多选题Your network is suffering from regular outages. After troubleshooting, you learn that the transmit lead of afiber uplink was damaged. Which two features can prevent the same issues in the future?()Aroot guardBloop guardCBPDU guardDUDLDEBPDU skew detection

多选题
Your network is suffering from regular outages. After troubleshooting, you learn that the transmit lead of afiber uplink was damaged. Which two features can prevent the same issues in the future?()
A

root guard

B

loop guard

C

BPDU guard

D

UDLD

E

BPDU skew detection


参考解析

解析: 暂无解析

相关考题:

Your network contains a client computer named Computer1 that runs Windows 7. Computer1 is configured to use DirectAccess. You need to identify the URL of the network location server that Computer1 is configured to use. What should you do?()A. From a command prompt, run ipconfig.exe /displaydns.B. From a command prompt, run netsh.exe namespace show policy.C. From Control Panel, run the network adapter troubleshooter.D. From the Network Connection Status window, view the Network Connection Details.

Personal firewall is a technology that helps(66)intruders from accessing data on your PC via the Internet or another network, by keeping(67)data from entering or exiting your system.Hackers do not just target national security organizations for(68): They want your tax returns, network passwords, or bank account numbers. And you do not want the FBI kicking in your door because someone hijacked your PC to(69)in the latest denial-of-service attack on the Internet. Now that "always-on" broadband connections such as cable modems and digital subscriber line are becoming more popular, home users are at risk. Fortunately, you can protect your data. Firewalls can block(70)attacks and protect your PC from outside threats.A.allowB.preventC.inviteD.get

Which of the following should an administrator do after running a command from the console onthe perimeter router?() A. Update the configuration logsB. Update the network wiring schematicsC. Update the network configuration proceduresD. Compare the configuration with the baseline

People suffering from accidents incurred at work or from occupational diseases receive preferential treatment by the social security service compared with those suffering from civil accidents and ordinary illnesses.

Your vessel has completed an inspection for certification and is issued a Temporary Certificate of Inspection. The Temporary Certificate ______.A.has the full force of the regular Certificate of InspectionB.expires six months after it is issuedC.must be exchanged for a regular Certificate of Inspection within 3 monthsD.is retained in the custody of the Master

A patient suffering from heat exhaustion should be______.A.moved to a cool room and told to lie downB.kept standing and encouraged to walk slowly and continuouslyC.given a glass of water and told to return to work after 15 minutes of restD.None of the above are correct

CSA protects your host by: ()A、 Preventing browsers from opening network sockets inlistening state.B、 Preventingbuffer overflows.C、 Preventingusers from entering unencrypted passwordsD、 Preventing browsers from acting as client to webservers.

The route processor is critical to the operation of a network, and any service disruption to the route processor can result in network outages. Which QoS tool canprotectroute processor traffic?()A、control plane policingB、data plane policingC、network-based application recognition (NBAR)D、service plane policingE、management plane policing

Your network is suffering from regular outages. After troubleshooting, you learn that the transmit  lead of a fiber uplink was damaged. Which two features can prevent the same issues in the  future?()A、root guardB、loop guardC、BPDU guardD、UDLDE、BPDU skew detection

Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You plan to deploy Microsoft Virtual Desktop Infrastructure. You plan to scale both static and dynamic deployments across several servers. You need to design a plan that supports static and dynamic deployments and that allows for capacity growth without outages.  What should you include in your plan?()A、Use DNS round-robin and network load balancingB、Use network load balancing and failover clusteringC、Use the Remote Desktop Gateway and network load balancingD、Use the Remote Desktop Connection Broker and failover clustering

Your network contains a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has an application that runs as a service.The application fails intermittently. After each failure, you manually restart the service. You need to ensure that the application starts automatically after a failure. What should you do?()A、From the Services snap-in, modify the Log On settings of the service.B、From the Services snap-in, modify the Recovery settings of the service.C、From the properties of the application executable, set the compatibility mode to Windows 2000.D、From the properties of the application executable, enable the Allow non-administrators to run this program setting.

Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

You are the network administrator for ExamSheet.net. You administer ExamSheet's Windows 2000 network. You want to update the device driver for the network adapter in your Windows 2000 Professional computer. You log on the computer by using the local Administrator account. You use Device Manager to verify that the network adapter is installed on your computer. You select the Driver tab and Update Driver option, and install a new driver from the network adapter manufacturer. You restart the computer. After displaying the Windows 2000 Professional startup screen, your computer displays aCkernel stop error message. You want to configure your computer to start successfully.  Which two methods can you use to resolve the problem?()A、Perform an emergency repair of the system from the Windows 2000 Professional CD-ROM by     using the Emergency Repair Disk for the computer.B、Restart the computer. In the Recovery Console, use the Extract utility to reinstall the loopback     driver from the Windows 2000 Professional CD-ROM.C、Restart the computer by using the last know good configuration.D、Restart the computer in safe mode and reinstall the original network adapter driver. E、Restart the computer and disable Plug and Play in the computer BIOS.

