单选题An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()AHubBBridgeCSwitchDRouter

单选题
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()
A

Hub

B

Bridge

C

Switch

D

Router


参考解析

解析: 暂无解析

相关考题:

Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?() A.HubB.VLANC.RouterD.Server

An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router

An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?() A. Caching enginesB. QoSC. Traffic shapingD. Load balancing

Which of the following technologies allows an administrator to submit traffic to an IDS for review?() A. Spanning treeB. VLANC. PoED. Port mirroring

An administrator is troubleshooting a communication issue between two computers on the sameLayer 2 switch.Which of the following is the BEST way to determine if the switch is causing the issue?() A. Setup an ACL that allows and logs all IP traffic between the two computersB. Configure a spanning tree to check for a loopC. Setup a span port on the switch to watch for CRC errorsD. Connect both computers using a crossover cable

The following exhibit displays the NetFlow statistics for a CIS router, which will be helpful for a network administrator to collect IP traffic information.Which two numbers separately refer to the percentage of packets sized between 32 and 64 bytes and the number of flows in progress?()A. 24.9%, 980B. 6.94%, 980C. 69.4%, 35D. cannot be determined from this outputE. 69.4%, 4061

Refer to the exhibit.The network administrator requires easy configuration options and minimal routing protocol traffic.Which two options provide adequate routing table information for traffic that passes between the two routers and satisfy the requests of the network administrator?()A.a dynamic routing procotol on InternetRouter to advertise summarized routers to CentralRouter.B.a dynamic routing procotol on CentralRouter to advertise summarized routers to InternetRouter.C.a static route on InternetRouter to direct traffic that is destined for 172.16.0.0/16 to CentralRouter.D.a dynamic routing procotol on InternetRouter to advertise all routes to CentralRouer.E.a dynamic routing procotol on CentralRouer to advertise all routes to InternetRouterF.a static,default route on CentralRouter that directs traffic to InternetRouter.

What are two reasons that a network administrator would use access lists (Choose two.)()。 A.to control vty access into a routerB.to control broadcast traffic through a routerC.to filter traffic as it passes through a routerD.to filter traffic that originates from the routerE.to replace passwords as a line of defense against security incursions

What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions

An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()A、Setup an ACL that allows and logs all IP traffic between the two computersB、Configure a spanning tree to check for a loopC、Setup a span port on the switch to watch for CRC errorsD、Connect both computers using a crossover cable

An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs

A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()A、The administrator should monitor all traffic between the staff member and the server.B、The administrator should reconfigure the RAID configuration to allow more space.C、The administrator should map a drive using the net use command.D、The administrator should allow the staff member to use a USB drive.

An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router

An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing

Which of the following technologies allows an administrator to submit traffic to an IDS for review?()A、Spanning treeB、VLANC、PoED、Port mirroring

Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()A、HubB、VLANC、RouterD、Server

You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

单选题The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()AnGenius Real-Time MonitorBCiscoViewCDevice Fault ManagerDInternetwork Performance Monitor

多选题An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic.  Which of the following settings would BEST provide additional monitoring security?()ASetting up a custom community nameBConfiguring the network to block traffic on port 161CConfiguring the Windows Firewall to block port 161DSetting SNMP to read only on the devicesEInstalling new MIBs

单选题Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()AHubBVLANCRouterDServer

单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()A AB BC CD D

单选题A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()AThe administrator should monitor all traffic between the staff member and the server.BThe administrator should reconfigure the RAID configuration to allow more space.CThe administrator should map a drive using the net use command.DThe administrator should allow the staff member to use a USB drive.

单选题A system administrator is monitoring a system that has recently shown a decrease in performance. The administrator suspects there is an overload of traffic on a single Ethernet adapter. Which of the following commands is best to identify a possible overload of the Ethernet adapter?()ApingBiostatCnetstatDifconfig

单选题You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet.You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks:  (1)Detect and identify traffic that is sent by the worm.  (2)Immediately send a notification to a network administrator that the infected computer needs to be repaired.   What should you do?()AConfigure a WMI event trigger.BConfigure a Network Monitor capture filter.CConfigure a Network Monitor trigger.DConfigure a System Monitor alert.

单选题An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()AHubBBridgeCSwitchDRouter

单选题An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()ASetup an ACL that allows and logs all IP traffic between the two computersBConfigure a spanning tree to check for a loopCSetup a span port on the switch to watch for CRC errorsDConnect both computers using a crossover cable

单选题Which of the following technologies allows an administrator to submit traffic to an IDS for review?()ASpanning treeBVLANCPoEDPort mirroring