Refer to the exhibit. You are the network administrator of the Route.com company. You have been tasked to implement a hub and spoke EIGRP topology over Frame Relay to provide connectivity between the networks at headquarters and all 300 spokes. Before you

题目

Refer to the exhibit. You are the network administrator of the Route.com company. You have been tasked to implement a hub and spoke EIGRP topology over Frame Relay to provide connectivity between the networks at headquarters and all 300 spokes. Before you begin the actual implementation, which three pieces of information are more important to know than the others?()

A. the Committed Information Rate of all the Frame Relay PVCs

B. the Cisco IOS version running on all the routers

C. the router model number of all the spoke routers

D. the number of HQ networks connected behind the headquarter routers

E. the routing policy, such as whether or not the spokes can be used as backup transient point between the two headquarter routers


相似考题
更多“Refer to the exhibit. You are the network administrator of the Route.com company. You have ”相关问题
  • 第1题:

    According to your resume, you have had some experience working in a foreign company. May I ask you why you left?


    正确答案:
       

  • 第2题:

    Refer to the exhibit. The routing protocols EIGRP and OSPF have been configured as indicated in the exhibit. Given the partial configuration of router R2, which network will be present in th e routing table of R4?()

    A. Network B

    B. Network A and Network B

    C. Network A

    D. neither Network A nor Network B


    参考答案:A

  • 第3题:

    Refer to the exhibit. ROUTE.com is planning to implement a new secure OSPF network to support traffic between clients on the 172.16.10.0/24 network and the file server on th e 172.16.20./24 network. You have been asked to review the implementation plan for the OSPF project. Which statement about the plan is true?()

    A. It is complete as written.

    B. It should include a task that shuts down all unused interfaces.

    C. It sho uld include tasks that enable and verify OSPF authentication.

    D. It should include a task that establishes a file transfer baseline before and after the configuration is changed.


    参考答案:C

  • 第4题:

    Refer to the exhibit. ROUTE.com has just implemented this EIGRP network. A network administrator came to you for advice while trying to implement load balancing across part of their EIGRP network. If the variance value is configured as 2 on all routers and all o ther metric and K values are configured to their default values, traffic from the Internet to the data center will be load balanced across how many paths? ()

    A. 1

    B. 2

    C. 3

    D. 4

    E. 5


    参考答案:C

  • 第5题:

    You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet.  You have enabled Internet connection sharing. You do not want to initiate this connection automatically when a request for Internet reaches your computer. What should you do? ()

    • A、You should uncheck “Enable on demand dialing
    • B、Enable on-demand dialing
    • C、Enable sharing a modem on one computer on the network
    • D、Configure a DHCP Server
    • E、Disable Internet Connection Sharing

    正确答案:A

  • 第6题:

    You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

    • A、Repeater
    • B、Wireless router
    • C、Hub
    • D、Wireless network adapter

    正确答案:D

  • 第7题:

    You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()

    • A、/24
    • B、/26
    • C、/27
    • D、/28

    正确答案:C

  • 第8题:

    You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()

    • A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.
    • B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. 
    • C、Use Windows Explorer to turn on auditing for the specific files.
    • D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.
    • E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.
    • F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on. 

    正确答案:E

  • 第9题:

    单选题
    You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()
    A

    /24

    B

    /26

    C

    /27

    D

    /28


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only. A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company's VPN. They must have 24-hour access to the files on Server1. You need to be able to identify the source of the recurring slowdowns in VPN access. First, you log on to Server1. What should you do next?()
    A

    Use Task Manager to review network utilization of the VPN adapter.

    B

    Use the Performance console to create a log of network utilization outside of business hours.

    C

    Use System Monitor to review network utilization of the VPN connection.