单选题Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()AConfigure the NWLink frame type of the network adapters to be ethernet 802.3.BConfigure the NWLink frame type of the network adapters to be ethernet II.CReplace the network adapters with 10/100 BNC adapters.DReplace the network adapters with 10/100 UTP network adapters.

单选题After working all night and successfully configuring a Cisco router for the TestKing network you save your changes on the startup config, reboot the router, and go out for a cigarette. When you return, none of your changes are active and the router boots to the initial configuration mode! Which of the choices below indicates the source of your problem?()AHardware failure in NVRAM prevents the router from loading the configBStartup-config in flash is corrupt and cannot be analyzedCRouter configuration-register set to bypass startup configurationDStartup-config in NVRAM is corrupt and cannot be analyzedENone of the above

多选题Your database is in NOARCHIVELOG mode. After which two operations you should take the backup of control file?()Aadding a new user to the databaseBdropping a user from the databaseCdropping a table from the databaseDdropping a data file from a tablespaceEadding a new tablespace to the database

单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()ASet the driver signing option to block.BSet the driver signing option to ignore.CIn the computer’s BIOS, reserve an unused IRQ for ISA devices.DIn the Device Manager, configure the second ISA network adapter to use an unused IRQ.

单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()AEnable the Require domain controller to unlock policy.BSet the Number of previous logons to cache policy to 0.  CRemove all user and group accounts from the Log on locally user right. DRemove all user and group accounts from the Access this computer from the network user right.

单选题A patient suffering from heat exhaustion should be().Amoved to a cool room and told to lie downBkept standing and encouraged to walk slowly and continuouslyCgiven a glass of water and told to return to work after 15 minutes of restDNone of the above are correct

单选题Your vessel has completed an inspection for certification and is issued a Temporary Certificate of Inspection. The Temporary Certificate().Ahas the full force of the regular Certificate of InspectionBexpires six months after it is issuedCmust be exchanged for a regular Certificate of Inspection within 3 monthsDis retained in the custody of the Master

单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()AIP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsBdetailed security device specificationsCresults from pilot network testingDresults from a network audit

单选题To establish a communication channel for the telex service in the INMARSAT-Aterminal, you should first().Aestablish a communication channel from the CES, via the International Telex Network to the final destinationBset up a communication channel from your SES, via a satellite, to a CES within your ocean regionCset up a channel directly to the addressee at the destinationDestablish a channel from your terminal , via the International Telex Network to a CES within your ocean region

多选题Your network is suffering from regular outages. After troubleshooting, you learn that the transmit  lead of a fiber uplink was damaged. Which two features can prevent the same issues in the  future?()Aroot guardBloop guardCBPDU guardDUDLDEBPDU skew detection

单选题Which of the following should an administrator do after running a command from the console onthe perimeter router?()AUpdate the configuration logsBUpdate the network wiring schematicsCUpdate the network configuration proceduresDCompare the configuration with the baseline

单选题CSA protects your host by: ()A Preventing browsers from opening network sockets inlistening state.B Preventingbuffer overflows.C Preventingusers from entering unencrypted passwordsD Preventing browsers from acting as client to webservers.

多选题You are the network administrator of a medium-sized company, and users are complaining that they cannot send emails to some organizations. During your troubleshooting, you notice that your DNS MX record is blacklisted by several public blacklist filters. After clearing these listings for your IP address, and assuming that your email server has the right virus protection in place, what are two possible solutions to prevent this from happening in the future?()AChange your Internet provider.BChange your public IP address.CAllow the email server to send traffic only to TCP port 25.DPut your email server in a DMZ.EUse a separate public IP address for your email server only.

单选题How do you treat someone suffering from electrical shock after you secure the source?()Acheck for respirationBcheck for pulseCtreat for shockDAll of the above

单选题You use a Windows 2000 Professional computer at home. You need to access shared files on a server named server1. This server is on your company’s network and is not accessible from the internet. Your company’s network also includes a third party VPN server that is accessible from the internet. You dial in to your internet service provider and then create a VPN connection to your company’s VPN server. After the connection is successfully established, you run the net view//server1 command and receive the following error ‘the server is inaccessible or could not be found’. You need to access the shared files on server 1. What should you do? ()AStop and then start the TCP/IP NetBIOS helper service on your computer.BStop and then start the DNS client service on your computer.CAdd a HOSTS entry for server1 to your computer.DAdd a LMHOSTS entry for server1 to your computer.