A network administrator provides an IP address of 128.135.0.142 and a subnet mask of 255.0.0.0.  Once a ping is attempted, it fails.  Which of the following options is the most probable cause of the failed ping?()A、0 is not valid in an IP addressB、128 is 

题目

A network administrator provides an IP address of 128.135.0.142 and a subnet mask of 255.0.0.0.  Once a ping is attempted, it fails.  Which of the following options is the most probable cause of the failed ping?()

  • A、0 is not valid in an IP address
  • B、128 is a reserved network
  • C、The subnet mask should be 255.255.0.0. since it is a class B
  • D、A network problem has occurred since IP and subnet are valid

相似考题
参考答案和解析
正确答案:C
更多“A network administra”相关问题
  • 第1题:

    Refer to the exhibit. The routing protocols EIGRP and OSPF have been configured as indicated in the exhibit. Given the partial configuration of router R2, which network will be present in th e routing table of R4?()

    A. Network B

    B. Network A and Network B

    C. Network A

    D. neither Network A nor Network B


    参考答案:A

  • 第2题:

    What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()

    • A、The network was originated via redistribution of an interior gateway protocol into BGP
    • B、The network was defined by a static route
    • C、The network was originated via a network or aggregate command
    • D、The network was learned via EBGP
    • E、The network was learned via IBGP

    正确答案:A,C

  • 第3题:

    What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when using the "show ip bgp" c ommand?()

    • A、The network was originated via redistribution of an interior gateway protocol into BGP.
    • B、The network was defined by a static route.
    • C、The network was learned via IBGP.
    • D、The network was learned via EBGP.
    • E、The network was  originated via a network or aggregate command.

    正确答案:A,E

  • 第4题:

    Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network.  You need to ensure that the computer is able to connect to the wireless network.  What should you do?()

    • A、Change the Network Category setting of the wireless connection to Public.
    • B、Enable the Internet Connection Sharing feature on the wireless network adapter.
    • C、Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.
    • D、Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.

    正确答案:D

  • 第5题:

    You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()

    • A、Content storage networking
    • B、Network optimization
    • C、Network management
    • D、Network security

    正确答案:D

  • 第6题:

    Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()

    • A、Optical network
    • B、Storage-area network (SAN)
    • C、Content delivery network (CDN)
    • D、Network management

    正确答案:D

  • 第7题:

    Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()

    • A、Optical network
    • B、Network management
    • C、Storage-area network (SAN)
    • D、Content delivery network (CDN)

    正确答案:B

  • 第8题:

    Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft   Online Responder on the internal network.   You need to recommend a secure method for Internet users to verify the validity of individual certificates.   The solution must minimize network bandwidth. What should you recommend?()

    • A、Deploy a subordinate CA on the perimeter network.
    • B、Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.
    • C、Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication  requests to a server on the internal network.
    • D、Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS  to redirect requests to the Online Responder on the internal network.

    正确答案:D

  • 第9题:

    设定某地某系列的NOTAM既进入国际及国内PIB,应进入INMS系统的哪个界面进行操作()。

    • A、System Data中的Subscriber List
    • B、Static Data中的Aerodrome
    • C、System Data中的Domestic Organizations
    • D、TNMS Administra

    正确答案:D

  • 第10题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()
    A

    Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.

    B

    Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.

    C

    Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.

    D

    Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()
    A

    64 network and 4 hosts

    B

    4 network and 64 hosts

    C

    2 network and 62 hosts

    D

    62 network and 2 hosts


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when using the "show ip bgp" c ommand?()
    A

    The network was originated via redistribution of an interior gateway protocol into BGP.

    B

    The network was defined by a static route.

    C

    The network was learned via IBGP.

    D

    The network was learned via EBGP.

    E

    The network was  originated via a network or aggregate command.


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()

    A. 64 network and 4 hosts

    B. 4 network and 64 hosts

    C. 2 network and 62 hosts

    D. 62 network and 2 hosts


    参考答案:C

  • 第14题:

    What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()

    • A、The network was originated via redistribution of an interior gateway protocol into BGP
    • B、The network was defined by a static route
    • C、The network was learned via IBGP
    • D、The network was learned via EBGP
    • E、The network was originated via a network or aggregate command

    正确答案:A,E

  • 第15题:

    How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()

    • A、64 network and 4 hosts
    • B、4 network and 64 hosts
    • C、2 network and 62 hosts
    • D、62 network and 2 hosts

    正确答案:C

  • 第16题:

    Which of the following Class A networks is reserved for "private networks" use only?()

    • A、network 10.0.0.0
    • B、network 127.0.0.0
    • C、network 129.135.0.0
    • D、network 192.168.0.0

    正确答案:A

  • 第17题:

    What does a router do?()

    • A、Routes traffic down alternative paths and connects the local-area network (LAN) to the wide- area network (WAN)
    • B、Reads Media Access Control (MAC) addresses to forward messages to the correct location and connects the local-area network (LAN) to the wide-area network (WAN)
    • C、Stores data on the network and connects the local-area network (LAN) to the wide-area network (WAN)
    • D、Broadcasts data to all devices that are connected to it across the local-area network (LAN) and wide-area network (WAN)

    正确答案:A

  • 第18题:

    How does network integration help businesses keep pace with changing network demands?()

    • A、 addition of strict firewalls
    • B、 limiting Internet access
    • C、 intelligence on foundation network devices
    • D、 increased use of network services

    正确答案:D

  • 第19题:

    A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()

    • A、The network uses MAC filtering
    • B、The network uses WEP
    • C、The network uses SSID broadcast
    • D、The network uses WPA

    正确答案:A

  • 第20题:

    All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()

    • A、Configure the Network authentication (Shared mode) setting.
    • B、Apply a Wireless Network Policy to set the network type to WPA-PSK.
    • C、Apply a Wireless Network Policy to automatically connect to the company wireless network.
    • D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

    正确答案:D

  • 第21题:

    多选题
    What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()
    A

    The network was originated via redistribution of an interior gateway protocol into BGP

    B

    The network was defined by a static route

    C

    The network was originated via a network or aggregate command

    D

    The network was learned via EBGP

    E

    The network was learned via IBGP


    正确答案: E,A
    解析: 暂无解析

  • 第22题:

    单选题
    A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()
    A

    The network uses MAC filtering

    B

    The network uses WEP

    C

    The network uses SSID broadcast

    D

    The network uses WPA


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which option describes the default roles available to RBAC on Cisco Nexus switches?()
    A

     admin, operator, network-admin, and network-operator

    B

     admin, read-only, network-admin, and network-operator

    C

     vdc-admin, vdc-operator, network-admin, and network-operator

    D

     vdc-admin, vdc-operator, network-admin, and network-operator (for Nexus 7000) and network- admin and network-operator (for other Nexus switches)

    E

     admin and read-only


    正确答案: B
    解析: 暂无解析

  • 第24题:

    多选题
    What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()
    A

    The network was originated via redistribution of an interior gateway protocol into BGP

    B

    The network was defined by a static route

    C

    The network was learned via IBGP

    D

    The network was learned via EBGP

    E

    The network was originated via a network or aggregate command


    正确答案: D,E
    解析: 暂无解析