A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A. RIP v1B. RIP v2C. IGRPD. OSPFE. EIGRP
A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()
A. RIP v1
B. RIP v2
C. IGRP
D. OSPF
E. EIGRP
相关考题:
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?() A.IDSB.IPSC.FirewallD.Managed PKI
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center
A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()A.B.C.D.
A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A、RIP v1B、RIP v2C、IGRPD、OSPFE、EIGRP
Which statement is true about the Cisco Self-Defending Network?()A、The Cisco Self-Defending Network defines the physical position of the firewall to protect against internal and external attacksB、The Cisco Self-Defending Network Provides static filtering against known and unknown internal and external attacksC、The Cisco Self-defending Network Provides dynamic protection against known and unknown internal and external attacksD、The Cisco Self-defending Network Provides the Elements to install the antivirus software on the End-User Workstation
What are three factors a network administrator must consider before implementing Netflow in the network?()A、CPU utilizationB、where Netflow data will be sentC、number of devices exporting Netflow dataD、port availabilityE、SNMP versionF、WAN encapsulation
You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place. Who can authorize the DHCP servers?()A、 Chief information officerB、 IT support staff in BostonC、 IT support staff in New YorkD、 Network administrator in ChicagoE、 Network administrator in New York
The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing
Which three of these are elements of the Cisco Unified Wireless Network architecture?()A、cell phonesB、remote accessC、mobility servicesD、network managementE、network unificationF、network decentralization
As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()A、using DHCP snoopingB、snooping the incoming 802.1Q VLAN tagC、using CDPD、snooping the CoS marking on the incoming frames
As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you how to create separate networks on one Storage Area Network so as to provide enhanced availability, security, etc. Which of the following solution will enable that?()A、Cisco Direct Attached StorageB、Cisco Virtual Attached Storage NetworkC、Cisco Virtual Storage Area NetworkD、Cisco Direct Storage Area Network
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center
Which one is not the feature of the Cisco Unified Wireless Network architecture?()A、network unificationB、remote accessC、mobility servicesD、network management
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster. What should you do? ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.
You are designing a Windows Server 2008 R2 Hyper-V virtualization environment. Your host servers must have the following elements: A dedicated management network adapter.A dedicated virtual network for child iSCSI network traffic.A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()A、three network adapters that support 802.1pB、two network adapters that support 802.1q, and one iSCSI host bus adapterC、two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyD、two network adapters that support 802.1q, and one network adapter that supports Jumbo frames
You are the network administrator for your company. The network contains 12 Windows Server 2003 computers and 300 Windows XP Professional computers. Three servers named Server4, Server5, and Server6 run a critical business application. When performing performance baselining on these three servers, you notice that Server6 has a larger number of concurrently connected users at any given moment than Server4 or Server5. The additional workload is causing performance problems on Server6. You need to identify which client computers are connecting to Server6.You plan to run Network Monitor on Server6 to capture all packets sent to Server6. The capture task must be configured to meet the following requirements.To reduce the size of the captured data, you want to capture only the packet headers.If a large number of packets are captured, the packets must be retained on the server. Captured packets must not overwrite previously captured packets. Which two tasks should you perform to configure Network Monitor?()A、Configure the Network Monitor display filters.B、Configure the Network Monitor capture filters.C、Increase the Network Monitor buffer size setting.D、Decrease the Network Monitor buffer size setting.E、Increase the Network Monitor frame size setting.F、Decrease the Network Monitor frame size setting.
单选题A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()ARIP v1BRIP v2CIGRPDOSPFEEIGRP
单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()AOne router is running RIPv1.BRIP neighbor is 224.0.0.9.CThe network contains a loop.DNetwork 10.10.1.0 is reachable.
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1. What should you do?()AInstall the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.BOpen Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.CInstall Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.DOpen Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
单选题As an experienced network administrator, you are aware of the knowledge that it is unnecessary to configure complex overlay network topologies while applying Cisco Wide Area Application Services (WAAS) technology. What is most probably the reason for that?()AContent pre-positioningBAutomatic discovery of Cisco WAEsCComprehensive logs, reports, and graphsDRemote scheduling of software distribution
单选题You are designing a Windows Server 2008 R2 Hyper-V Virtualization environment. Your host servers must have the following elements: - A dedicated management network adapter. - A dedicated virtual network for child iSCSI network traffic. - A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()ATwo network adapters that support 802.1p, and one iSCSI host bus adapterBTwo network adapters that support 802.1p, and one network adapter that supports TCP ChimneyCTwo network adapters that support 802.lq, and one network adapter that supports Jumbo framesDThree network adapters that support 802. 1p
单选题You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place. Who can authorize the DHCP servers?()A Chief information officerB IT support staff in BostonC IT support staff in New YorkD Network administrator in ChicagoE Network administrator in New York
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address. What should you do?()ACreate an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.BCreate a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.CCreate an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.DCreate a Pattern Match capture trigger for the 131.107.0.1 IP address.
单选题You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()AIP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsBdetailed security device specificationsCresults from pilot network testingDresults from a network audit
单选题You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()Aa list of applications currently in use in the networkBIP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsCdetailed security device specificationsDresults from pilot network testing