The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()A. Switch1(config)# i nterface fa0 /1 Switch1(config-if)# ip address 192.168.24.3.255.255.255.0B. Switch1 (config)#interface fa0/1 Switch1 (config-if)# switchport mode trunkC. Switch 1 (config)# i nterface fa0 /1 Switch1 (config-if)# duplex full Switch1 (config-if)# speed 100D. Switch1 (config-if)# default-gateway 192.168.24.1E. Switch1 (config)# line con 0 Switch1(config-line)# password cisco Switch1 (config-line)#login

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

A. Switch1(config)# i nterface fa0 /1 Switch1(config-if)# ip address 192.168.24.3.255.255.255.0

B. Switch1 (config)#interface fa0/1 Switch1 (config-if)# switchport mode trunk

C. Switch 1 (config)# i nterface fa0 /1 Switch1 (config-if)# duplex full Switch1 (config-if)# speed 100

D. Switch1 (config-if)# default-gateway 192.168.24.1

E. Switch1 (config)# line con 0 Switch1(config-line)# password cisco Switch1 (config-line)#login


相关考题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)A.Configure port Fa0/1 to accept connections only from the static IP address of the serverB.Configure the MAC address of the server as a static entry associated with port Fa0/1C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectorsD.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverE.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode

A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()A. Micro segmentationB. Transparent switchingC. peer-to-peer networkingD. port securityE. store-and-forward switchingF. virtual local area networks

Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrators attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A.Host B and the switch need to be in the same subnet.B.The switch needs and appropriate default gateway assigned.C.The switch interface connected to the router is down.D.Host B need to be assigned an IP address in vlan 1.E.The switch interfaces need the appropriate IP addresses assigned.

Why would a network administrator configure port security on a switch()。 A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports

Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()A、A level 5 password is not setB、The vty password is missingC、The console password is missingD、An ACL is blocking Telnet access

Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.

Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()A、Configure port Fa0/1 to accept connections only from the static IP address of the server.B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C、Configure the MAC address of the server as a static entry associated with port Fa0/1.D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.

A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?()A、A switch in the VTP client mode cannot update its local VLAN database.B、A trunk link must be configured between the switches to forward VTP updates.C、A switch in the VTP server mode can update a switch in the VTP transparent mode.D、A switch in the VTP transparent mode will forward updates that it receives to other switches.E、A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.F、A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.

A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()A、Micro segmentationB、Transparent switchingC、peer-to-peer networkingD、port securityE、store-and-forward switchingF、virtual local area networks

An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable

An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable

单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()ADefault gatewayBThe ports on the switchCPort security on the server's switch portDEthernet cable

单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()AOne router is running RIPv1.BRIP neighbor is 224.0.0.9.CThe network contains a loop.DNetwork 10.10.1.0 is reachable.

单选题Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A Host B and the switch need to be in the same subnet.B The switch needs and appropriate default gateway assigned.C The switch interface connected to the router is down.D Host B need to be assigned an IP address in vlan 1.E The switch interfaces need the appropriate IP addresses assigned.

单选题A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()AMicro segmentationBTransparent switchingCpeer-to-peer networkingDport securityEstore-and-forward switchingFvirtual local area networks

单选题Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()AA level 5 password is not setBThe vty password is missingCThe console password is missingDAn ACL is blocking Telnet access

单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A Default gatewayB The ports on the switchC Port security on the servers switch portD Ethernet cable

单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()ABPDUBPort securityCRSTPDSTPEVTPFBlocking mode

多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server onlinE.What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? ()AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

单选题The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management  domain?()AEnable VTP pruning on any switch in the management domainBEnable VTP pruning on any client switch in the domainCEnable VTP pruning on a VTP server in the management domainDEnable VTP pruning on every switch in the domainENone of the other alternatives apply

单选题Why would a network administrator configure port security on a switch()。Ato prevent unauthorized Telnet access to a switch portBto limit the number of Layer 2 broadcasts on a particular switch portCto prevent unauthorized hosts from accessing the LANDto protect the IP and MAC address of the switch and associated portsEto block unauthorized access to the switch management interfaces over common TCP ports

单选题Why would a network administrator configure port security on a switch?()ATo prevent unauthorized Telnet access to a switch port.BTo limit the number of Layer 2 broadcasts on a particular switch port.CTo prevent unauthorized hosts from accessing the LAN.DTo protect the IP and MAC address of the switch and associated ports.ETo block unauthorized access to the switch management interfaces over common TCP ports.