单选题The network is displayed in the diagram below: You use the following information for switch SWA:  Port Mode Encapsulation Status Native VLAN fa0/1 desirable n-802.1q trunking 5 Port VLANs is allowed on trunk fa0/ 1 1-100, 102-1005  Port VLANs is owned 

题目
单选题
The network is displayed in the diagram below: You use the following information for switch SWA:  Port Mode Encapsulation Status Native VLAN fa0/1 desirable n-802.1q trunking 5 Port VLANs is allowed on trunk fa0/ 1 1-100, 102-1005  Port VLANs is owned and active in management domain fa0/1 1-6. 8-100, 102-115, 197-999, 1002-1005  Port VLANs in spanning tree forwarding state and not pruned fa0/1 1-6, 8-100, 102-105, 108-999, 1002-1005  SW users in VLAN 107 complain that they are unable to gain access to the resources through theSW1 router.  What is the cause of this problem?()
A

VLAN 107 is not configured on the trunk

B

VLAN 107 does not exist on switch SWA

C

VTP is pruning VLAN 107

D

Spanning tree is not enabled on VLAN 107

E

None of the other alternatives apply


相似考题
更多“The network is displayed in the diagram below: You use the f”相关问题
  • 第1题:

    On your OSPF network, routers TK1 and TK2 belong to the same Ethernet network. However, they are unable to establish an adjacency over this link. While troubleshooting this problem, you issue the "show ip ospf interface Ethernet 0"command on each router. The output from these commands is displayed below:What is the underlying cause of the routers failing to become adjacent?()

    A. The OSPF area is misconfigured.

    B. The priority on TK2 should be set lower.

    C. The cost on TK2 should be set lower.

    D. The hello and dead timers are misconfigured.

    E. You need to add a backup designated router to the network.

    F. The OSPF process ID numbers do not match.


    参考答案:D

  • 第2题:

    Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? ()

    A.The subnet mask in use is 255.255.255.192.

    B.The subnet mask in use is 255.255.255.128.

    C.The IP address 172.16.1.25 can be assigned to hosts in VLAN1

    D.The IP address 172.16.1.205 can be assigned to hosts in VLAN1

    E.The LAN interface of the router is configured with one IP address.

    F.The LAN interface of the router is configured with multiple IP addresses.


    参考答案:B, C, F

  • 第3题:

    You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts. Which network mask should you use?()

    • A、255.255.255.192
    • B、255.255.255.224
    • C、255.255.255.240
    • D、255.255.255.248
    • E、255.255.255.252
    • F、255.255.255.254

    正确答案:B

  • 第4题:

    You have a network that supports VLSM and you need to reduce IP address waste in your point to point WAN links. Which of the masks below would you use?()

    • A、/38
    • B、/30
    • C、/27
    • D、/23
    • E、/18
    • F、/32

    正确答案:B

  • 第5题:

    You are the network administrator for Company.  Five of Company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity. You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building.  You need to configure the portable computers to always allow the employees to choose which network environment to use when they start their portable computers.   What should you do?()

    • A、Configure three different hardware profiles on each portable computer.
    • B、Configure a single hardware profile and rename it to Universal Profile.
    • C、Configure the wireless PC Card network adapters to use Automatic Private IP Addressing      (APIPA) when they cannot detect a DHCP server.
    • D、Instruct each employee to unplug the wireless PC Card network adapter whenever the      portable computer is attached to a network-enabled docking station.
    • E、Configure the hardware profiles selection to wait until a hardware profile is selected.
    • F、Configure the hardware profiles selection to select the first profile listed and set the wait time to zero seconds.
    • G、 Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.

    正确答案:A,E

  • 第6题:

    A technician would use a physical network diagram to determine:()

    • A、the cause of routing errors.
    • B、the number of switches on the network.
    • C、the number of users on the network.
    • D、where network latency will occur.

    正确答案:B

  • 第7题:

    You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.  You need to create a new IPv4 subnet on the network. The subnet must support a maximum of 5,000 hosts and must have a few unused addresses as possible.  How would you configure DHCP to support this subnet?()

    • A、You should use a subnet mask of 255.255.255.0.
    • B、You should use a subnet mask of 255.255.248.0
    • C、You should use a subnet mask of 255.255.240.0.
    • D、You should use a subnet mask of 255.255.224.0
    • E、You should use a subnet mask of 255.255.128.0
    • F、You should use a subnet mask of 255.255.0.0

    正确答案:D

  • 第8题:

    You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()

    • A、Restart the computer in the docking station.
    • B、Run the Add/Remove Hardware wizard.
    • C、Use Device Manager to scan for hardware changes.
    • D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.
    • E、Install the new network adapter driver.

    正确答案:B,E

  • 第9题:

    You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()

    • A、You should use /63.
    • B、You should use /64.
    • C、You should use /61.
    • D、You should use /62.

    正确答案:B

  • 第10题:

    问答题
    Practice 1  You should spend about 20 minutes on this task.  The diagram below shows a process that organic waste turn into garden fertiliser. Write a report for a university teacher describing the information shown below.  You should write at least 150 words.

