report that they can connect to Server1.You log on to a computer on Subnet1. You need to identify the point of failure on the network. Which command should you run?()A、Ipconfig /allB、Net view //192.168.10.10C、Ping 192.168.10.10D、Tracert 192.168.10.10
Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site. The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network. You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server. What should you include in the plan?()A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync synchronization.B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync synchronization.C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the perimeter network.D、Deploy two Hub Transport servers on the internal network.
You are the administrator of Company.com’s network. Your network has 100 Windows 2000 Professional computers and 10 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. In addition, the network servers is configured with disk quotas for the NTFS volume that contains the home folders. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder. When he attempts to save files to the folder, he receives the following error message: “Insufficient disk space.” Other users are not experiencing this problem with their home folders. You want to enable the user to save files in his home folder. What should you do?()A、 Use Windows Backup to archive and remove old files on the server. B、 Increase the server’s disk quota entry for the user to accommodate the additional files. C、 Log on to the network as a Recovery Agent.Decrypt all of the user’s files in his home folder. D、 Log on to the network by using the domain Administrator account.Grant the user Full Control permission to his home folder.
Your network consists of two subnets named Subnet1 and Subnet2. You have a server named Server1 that runs Windows Sever 2003 Service Pack 2 (SP2). Server1 is located on Subnet1. Users from Subnet1 report poor performance when they connect to Server1. Users from Subnet2 report that they are unable to connect to Server1. You monitor both network segments and discover a large number of NetBIOS broadcasts on both network segments. You need to reduce the number of broadcasts on the network. What should you deploy?() A、a DHCP Relay Agent.B、a WINS server.C、Connection Point Services (CPS).D、Simple TCP/IP Services on all computers.
You are a network administrator for your company. The network contains a Windows Server 2003 computer named Server1. Server1 has a single CPU, 512 MB of RAM, and a single 100-Mb network adapter. All network users’ home folders are stored on Server1. Users access their home folders by using a mapped network drive that connects to a shared folder on Server1. After several weeks, users report that accessing home folders on Server1 is extremely slow at certain times during the day. You need to identify the resource bottleneck that is causing the poor performance. What should you do? ()A、 Capture a counter log by using LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects, and view the log data information that is captured during periods of poor performance.B、 Configure Alerts on Server1 to log entries in the event logs for the LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects when the value of any object is more than 90.C、 Capture a trace log that captures Page faults, File details, Network TCP/IP, and Process creations/deletions events.D、 Implement auditing on the folder that contains the users’ home folders. Configure Network Monitor on Server1.
单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()ADefault gatewayBThe ports on the switchCPort security on the server's switch portDEthernet cable
单选题On a Windows network, users are reporting that they cannot access any network resources. The users can ping the IP address and connect to the network resource using the IP address. Which of the following is the cause of the problem?()AThe file server is offline.BThe DNS server is not resolving correctly.CThe DHCP server is not assigning correct IP addresses.DThe domain controller is not responding.
单选题Your network contains an Active Directory domain. The domain contains a member server that runs Windows Server 2008 R2.You have a folder named Data that is located on the C drive. The folder has the default NTFS permissions configured.A support technician shares C:/Data by using the File Sharing Wizard and specifies the default settings.Users report that they cannot access the shared folder.You need to ensure that all domain users can access the share.What should you do?()AEnable access-based enumeration (ABE) on the share.BAssign the Read NTFS permission to the Domain Users group.CFrom the Network and Sharing Center, enable public folder sharing.DFrom the File Sharing Wizard, configure the Read permission level for the Domain Users group.
单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A Default gatewayB The ports on the switchC Port security on the servers switch portD Ethernet cable
单选题What must be configured on the network in order for users on the Internet to view web pages located on Web Server 2?()AOn router R2, configure a default static route to the 192.168.1.0 network.BOn router R2, configure DNS to resolve the URL assigned to Web Server 2 to the 192.168.1.10 address.COn router R1, configure NAT to translate an address on the 209.165.100.0/24 network to 192.168.1.10.DOn router R1, configure DHCP to assign a registered IP address on the 209.165.100.0/24 network to Web Server 2.
单选题Your company has users who connect remotely to the main office through a Windows Server 2008 VPN server.You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do?()ACreate a network policy for VPN connections. Modify the Day and time restrictions.BCreate a network policy for VPN connections. Apply an IP filter to deny access to the corporate network.CModify the Logon hours for all user objects to specify only the VPN server on the Computer restrictions option.DModify the Logon Hours for the default domain policy to enable the Force logoff when logon hours expire option.
单选题You are the administrator of Company.com’s network. Your network has 100 Windows 2000 Professional computers and 10 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. In addition, the network servers is configured with disk quotas for the NTFS volume that contains the home folders. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder. When he attempts to save files to the folder, he receives the following error message: “Insufficient disk space.” Other users are not experiencing this problem with their home folders. You want to enable the user to save files in his home folder. What should you do?()A Use Windows Backup to archive and remove old files on the server. B Increase the server’s disk quota entry for the user to accommodate the additional files. C Log on to the network as a Recovery Agent.Decrypt all of the user’s files in his home folder. D Log on to the network by using the domain Administrator account.Grant the user Full Control permission to his home folder.
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS. What should you do?()ACheck the application log on the Web server.BUse Network Monitor to capture network traffic on the Web server.CReview the log files created by IIS on the Web server.DConfigure a performance log to capture all Web service counters. Review the performance log data.
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()A Configure the system event log to Do not overwrite.B In IAS, in Remote Access Logging, enable the Authentication requests setting.C Configure the Remote Access server to Log all events.D Create a custom remote access policy and configure it for Authentication-Type.
单选题Your network consists of two subnets named Subnet1 and Subnet2. You have a server named Server1 that runs Windows Sever 2003 Service Pack 2 (SP2). Server1 is located on Subnet1. Users from Subnet1 report poor performance when they connect to Server1. Users from Subnet2 report that they are unable to connect to Server1. You monitor both network segments and discover a large number of NetBIOS broadcasts on both network segments.You need to reduce the number of broadcasts on the network. What should you deploy?()Aa DHCP Relay AgentBa WINS serverCConnection Point Services(CPS)DSimple TCP/IP Services on all computers