A.ping address
B.tracert address
C.traceroute address
D.arp address
第1题:
Which two statements are true regarding the USING clause in table joins?()
第2题:
Hosts on the same VLAN can communicate with each other but are unable to communicate with hosts on different VLANs. What is needed to allow communication between VLANs()。
第3题:
Which three statements describe the configuration change management feature in DCNM LAN? ()
第4题:
Which router IOS commands can be used to troubleshoot LAN connectivity problems?()
第5题:
On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()
第6题:
An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()
第7题:
It can be used to join a maximum of three tables
It can be used to restrict the number of columns used in a NATURAL join
It can be used to access data from tables through equijoins as well as nonequijoins
It can be used to join tables that have columns with the same name and compatible data types
第8题:
RG-6
STP
CAT3
UTP
第9题:
ping address
tracert address
traceroute address
arp address
第10题:
BPDU
Port security
RSTP
STP
VTP
Blocking mode
第11题:
a router with subinterfaces configured on the physical interface that is connected to the switch
a router with an IP address on the physical interface connected to the switch
a switch with an access link that is configured between the switches
a switch with a trunk link that is configured between the switches
第12题:
ping
tracert
ipconfig
show ip route
winipcfg
show interfaces
第13题:
For which type of connection should a straight-through cable be used?()
第14题:
What is the use of an "all configuration" backup in Cisco UCS?()
第15题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
第16题:
What is the purpose of assigning an IP address to a switch?()
第17题:
A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()
第18题:
a switch with a trunk link that is configured between the switches
a router with an IP address on the physical interface that is connected to the switch
a switch with an access link that is configured between the switches
a router with subinterfaces configured on the physical interface that is connected to the switch
第19题:
Micro segmentation
Transparent switching
peer-to-peer networking
port security
store-and-forward switching
virtual local area networks
第20题:
Can be used to migrate from a 6120 to a 6140 and retain the same service profiles
Can only be used on the fabric interconnect on which it was created
Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster information
Can be used to match firmware versions between 6120 and 6140 during a migration
第21题:
tracert address
ping address
arp address
traceroute address
第22题:
As the root user from serverA run the command rhost serverB
As the root user from serverA run the command rlogin serverB
As the desired user from serverB run the command rhost serverA
As the desired user from serverA run the command rlogin serverB
第23题:
Dedicated paths between sending and receiving hosts are established.
Multiple subnetwork broadcast addresses are created.
Multiple ARP tables are needed.
The decrease in the number of collision domains.
Broadcast domains are enhanced.
Additional bandwidth is used to connect hosts.