Hub
Bridge
Switch
Router
第1题:
A. Setup an ACL that allows and logs all IP traffic between the two computers
B. Configure a spanning tree to check for a loop
C. Setup a span port on the switch to watch for CRC errors
D. Connect both computers using a crossover cable
第2题:
Refer to the exhibit.The network administrator requires easy configuration options and minimal routing protocol traffic.Which two options provide adequate routing table information for traffic that passes between the two routers and satisfy the requests of the network administrator?()

A.a dynamic routing procotol on InternetRouter to advertise summarized routers to CentralRouter.
B.a dynamic routing procotol on CentralRouter to advertise summarized routers to InternetRouter.
C.a static route on InternetRouter to direct traffic that is destined for 172.16.0.0/16 to CentralRouter.
D.a dynamic routing procotol on InternetRouter to advertise all routes to CentralRouer.
E.a dynamic routing procotol on CentralRouer to advertise all routes to InternetRouter
F.a static,default route on CentralRouter that directs traffic to InternetRouter.
第3题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第4题:
An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()
第5题:
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()
第6题:
Which of the following technologies allows an administrator to submit traffic to an IDS for review?()
第7题:
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()
第8题:
Setting up a custom community name
Configuring the network to block traffic on port 161
Configuring the Windows Firewall to block port 161
Setting SNMP to read only on the devices
Installing new MIBs
第9题:
A
B
C
D
第10题:
ping
iostat
netstat
ifconfig
第11题:
Hub
Bridge
Switch
Router
第12题:
Spanning tree
VLAN
PoE
Port mirroring
第13题:
The following exhibit displays the NetFlow statistics for a CIS router, which will be helpful for a network administrator to collect IP traffic information.Which two numbers separately refer to the percentage of packets sized between 32 and 64 bytes and the number of flows in progress?()

A. 24.9%, 980
B. 6.94%, 980
C. 69.4%, 35
D. cannot be determined from this output
E. 69.4%, 4061
第14题:
A.to control vty access into a router
B.to control broadcast traffic through a router
C.to filter traffic as it passes through a router
D.to filter traffic that originates from the router
E.to replace passwords as a line of defense against security incursions
第15题:
An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()
第16题:
A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()
第17题:
An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()
第18题:
Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()
第19题:
nGenius Real-Time Monitor
CiscoView
Device Fault Manager
Internetwork Performance Monitor
第20题:
Hub
VLAN
Router
Server
第21题:
The administrator should monitor all traffic between the staff member and the server.
The administrator should reconfigure the RAID configuration to allow more space.
The administrator should map a drive using the net use command.
The administrator should allow the staff member to use a USB drive.
第22题:
Configure a WMI event trigger.
Configure a Network Monitor capture filter.
Configure a Network Monitor trigger.
Configure a System Monitor alert.
第23题:
Setup an ACL that allows and logs all IP traffic between the two computers
Configure a spanning tree to check for a loop
Setup a span port on the switch to watch for CRC errors
Connect both computers using a crossover cable