The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

A. Switch1(config)# i nterface fa0 /1 Switch1(config-if)# ip address 192.168.24.3.255.255.255.0
B. Switch1 (config)#interface fa0/1 Switch1 (config-if)# switchport mode trunk
C. Switch 1 (config)# i nterface fa0 /1 Switch1 (config-if)# duplex full Switch1 (config-if)# speed 100
D. Switch1 (config-if)# default-gateway 192.168.24.1
E. Switch1 (config)# line con 0 Switch1(config-line)# password cisco Switch1 (config-line)#login
第1题:
Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()

A.Host B and the switch need to be in the same subnet.
B.The switch needs and appropriate default gateway assigned.
C.The switch interface connected to the router is down.
D.Host B need to be assigned an IP address in vlan 1.
E.The switch interfaces need the appropriate IP addresses assigned.
第2题:
Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()
第3题:
Why would a network administrator configure port security on a switch?()
第4题:
A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()
第5题:
A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?()
第6题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第7题:
Default gateway
The ports on the switch
Port security on the server's switch port
Ethernet cable
第8题:
Host B and the switch need to be in the same subnet.
The switch needs and appropriate default gateway assigned.
The switch interface connected to the router is down.
Host B need to be assigned an IP address in vlan 1.
The switch interfaces need the appropriate IP addresses assigned.
第9题:
A level 5 password is not set
The vty password is missing
The console password is missing
An ACL is blocking Telnet access
第10题:
BPDU
Port security
RSTP
STP
VTP
Blocking mode
第11题:
Enable VTP pruning on any switch in the management domain
Enable VTP pruning on any client switch in the domain
Enable VTP pruning on a VTP server in the management domain
Enable VTP pruning on every switch in the domain
None of the other alternatives apply
第12题:
To prevent unauthorized Telnet access to a switch port.
To limit the number of Layer 2 broadcasts on a particular switch port.
To prevent unauthorized hosts from accessing the LAN.
To protect the IP and MAC address of the switch and associated ports.
To block unauthorized access to the switch management interfaces over common TCP ports.
第13题:
A.to prevent unauthorized Telnet access to a switch port
B.to limit the number of Layer 2 broadcasts on a particular switch port
C.to prevent unauthorized hosts from accessing the LAN
D.to protect the IP and MAC address of the switch and associated ports
E.to block unauthorized access to the switch management interfaces over common TCP ports
第14题:
Why would a network administrator configure port security on a switch?()
第15题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
第16题:
The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()
第17题:
A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()
第18题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第19题:
One router is running RIPv1.
RIP neighbor is 224.0.0.9.
The network contains a loop.
Network 10.10.1.0 is reachable.
第20题:
Micro segmentation
Transparent switching
peer-to-peer networking
port security
store-and-forward switching
virtual local area networks
第21题:
Default gateway
The ports on the switch
Port security on the servers switch port
Ethernet cable
第22题:
Configure port Fa0/1 to accept connections only from the static IP address of the server.
Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
Configure the MAC address of the server as a static entry associated with port Fa0/1.
Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
第23题:
to prevent unauthorized Telnet access to a switch port
to limit the number of Layer 2 broadcasts on a particular switch port
to prevent unauthorized hosts from accessing the LAN
to protect the IP and MAC address of the switch and associated ports
to block unauthorized access to the switch management interfaces over common TCP ports