    D

    Use Task Manager to select Bytes Sent as the Network Adapter History setting.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet.  You have enabled Internet connection sharing. You do not want to initiate this connection automatically when a request for Internet reaches your computer. What should you do? ()
    A

    You should uncheck “Enable on demand dialing

    B

    Enable on-demand dialing

    C

    Enable sharing a modem on one computer on the network

    D

    Configure a DHCP Server

    E

    Disable Internet Connection Sharing


    正确答案: E
    解析: 暂无解析

  • 第12题:

    单选题
    You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()
    A

    Enable Internet Connection Sharing

    B

    Enable on-demand dialing

    C

    Enable sharing a modem on one computer on the network

    D

    Configure a DHCP Server

    E

    Disable Internet Connection Sharing


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()

    A.Campus

    B.Teleworker

    C.Branch

    D.Data center


    参考答案:C

  • 第14题:

    Refer to the exhibit. ROUTE.com is planning to implement a secure OSPF network to support traffic between clients on the 172.16.10.0/24 network and the file server on the 172.16.20./24 network. You have been asked to review the implementation and verification plans for this OSPF project. Which statement about the plan is true? ()

    A. It is complete as written

    B. It should include a task that verifie s that the interarea routes are using the proper MED

    C. It should include a task that verifies that load sharing is active on R1 and R4

    D. It should include a task that verifies that all redundant links will become active when the primary links are sh ut down


    参考答案:D

  • 第15题:

    Refer to the exhibit. OSPF is running throughout the network. You want to minimize the propagation of LSAs into and out of A rea 1. Which OSPF feature would best achieve this goal? ()

    A. stub

    B. totally stubby

    C. NSSA

    D. totally NSSA


    参考答案:D

  • 第16题:

    Refer to the exhibit. The Route.com company is running EIGRP between all the r outers. Currently, if one of the LAN links (LAN1 or LAN2) at the headquarters flaps (goes up and down), the HQRTR1 and HQ - RTR2 routers will experience high CPU usage and have a long EIGRP convergence time. As the new network administrator, you are asked to investigate this situation and determine if there is a quick way to resolve this issue. Which is the most important thing that you can quickly verify first to resolve this issue?()

    A. Verify that the bandwidth setting on all WAN links is correct.

    B. Verify that the HQ - RTR1 and HQ - RTR2 routers are configured to send only a default route to all the spoke routers.

    C. Verify that the HQ - RTR1 and HQ - RTR2 routers are configured for EIGRP Nonstop Forwarding.

    D. Verify that all the spoke routers are co nfigured for autosummarization.

    E. Verify that all the spoke routers are configured as EIGRP stub.


    参考答案:E

  • 第17题:

    You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()

    • A、You should assign the network 172.16.0.0/16.
    • B、You should assign the network 172.16.0.0/17.
    • C、You should assign the network 172.16.0.0/18.
    • D、You should assign the network 172.16.0.0/19.
    • E、You should assign the network 172.16.0.0/20.
    • F、You should assign the network 172.16.0.0/22.

    正确答案:F

  • 第18题:

    You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()

    • A、Campus
    • B、Teleworker
    • C、Branch
    • D、Data center

    正确答案:C

  • 第19题:

    You are the network administrator for Company.  A user named Peter runs Windows 2000 Professional on his portable computer. Peter wants to be able to work at home with files that were created in the office on Company’s network. He mapsdrive X to a shared network folder and configures it to reconnect when he logs on to the network.  Before Peter logs off the network and leaves the office, he attempts to make drive X available offline.   Peter calls you and reports that he does not have the option to make his shared folder available offline.   Peter needs to have the files in drive X available offline.   What should you instructs Peter to do?()

    • A、Ensure that NetBIOS over TCP/IP is enabled on the network server.
    • B、Enable Offline Files on the portable computer.
    • C、Create an Offline File synchronization schedule.
    • D、Create a shortcut to the Offline Files folder.

    正确答案:B

  • 第20题:

    You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()

    • A、Configure a WMI event trigger.
    • B、Configure a Network Monitor capture filter.
    • C、Configure a Network Monitor trigger.
    • D、Configure a System Monitor alert.

    正确答案:C

  • 第21题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directorydomain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers.You need to ensure that all users are authenticated by a domain controller when they log on.How should you modify the local security policy? ()
    A

    Require authentication by a domain controller to unlock the client computer.

    B

    Cache zero interactive logons.

    C

    Cache 50 interactive logons.

    D

    Grant the Log on locally user right to the Users group.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()
    A

    msi

    B

    mst

    C

    zap

    D

    zip


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()
    A

    The SetupUser profile

    B

    The Default User profile

    C

    The Administrator profile

    D

    The System profile

    E

    The All Users profile


    正确答案: C
    解析: 暂无解析