The network administrator is asked to configure 113 point-to-point links.Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?()A、10.10.0.0/18 subnetted with mas

题目

The network administrator is asked to configure 113 point-to-point links.Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?()

  • A、10.10.0.0/18 subnetted with mask 255.255.255.252
  • B、10.10.0.0/25 subnetted with mask 255.255.255.252
  • C、10.10.0.0/24 subnetted with mask 255.255.255.252
  • D、10.10.0.0/23 subnetted with mask 255.255.255.252
  • E、10.10.0.0/16 subnetted with mask 255.255.255.252

相似考题
更多“The network administrator is ask”相关问题
  • 第1题:

    You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()

    • A、 Chief information officer
    • B、 IT support staff in Boston
    • C、 IT support staff in New York
    • D、 Network administrator in Chicago
    • E、 Network administrator in New York

    正确答案:A

  • 第2题:

    You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

    • A、Repeater
    • B、Wireless router
    • C、Hub
    • D、Wireless network adapter

    正确答案:D

  • 第3题:

    An administrator needs to know the workstation name of a user who called in for support in orderto remotely manage it. After calling the user and having the user open a command prompt, whichof the following commands would the administrator ask the user to type?()

    • A、Netstat
    • B、Ifconfig
    • C、Hostname
    • D、Ping

    正确答案:C

  • 第4题:

    A network technician is troubleshooting a network issue that has just been reported. Which of thefollowing troubleshooting steps should the technician take FIRST to help resolve this issue?()

    • A、Record the solution in the appropriate logs for future use.
    • B、Ask the user who reported the issue what past documentation they have.
    • C、Ask the user who reported the issue to explain the symptoms in detail.
    • D、Record what steps should be taken to resolve the issue.

    正确答案:C

  • 第5题:

    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()

    • A、Default gateway
    • B、The ports on the switch
    • C、Port security on the server's switch port
    • D、Ethernet cable

    正确答案:A

  • 第6题:

    Which of the following configuration management documentation types would an administrator useto know how and when to property install new network devices on the LAN?()

    • A、Baseline configuration
    • B、Logical network diagram
    • C、Network policy
    • D、Wiring schematic

    正确答案:C

  • 第7题:

    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

    • A、SSH
    • B、WEP
    • C、VPN
    • D、WPA

    正确答案:D

  • 第8题:

    Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()

    • A、Baseline configuration
    • B、Security policy
    • C、Performance and transaction logs
    • D、Physical network diagram

    正确答案:D

  • 第9题:

    On which of the following network devices would an administrator configure an ACL?()

    • A、Router
    • B、Hub
    • C、Repeater
    • D、NIC

    正确答案:A

  • 第10题:

    单选题
    A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()
    A

     That there are no DHCP relay servers

    B

     That the user account on Active Directory is not locked

    C

     That the network card driver is not installed incorrectly

    D

     The network connection is functioning


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
    A

    BPDU

    B

    Port security

    C

    RSTP

    D

    STP

    E

    VTP

    F

    Blocking mode


    正确答案: B
    解析: 暂无解析

  • 第12题:

    多选题
    You are configuring SQL1 so that the distributed query in the Sales database can access data in the CRM database on SQL2. You create a linked server for SQL2, and you create a linked server login that uses impersonation.Now, you need to ask the network administrator to configure SQL1. Which two tasks should you ask the administrator to perform?()
    A

    Add the user account that is used by the SQL Server service to the local Administrators group.

    B

    Enable the Do not trust this user for delegation Active Domain property for the user account that is used by the SQL Server service.

    C

    Create a Service Principal Name (SPN) for the user account that is used by the SQL Server service.

    D

    Enable the Trusted for delegation Active Domain property for the user account that is used by the SQL Server service.


    正确答案: A,B
    解析: 暂无解析

  • 第13题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第14题:

    Before inserting a new switch in the network,the network administrator checks that the VTP domain name is correct,the VTP mode is set to server, and revision is lower than the switches in the network. The administrator then configures interfaces and trunks,erases existing VLANs,and connects the switch to the network. Following that procedure,there is no connectivity in the network. What is a possible cause of this problem?()

    • A、Because the configuration revision of the new switches is lower than the rest of the network, it can change the VLAN database of the other switches.
    • B、As a VTP server, the new switch deleted all VLANs of the network.
    • C、Erasing VLANs increases the VTP configuration revision.
    • D、Since the configuration revision of the network is higher than the new switch, the VLAN database was automatically synchronized.

    正确答案:C

  • 第15题:

    A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()

    • A、 That there are no DHCP relay servers
    • B、 That the user account on Active Directory is not locked
    • C、 That the network card driver is not installed incorrectly
    • D、 The network connection is functioning

    正确答案:D

  • 第16题:

    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()

    • A、 Default gateway
    • B、 The ports on the switch
    • C、 Port security on the servers switch port
    • D、 Ethernet cable

    正确答案:A

  • 第17题:

    A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()

    • A、 Reboot the file server.
    • B、 Ask the user what they were doing when they noticed the problem.
    • C、 Ask the user to reboot their PC.
    • D、 Ask the user to ping the default gateway and report the response times back to the administrator.

    正确答案:B

  • 第18题:

    Which of the following would help a new administrator quickly determine if a network had a VLANfor its publicly accessible servers?()

    • A、Baselines
    • B、Regulations
    • C、Logical network diagrams
    • D、Wiring schematics

    正确答案:C

  • 第19题:

    Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()

    • A、Network management
    • B、Protocol analyzer
    • C、Network monitoring
    • D、System diagnostic

    正确答案:A

  • 第20题:

    An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()

    • A、NIPS
    • B、Honeypot
    • C、DMZ
    • D、NIDS

    正确答案:B

  • 第21题:

    单选题
    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
    A

    Default gateway

    B

    The ports on the switch

    C

    Port security on the server's switch port

    D

    Ethernet cable


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()
    A

    Disable SSID

    B

    WPA

    C

    MAC filtering

    D

    RAS


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management  domain?()
    A

    Enable VTP pruning on any switch in the management domain

    B

    Enable VTP pruning on any client switch in the domain

    C

    Enable VTP pruning on a VTP server in the management domain

    D

    Enable VTP pruning on every switch in the domain

    E

    None of the other alternatives apply


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()
    A

     Reboot the file server.

    B

     Ask the user what they were doing when they noticed the problem.

    C

     Ask the user to reboot their PC.

    D

     Ask the user to ping the default gateway and report the response times back to the administrator.


    正确答案: C
    解析: 暂无解析