单选题Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A Host B and the switch need to be in the same subnet.B The switch needs and appropriate default gateway assigned.C The switch interface connected to the router is down.D Host B need to be assigned an IP address in vlan 1.E The switch interfaces need the appropriate IP addresses assigned.
单选题
Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()
A
Host B and the switch need to be in the same subnet.
B
The switch needs and appropriate default gateway assigned.
C
The switch interface connected to the router is down.
D
Host B need to be assigned an IP address in vlan 1.
E
The switch interfaces need the appropriate IP addresses assigned.
参考解析
解析:
暂无解析
相关考题:
At which of the following times should the administrator refer to the HCL?() A. Prior to purchasing hardwareB. Before installationC. When installing driversD. After installation
The following exhibit displays the NetFlow statistics for a CIS router, which will be helpful for a network administrator to collect IP traffic information.Which two numbers separately refer to the percentage of packets sized between 32 and 64 bytes and the number of flows in progress?()A. 24.9%, 980B. 6.94%, 980C. 69.4%, 35D. cannot be determined from this outputE. 69.4%, 4061
Refer to the exhibit. The routing protocols EIGRP and OSPF have been configured as indicated in the exhibit. Given the partial configuration of router R2, which network will be present in th e routing table of R4?()A. Network BB. Network A and Network BC. Network AD. neither Network A nor Network B
Refer to the exhibit. BigBids Incorporated is a worldwide auction provider. The network uses EIGRP as its routing protocol throughout the corporation. The network administrator does not understand the convergence of EIGRP. Using the output of the show ip eigrp topology all - links command, answer the administrator‘s questions.Which three networks is the router at 172.17.10.2 directly connected to?()A. 172.17.0.0/30B. 172.17.1.0/24C. 172.17.2.0/24D. 172.17.3 .0/25E. 172.17.3.128/25F. 172.17.10.0/24
Refer to the exhibit. ROUTE.com has just implemented this EIGRP network. A network administrator came to you for advice while trying to implement load balancing across part of their EIGRP network. If the variance value is configured as 2 on all routers and all o ther metric and K values are configured to their default values, traffic from the Internet to the data center will be load balanced across how many paths? ()A. 1B. 2C. 3D. 4E. 5
Refer to the exhibit.The actual speed of the serial links between R2 and R3 are 256 kb/s and 512k b/s respectively. When configuring EIGRP on routers R2 and R3, the network administrator configured the bandwidth of both serial interfaces to 512 kb/s. What will be the effect?()A. EIGRP will overutilize the 512 kb/s link.B. The interface delay value used in the EIGRP metric calculation will be inaccurate on the 256k b/s serial interface.C. The amount of bandwidth used for EIGRP routing protocol traffic on the 256 kb/s link can become excessive.D. EIGRP can load balance between the two serial links only if the variance is set to 2 or higher.E. Unequal cost load balancing will be disabled.
Refer to the exhibit. Routers RTA and RTB are running BGP but the session is active. What command needs to be added to esta blish the BGP session? () A. ip route 10.10.10.1 255.255.255.255 s0/0 ip route 10.10.10.1 255.255.255.255 s0/1B. network 10.10.10.0C. no synchronizationD. neighbor 10.10.10.1 next - hop - self
Refer to the exhibit.The network administrator is in acampus building distant from Building B.WANRouter is hosting a newly installed WAN link on interface S0/0.The new link is not functioning and the administrator needs to determine if the correct cable has been attached to the S0/0 interface.How can the administrator accurately verify the correct cable type on S0/0 in the most efficient manner?()A.Telnet to WANRouter and execute the command show interfaces S0/0B.Telnet to WANRouter and execute the commandshow processes S0/0C.Telnet to WANRouter and execute the command show running-configurationD.Telnet to WANRouter and execute the command show controller S0/0E.Physically examine the cable between WANRouter S0/0 and the DCE.F.Establish a console sessionon WANRouter and execute the command show interfaces S0/0
Refer to the exhibit. Give this output for SwitchC, what should the network administrator‘s next action be?() A.Check the trunk encapsulation mode for SwitchC‘s fa0/1 port.B.Check the duplex mode for SwitchC‘s fa0/1 port.C.Check the duplex mode for SwitchA‘s fa0/2 port.D.Check the trunk encapsulation mode for SwitchA‘s fa0/2 port.
Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrators attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A.Host B and the switch need to be in the same subnet.B.The switch needs and appropriate default gateway assigned.C.The switch interface connected to the router is down.D.Host B need to be assigned an IP address in vlan 1.E.The switch interfaces need the appropriate IP addresses assigned.
Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()A、A level 5 password is not setB、The vty password is missingC、The console password is missingD、An ACL is blocking Telnet access
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
Which of the following would provide a technician with a performance reference point to refer backto after hardware repair?()A、BaselineB、Network mapC、Wire schemeD、Asset management
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter
A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A、 That there are no DHCP relay serversB、 That the user account on Active Directory is not lockedC、 That the network card driver is not installed incorrectlyD、 The network connection is functioning
At which of the following times should the administrator refer to the HCL?()A、Prior to purchasing hardwareB、Before installationC、When installing driversD、After installation
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic
单选题Refer to the exhibit. An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is the problem?()A data link layerB application layerC access layerD session layerE network layer
单选题Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A Host B and the switch need to be in the same subnet.B The switch needs and appropriate default gateway assigned.C The switch interface connected to the router is down.D Host B need to be assigned an IP address in vlan 1.E The switch interfaces need the appropriate IP addresses assigned.
多选题Refer to the exhibit.The network administrator requires easy configuration options and minimal routing protocol traffic.Which two options provide adequate routing table information for traffic that passes between the two routers and satisfy the requests of the network administrator?()Aa dynamic routing procotol on InternetRouter to advertise summarized routers to CentralRouter.Ba dynamic routing procotol on CentralRouter to advertise summarized routers to InternetRouter.Ca static route on InternetRouter to direct traffic that is destined for 172.16.0.0/16 to CentralRouter.Da dynamic routing procotol on InternetRouter to advertise all routes to CentralRouer.Ea dynamic routing procotol on CentralRouer to advertise all routes to InternetRouterFa static,default route on CentralRouter that directs traffic to InternetRouter.
单选题At which of the following times should the administrator refer to the HCL?()A Prior to purchasing hardwareB Before installationC When installing driversD After installation
单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A Physically the voice network and the data network are separate.B The voice traffic will normally be on a different IP subnet than will the data traffic.C End user intervention is necessary to place the phone into the proper VLAN.D The same security policy should be implemented for both voice and data traffic.E The data VLAN must be configured as the native VLAN.
单选题Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()AA level 5 password is not setBThe vty password is missingCThe console password is missingDAn ACL is blocking Telnet access
单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A Physically the voice network and the data network are separateB The voice traffic will normally be on a different IP subnet than will the data trafficC End user intervention is necessary to place the phone into the proper VLAND The same security policy should be implemented for both voice and data trafficE The data VLAN must be configured as the native VLAN
单选题Refer to the exhibit. A network administrator configures a new router and enters the copy startup-config running-config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enter the system configuration dialog as shown. What is the caust of the problem?()A The network administrator faled to save the configuration.B The configuration register is set to 0x2100.C The boot system flash command is missing from the configuration.D The configuraiton register is set to 0x2102.E The router is configured with the boot system startup command.