Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?() A.ping addressB.tracert addressC.traceroute addressD.arp address

Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?()

A.ping address

B.tracert address

C.traceroute address

D.arp address


相关考题:

You need to perform. some initial configuration tasks on a new Ezonexam switch. What is the purpose of assigning an IP address to a switch?A.To provide local hosts with a default gateway addressB.To allow remote management of the switch.C.To allow the switch to respond to ARP requests between two hostsD.To ensure that hosts on the same LAN can communicate with each other.E.None of the above

A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()A. Micro segmentationB. Transparent switchingC. peer-to-peer networkingD. port securityE. store-and-forward switchingF. virtual local area networks

Which command can be used from a PC to verfy the connectivity between host that connect through path?() A.tracert addressB.ping addressC.arp addressD.traceroute address

For which type of connection should a straight-through cable be used?() A.switch to switchB.switch to hubC.switch to routerD.hub to hubE.router to PC

Which two statements are true regarding the USING clause in table joins?()A、It can be used to join a maximum of three tables B、It can be used to restrict the number of columns used in a NATURAL join C、It can be used to access data from tables through equijoins as well as nonequijoins D、It can be used to join tables that have columns with the same name and compatible data types

For which type of connection should a straight-through cable be used?()A、switch to switchB、switch to hubC、switch to routerD、hub to hubE、router to PC

Hosts on the same VLAN can communicate with each other but are unable to communicate with hosts on different VLANs. What is needed to allow communication between VLANs()。A、a switch with a trunk link that is configured between the switchesB、a router with an IP address on the physical interface that is connected to the switchC、a switch with an access link that is configured between the switchesD、a router with subinterfaces configured on the physical interface that is connected to the switch

What is the use of an "all configuration" backup in Cisco UCS?()A、 Can be used to migrate from a 6120 to a 6140 and retain the same service profilesB、 Can only be used on the fabric interconnect on which it was createdC、 Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster informationD、 Can be used to match firmware versions between 6120 and 6140 during a migration

Which three statements describe the configuration change management feature in DCNM LAN? ()A、 Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.B、 DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.C、 You can archive a maximum of 50 configuration versions per managed device.D、 Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.E、 Device-running configuration will be archived only if it differs from the last archived version.

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

Which router IOS commands can be used to troubleshoot LAN connectivity problems?()A、pingB、tracertC、ipconfigD、show ip routeE、winipcfgF、show interfaces

What is the purpose of assigning an IP address to a switch?()A、Provides local hosts with a default gateway addressB、Allows remote management of the switch.C、Allows the switch to respond to ARP requests between two hostsD、Ensures that hosts on the same LAN can communicate with each other.

On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A、a router with subinterfaces configured on the physical interface that is connected to the switchB、a router with an IP address on the physical interface connected to the switchC、a switch with an access link that is configured between the switchesD、a switch with a trunk link that is configured between the switches

A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()A、Micro segmentationB、Transparent switchingC、peer-to-peer networkingD、port securityE、store-and-forward switchingF、virtual local area networks

An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB

单选题Hosts on the same VLAN can communicate with each other but are unable to communicate with hosts on different VLANs. What is needed to allow communication between VLANs()。Aa switch with a trunk link that is configured between the switchesBa router with an IP address on the physical interface that is connected to the switchCa switch with an access link that is configured between the switchesDa router with subinterfaces configured on the physical interface that is connected to the switch

多选题Which two statements are true regarding the USING clause in table joins?()AIt can be used to join a maximum of three tablesBIt can be used to restrict the number of columns used in a NATURAL joinCIt can be used to access data from tables through equijoins as well as nonequijoinsDIt can be used to join tables that have columns with the same name and compatible data types

单选题A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()AMicro segmentationBTransparent switchingCpeer-to-peer networkingDport securityEstore-and-forward switchingFvirtual local area networks

单选题Which of the following would be used to connect two IDFs in the same building with the LAN, whileminimizing crosstalk?()ARG-6BSTPCCAT3DUTP

单选题What is the use of an "all configuration" backup in Cisco UCS?()A Can be used to migrate from a 6120 to a 6140 and retain the same service profilesB Can only be used on the fabric interconnect on which it was createdC Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster informationD Can be used to match firmware versions between 6120 and 6140 during a migration

单选题Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?()Aping addressBtracert addressCtraceroute addressDarp address

单选题Which command can be used from a PC to verfy the connectivity between host that connect through path?()Atracert addressBping addressCarp addressDtraceroute address

单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()ABPDUBPort securityCRSTPDSTPEVTPFBlocking mode

单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()AAs the root user from serverA run the command rhost serverBBAs the root user from serverA run the command rlogin serverBCAs the desired user from serverB run the command rhost serverADAs the desired user from serverA run the command rlogin serverB

单选题On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()Aa router with subinterfaces configured on the physical interface that is connected to the switchBa router with an IP address on the physical interface connected to the switchCa switch with an access link that is configured between the switchesDa switch with a trunk link that is configured between the switches

多选题Which of the following answers are correct characteristics of microsegmentation, in the context of a Local Area Network (LAN)?()ADedicated paths between sending and receiving hosts are established.BMultiple subnetwork broadcast addresses are created.CMultiple ARP tables are needed.DThe decrease in the number of collision domains.EBroadcast domains are enhanced.FAdditional bandwidth is used to connect hosts.

多选题Which router IOS commands can be used to troubleshoot LAN connectivity problems?()ApingBtracertCipconfigDshow ip routeEwinipcfgFshow interfaces