A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of

题目

A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()

A. RIP v1

B. RIP v2

C. IGRP

D. OSPF

E. EIGRP


相似考题
更多“A network administrator is designing a Cisco network for a large company. The network must ”相关问题
  • 第1题:

    Which statement is true about the Cisco Self-Defending Network?()

    • A、The Cisco Self-Defending Network defines the physical position of the firewall to protect against internal and external attacks
    • B、The Cisco Self-Defending Network Provides static filtering against known and unknown internal and external attacks
    • C、The Cisco Self-defending Network Provides dynamic protection against known and unknown internal and external attacks
    • D、The Cisco Self-defending Network Provides the Elements to install the antivirus software on the End-User Workstation

    正确答案:C

  • 第2题:

    You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()

    • A、 Chief information officer
    • B、 IT support staff in Boston
    • C、 IT support staff in New York
    • D、 Network administrator in Chicago
    • E、 Network administrator in New York

    正确答案:A

  • 第3题:

    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()

    • A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
    • B、a list of the customer requirements
    • C、detailed security device specifications
    • D、results from pilot network testing

    正确答案:B

  • 第4题:

    As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()

    • A、using DHCP snooping
    • B、snooping the incoming 802.1Q VLAN tag
    • C、using CDP
    • D、snooping the CoS marking on the incoming frames

    正确答案:C

  • 第5题:

    You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()

    • A、Campus
    • B、Teleworker
    • C、Branch
    • D、Data center

    正确答案:C

  • 第6题:

    An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()

    • A、IDS
    • B、IPS
    • C、Firewall
    • D、Managed PKI

    正确答案:A

  • 第7题:

    You are designing a Windows Server 2008 R2 Hyper-V virtualization environment. Your host servers must have the following elements:  A dedicated management network adapter.A dedicated virtual network for child iSCSI network traffic.A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing.  Which adapters should you choose?()

    • A、three network adapters that support 802.1p
    • B、two network adapters that support 802.1q, and one iSCSI host bus adapter
    • C、two network adapters that support 802.1p, and one network adapter that supports TCP Chimney
    • D、two network adapters that support 802.1q, and one network adapter that supports Jumbo frames

    正确答案:D

  • 第8题:

    单选题
    A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()
    A

    RIP v1

    B

    RIP v2

    C

    IGRP

    D

    OSPF

    E

    EIGRP


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()
    A

    Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.

    B

    Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.

    C

    Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.

    D

    Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    You are designing a Windows Server 2008 R2 Hyper-V Virtualization environment. Your host servers must have the following elements: - A dedicated management network adapter. - A dedicated virtual network for child iSCSI network traffic. - A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()
    A

    Two network adapters that support 802.1p, and one iSCSI host bus adapter

    B

    Two network adapters that support 802.1p, and one network adapter that supports TCP Chimney

    C

    Two network adapters that support 802.lq, and one network adapter that supports Jumbo frames

    D

    Three network adapters that support 802. 1p


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()
    A

    Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.

    B

    Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.

    C

    Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.

    D

    Create a Pattern Match capture trigger for the 131.107.0.1 IP address.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()
    A

    a list of applications currently in use in the network

    B

    IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats

    C

    detailed security device specifications

    D

    results from pilot network testing


    正确答案: B
    解析: 暂无解析

  • 第13题:

    What are three factors a network administrator must consider before implementing Netflow in the network?()

    • A、CPU utilization
    • B、where Netflow data will be sent
    • C、number of devices exporting Netflow data
    • D、port availability
    • E、SNMP version
    • F、WAN encapsulation

    正确答案:A,B,C

  • 第14题:

    The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()

    • A、One router is running RIPv1.
    • B、RIP neighbor is 224.0.0.9.
    • C、The network contains a loop.
    • D、Network 10.10.1.0 is reachable.

    正确答案:A

  • 第15题:

    Which three of these are elements of the Cisco Unified Wireless Network architecture?()

    • A、cell phones
    • B、remote access
    • C、mobility services
    • D、network management
    • E、network unification
    • F、network decentralization

    正确答案:C,D,E

  • 第16题:

    As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you how to create separate networks on one Storage Area Network so as to provide enhanced availability, security, etc. Which of the following solution will enable that?()

    • A、Cisco Direct Attached Storage
    • B、Cisco Virtual Attached Storage Network
    • C、Cisco Virtual Storage Area Network
    • D、Cisco Direct Storage Area Network

    正确答案:C

  • 第17题:

    Which one is not the feature of the Cisco Unified Wireless Network architecture?()

    • A、network unification
    • B、remote access
    • C、mobility services
    • D、network management

    正确答案:B

  • 第18题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()

    • A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.
    • B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.
    • C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.
    • D、 Add the port rule through Network Connections Properties on each node.

    正确答案:D

  • 第19题:

    You are the network administrator for your company. The network contains 12 Windows Server 2003 computers and 300 Windows XP Professional computers. Three servers named Server4, Server5, and Server6 run a critical business application. When performing performance baselining on these three servers, you notice that Server6 has a larger number of concurrently connected users at any given moment than Server4 or Server5. The additional workload is causing performance problems on Server6. You need to identify which client computers are connecting to Server6.You plan to run Network Monitor on Server6 to capture all packets sent to Server6. The capture task must be configured to meet the following requirements.To reduce the size of the captured data, you want to capture only the packet headers.If a large number of packets are captured, the packets must be retained on the server. Captured packets must not overwrite previously captured packets.   Which two tasks should you perform to configure Network Monitor?()

    • A、Configure the Network Monitor display filters.
    • B、Configure the Network Monitor capture filters.
    • C、Increase the Network Monitor buffer size setting.
    • D、Decrease the Network Monitor buffer size setting.
    • E、Increase the Network Monitor frame size setting.
    • F、Decrease the Network Monitor frame size setting.

    正确答案:C,F

  • 第20题:

    单选题
    The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()
    A

    One router is running RIPv1.

    B

    RIP neighbor is 224.0.0.9.

    C

    The network contains a loop.

    D

    Network 10.10.1.0 is reachable.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    As an experienced network administrator, you are aware of the knowledge that it is unnecessary to configure complex overlay network topologies while applying Cisco Wide Area Application Services (WAAS) technology. What is most probably the reason for that?()
    A

    Content pre-positioning

    B

    Automatic discovery of Cisco WAEs

    C

    Comprehensive logs, reports, and graphs

    D

    Remote scheduling of software distribution


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()
    A

     Chief information officer

    B

     IT support staff in Boston

    C

     IT support staff in New York

    D

     Network administrator in Chicago

    E

     Network administrator in New York


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()
    A

    IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats

    B

    detailed security device specifications

    C

    results from pilot network testing

    D

    results from a network audit


    正确答案: C
    解析: 暂无解析