单选题A network administrator wants to verify the active alarms on interface so-0/0/0. Which command displays this information?()Ashow interfaces alarmsBshow interfaces terseCshow alarms extensiveDshow interfaces extensive

单选题
A network administrator wants to verify the active alarms on interface so-0/0/0. Which command displays this information?()
A

show interfaces alarms

B

show interfaces terse

C

show alarms extensive

D

show interfaces extensive


参考解析

解析: 暂无解析

相关考题:

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode

A network administrator wants to verify the active alarms on interface so-0/0/0.0. Which command displays this information?() A. show interfaces alarmsB. show interfaces terseC. show alarms extensiveD. show interfaces extensive

An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?() A.IDSB.IPSC.FirewallD.Managed PKI

An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS

An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?() A.netstatB.tracerouteC.nbtstatD.ping

The administrator wants to verify the current state of the OSPF database loading process. Which show command should the administrator use?() A. show ip ospf [process - id] interfaceB. show ip ospf neighborC. show ip ospf [process - id]D. show ip ospf [process - id area - id] database

Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A、 Verify the configuration of the connected port on the network switch.B、 Reboot the server.C、 Install a new NIC on the server.D、 Verify that network cables are connected.

Your network consists of a single Active Directory domain that has three Active Directory sites. Each site contains two Active Directory domain controllers.  All domain controllers run Windows Server 2003 Service Pack 2 (SP2). All domain controllers have Windows Support Tools installed. You need to verify the replication status of Active Directory.  Which tool should you use?()A、Active Directory Sites and ServicesB、Nltest.exeC、Network MonitorD、Replmon.exe

You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()A、 Chief information officerB、 IT support staff in BostonC、 IT support staff in New YorkD、 Network administrator in ChicagoE、 Network administrator in New York

An administrator wants to rackmount a new server.  Power and network outlets are available and cooling in the room is adequate to support the additional server. The new server is identical to the other servers already installed.  Which of the following items should the administrator FIRST verify before installing the server?()A、HBA is compatible with the SAN fiber switch.B、Update the newly installed server with the latest KVM drivers.C、The UPS will continue to perform as expected with the additional load.D、Verify the server NIC is compatible with the NAS.

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A、 That there are no DHCP relay serversB、 That the user account on Active Directory is not lockedC、 That the network card driver is not installed incorrectlyD、 The network connection is functioning

An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()A、netstatB、tracerouteC、nbtstatD、ping

An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI

An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS

While reviewing cluster logs, and administrator notice that an event, network_down rs232a, occurred on the previous day. After verifying the physical network connections and device states, what command can be used to verify the cluster state?()A、 clstatB、 cllsifC、 clsnapshotinfoD、 clcheck_server

An AIX server has 2 network interfaces and the system administrator wants to enable the users on the locally configured network interface to be able to connect to systems configured on the global network interface.  How is it accomplished?()A、Enable routed on the serverB、Enable gated on the serverC、Enable ipforwarding on the serverD、Set network options back to default

Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

单选题An administrator wants to rackmount a new server.  Power and network outlets are available and cooling in the room is adequate to support the additional server. The new server is identical to the other servers already installed.  Which of the following items should the administrator FIRST verify before installing the server?()AHBA is compatible with the SAN fiber switch.BUpdate the newly installed server with the latest KVM drivers.CThe UPS will continue to perform as expected with the additional load.DVerify the server NIC is compatible with the NAS.

单选题A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A That there are no DHCP relay serversB That the user account on Active Directory is not lockedC That the network card driver is not installed incorrectlyD The network connection is functioning

单选题The administrator wants to verify the current state of the OSPF database loading process. Which show command should the administrator use?()Ashow ip ospf [process - id] interfaceBshow ip ospf neighborCshow ip ospf [process - id]Dshow ip ospf [process - id area - id] database

单选题You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()A Chief information officerB IT support staff in BostonC IT support staff in New YorkD Network administrator in ChicagoE Network administrator in New York

单选题A network administrator wants to verify the active alarms on interface so-0/0/0. Which command displays this information?()Ashow interfaces alarmsBshow interfaces terseCshow alarms extensiveDshow interfaces extensive

单选题As a network administrator, you have configured a Catalyst 6500 Series Switch with redundant supervisor engine in a CIS network. What is the result of issuing the redundancy force-switchover command on that switch?()AAutomatic switchover from active to standby on primary supervisor failureBReset of the primary supervisor.CManual switchover from active to standby supervisorDManual switchover from standby to active supervisor

单选题Which command do you use to show active alarms?()Ashow hardware stateBshow system alarmsCshow chassis stateDshow services alarms

单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()ADisable SSIDBWPACMAC filteringDRAS

单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()ABPDUBPort securityCRSTPDSTPEVTPFBlocking mode

单选题Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A Verify the configuration of the connected port on the network switch.B Reboot the server.C Install a new NIC on the server.D Verify that network cables are connected.