As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop.Enabling which of the following feature will be able to prevent this problem from happening again?()A.GLBPB.RSTPC.BPDU guardD.root guard

As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop.Enabling which of the following feature will be able to prevent this problem from happening again?()

A.GLBP

B.RSTP

C.BPDU guard

D.root guard


相关考题:

Your network contains a server named Server1 that runs Windows Server 2008 R2.You discover that the server unexpectedly shut down several times during the past week.You need to identify what caused the shutdowns and which software was recently installed.What should you click from Action Center?()A. Maintenance, and then View reliability historyB. Troubleshooting, and then ProgramsC. Troubleshooting, and then System and SecurityD. Troubleshooting, and then View history

You are the network administrator for Ezonexam. The network includes a Microsoft Windows NT Server 4.0 member server computer that has a non-Plug and Play ISA network adapter.You want to upgrade this computer to Microsoft Windows 2000 Server. You also want to ensure that you maintain the current device configuration during the upgrade.What should you do? (Each correct answer presents part of the solution. Choose two)A. Install the latest driver for the network adapter.B. Disable the network adapter.C. Start the upgrade process by using Winnt32.exeD. Start the upgrade process by booting from the Windows 2000 Server compact disc.E. Configure BIOS to reserve the IRQ currently in use by the network adapter.F. Press F6 at the beginning of the text mode setup to specify an additional driver.

When you are(71)a home or small office network, it is recommended that you use the Network Setup Wizard in Windows XP Home Edition to enable Internet Connection Sharing. The Network Setup Wizard automatically provides all of the network settings you need to(72)one Internet connection with all the computers in your network.After ICS is enabled, and you make sure that all of your computers can(73)with each other and they have Internet(74), you can use programs such as Internet Explorer and Outlook Express as if they were(75)connected to the Internet service provider(ISP). When a request to the Internet is made, the ICS host computer connects to the ISP and creates the connection so that other computers can reach a specified Web address or download E-mail.A.creatingB.reachC.going forD.setting up

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?() A. ICMPB. SNMPC. TCPD. HTTPS

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()A.AB.BC.CD.D

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

A new router, named TK1, is being installed. You wish to add this router to your existing OSPF network. In doing so, you configure the following: TK1(config)# router ospf 1 TK1(config-router)# network 10.10.10.0 255.255.255.0 area 0 After making this change, you notice that the networks attached to TK1 are not being learned by the other OSPF routers. What could be the cause of this?()A、The AS is not correctly configuredB、The network subnet mask is incorrectly configuredC、The network wildcard mask is configured incorrectlyD、The network number is not correctly configuredE、The process id is configured incorrectlyF、None of the above

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()A、GLBPB、RSTPC、BPDU guardD、root guard

As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()A、An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.B、The counters were deleted.C、The ARP cache was removed.D、The IP EIGRP neighbor relationship was cleared manually.

As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()A、Perform a network audit.B、Form an impression about the network.C、Use traffic analysis to augment organizational input.D、Prepare and add to the network description.

As an experienced Network Engineer, you are responsible for network connectivity and system configuration. Which of the following protocols will be supported by Cisco Nonstop Forwarding (NSF)?()A、ISSU,OSPF,IS-ISB、IETF,OSPF,ISSUC、IS-IS,EIGRP,SSO,BGPD、EIGRP,BGP,OSPF,IS-IS

As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you how to create separate networks on one Storage Area Network so as to provide enhanced availability, security, etc. Which of the following solution will enable that?()A、Cisco Direct Attached StorageB、Cisco Virtual Attached Storage NetworkC、Cisco Virtual Storage Area NetworkD、Cisco Direct Storage Area Network

As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)A、It provides reliable input for verifying network consistency.B、It requires a network audit to support some upgrade decisions.C、It requires a network audit to support any network restructuring.D、It begins with gathering organizational input that may be inaccurate.

As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)A、cost savingsB、product varietyC、well-tested interoperabilityD、regular upgrade process

You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.

Your network contains a server named Server1 that runs Windows Server 2008 R2.You discover that the server unexpectedly shut down several times during the past week.You need to identify what caused the shutdowns and which software was recently installed. What should you click from Action Center?()A、Maintenance, and then View reliability historyB、Troubleshooting, and then ProgramsC、Troubleshooting, and then System and SecurityD、Troubleshooting, and then View history

You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured.   What should you do?()A、From a command prompt, run the diskperf command.B、Run Network Monitor in dedicated capture mode.C、Configure a Network Monitor capture filter.D、Increase the buffer size in Network Monitor.

单选题You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()A Only use fiber in pairs.B Configure root guard on your switches.C Do not use fiber but use copper.D Configure UDLD to prevent one-way link conditions.

单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()ASet the driver signing option to block.BSet the driver signing option to ignore.CIn the computer’s BIOS, reserve an unused IRQ for ISA devices.DIn the Device Manager, configure the second ISA network adapter to use an unused IRQ.

单选题As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()AEnable the highest level of Syslogging available to ensure you log all possible event messagesBUse SSH to access your Syslog informationCLog all messages to the system buffer so that they can be displayed when accessing the routerDSyncronize clocks on the network with a protocol such as Network Time Protocol

单选题While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop. Which of these can you implement to prevent future occurrences of this issue?()ARSTPBroot guardCBPDU guardDGLBP

单选题You are the network administrator of a small Layer 2 network with 50 users. Lately, users have beencomplaining that the network is very slow. While troubleshooting, you notice that the CAM table of yourswitch is full, although it supports up to 12, 000 MAC addresses. How can you solve this issue and preventit from happening in the future?()AUpgrade the switchesBConfigure BPDU guardCConfigure VLAN access listsDConfigure port securityEConfigure Dynamic ARP inspection

多选题As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()AAn update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.BThe counters were deleted.CThe ARP cache was removed.DThe IP EIGRP neighbor relationship was cleared manually.

单选题You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network,you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future,particularly when connecting and reconnecting fiber pairs?()AOnly use fiber in pairs.BConfigure root guard on your switches.CDo not use fiber but use copper.DConfigure UDLD to prevent one-way link conditions.

单选题As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()ANetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.BNetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.CNetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.DNetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.

单选题You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()AUpgrade the switchesBConfigure BPDU guardCConfigure VLAN access listsDConfigure port securityEConfigure Dynamic ARP inspection

多选题As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)AIt provides reliable input for verifying network consistency.BIt requires a network audit to support some upgrade decisions.CIt requires a network audit to support any network restructuring.DIt begins with gathering organizational input that may be inaccurate.