    正确答案: 【参考范文】
    The diagram shows how to recycle organic waste to produce garden fertiliser.
    The operation goes in four stages according to the information shown in the diagram. First, we can see there is a plastic container with 2 cubic metres in capacity and four air inlets on walls allowing air to penetrate. Then, the waste is put into this plastic container, such as food, grass and newspapers when food and grass take 15cm each. In the third step, nitrogen and hot water (cold water is not permitted) are injected in. In the fourth container, we can see the heat coming from the bottom. After 6 months, the stored compost—green fertiliser—is formed and ready to go for gardening.
    In short, the scheme of organic fertiliser production has been described above clearly.
    解析: 暂无解析

  • 第11题:

    多选题
    You have an Ethernet network. Which of the conditions below can lead to increased congestion on your network?()
    A

    The use of Full-Duplex Mode.

    B

    The Creation on New Collision Domains.

    C

    The Creation on New Broadcast Domains.

    D

    The Addition of Hubs to the Network.

    E

    The use of switches in the Network.

    F

    The Amount of ARP or IPX SAP Traffic.


    正确答案: D,F
    解析: 暂无解析

  • 第12题:

    单选题
    You have a network that supports VLSM and you need to reduce IP address waste in your point to point WAN links. Which of the masks below would you use?()
    A

    /38

    B

    /30

    C

    /27

    D

    /23

    E

    /18

    F

    /32


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts.Which network mask should you use?()

    A.255.255.255.192

    B.255.255.255.224

    C.255.255.255.240

    D.255.255.255.248

    E.255.255.255.252

    F.255.255.255.254


    参考答案:B

  • 第14题:

    As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()

    • A、Enable the highest level of Syslogging available to ensure you log all possible event messages
    • B、Use SSH to access your Syslog information
    • C、Log all messages to the system buffer so that they can be displayed when accessing the router
    • D、Syncronize clocks on the network with a protocol such as Network Time Protocol

    正确答案:D

  • 第15题:

    You have an Ethernet network. Which of the conditions below can lead to increased congestion on your network?()

    • A、The use of Full-Duplex Mode.
    • B、The Creation on New Collision Domains.
    • C、The Creation on New Broadcast Domains.
    • D、The Addition of Hubs to the Network.
    • E、The use of switches in the Network.
    • F、The Amount of ARP or IPX SAP Traffic.

    正确答案:D,F

  • 第16题:

    You are the network administrator for . You are the administrator of a Windows Server 2003 computer named TestKing8. You log on to TestKing8 and attempt to access the network. You discover that the server is not communicationg on the network. You discover that a service pack and an updated network adapter driver were installed on TestKing8 the previous night. A complete backup, including the System State data, was performed before the service pack and the driver were installed. You need to restore network communications. What should you do first?()

    • A、Use Roll Back Driver to reinstall the previous driver for the network adapter.
    • B、Use the Backp or Restore Wizard to restore the backup from the previous night.
    • C、Restart TestKing8 by using Last Known Good Configuration option.
    • D、Use the Registry Editor to delete the registry settings for the network adapter driver.

    正确答案:A

  • 第17题:

    You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this network?()

    • A、There are 254 usable subnets.
    • B、There are 256 usable hosts per subnet.
    • C、There are 50 usable subnets.
    • D、There are 254 usable hosts per subnet.
    • E、There are 24 usable hosts per subnet.
    • F、There is one usable network.

    正确答案:A,D

  • 第18题:

    Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN.  What should you do?()

    • A、Use the Mobile PC program.
    • B、Use the Ease of Access program.
    • C、Use the System and Maintenance program.
    • D、Use the Network and Sharing Center program.

    正确答案:D

  • 第19题:

    You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

    • A、Disable the Connect even if the network is not broadcasting option.
    • B、In the Network and Sharing Center window, click the Diagnose and repair option.
    • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
    • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

    正确答案:D

  • 第20题:

    You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()

    • A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.
    • B、Use Windows Explorer to grant users Special access for the reports on the network share.
    • C、Use Windows Explorer to disable caching for the reports on the network share.
    • D、Use Windows Explorer to disable Offline files.

    正确答案:C

  • 第21题:

    You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()

    • A、Use Windows Explorer to receive the offline files
    • B、Using the Windows Explorer, disable the cache for the reports on the network share
    • C、Use the Windows NT explorer to grant the special access for the reports on the network  share
    • D、Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

    正确答案:B

  • 第22题:

    单选题
    You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()
    A

    You should use /63.

    B

    You should use /64.

    C

    You should use /61.

    D

    You should use /62.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()
    A

    Enable the highest level of Syslogging available to ensure you log all possible event messages

    B

    Use SSH to access your Syslog information

    C

    Log all messages to the system buffer so that they can be displayed when accessing the router

    D

    Syncronize clocks on the network with a protocol such as Network Time Protocol


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    A technician would use a physical network diagram to determine:()
    A

    the cause of routing errors.

    B

    the number of switches on the network.

    C

    the number of users on the network.

    D

    where network latency will occur.


    正确答案: D
    解析: 暂无解析