As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()
第1题:
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()
A.A
B.B
C.C
D.D
第2题:
As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop.Enabling which of the following feature will be able to prevent this problem from happening again?()
A.GLBP
B.RSTP
C.BPDU guard
D.root guard
第3题:
You are the network administrator for Ezonexam. The network includes a Microsoft Windows NT Server 4.0 member server computer that has a non-Plug and Play ISA network adapter.
You want to upgrade this computer to Microsoft Windows 2000 Server. You also want to ensure that you maintain the current device configuration during the upgrade.
What should you do? (Each correct answer presents part of the solution. Choose two)
A. Install the latest driver for the network adapter.
B. Disable the network adapter.
C. Start the upgrade process by using Winnt32.exe
D. Start the upgrade process by booting from the Windows 2000 Server compact disc.
E. Configure BIOS to reserve the IRQ currently in use by the network adapter.
F. Press F6 at the beginning of the text mode setup to specify an additional driver.
第4题:
As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()
第5题:
While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop.Which of these can you implement to prevent future occurrences of this issue?()
A.RSTP
B.root guard
C.BPDU guard
D.GLBP
第6题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()
A.A
B.B
C.C
D.D
第7题:
As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)
A. It provides reliable input for verifying network consistency.
B. It requires a network audit to support some upgrade decisions.
C. It requires a network audit to support any network restructuring.
D. It begins with gathering organizational input that may be inaccurate.
第8题:
When you are(71)a home or small office network, it is recommended that you use the Network Setup Wizard in Windows XP Home Edition to enable Internet Connection Sharing. The Network Setup Wizard automatically provides all of the network settings you need to(72)one Internet connection with all the computers in your network.
After ICS is enabled, and you make sure that all of your computers can(73)with each other and they have Internet(74), you can use programs such as Internet Explorer and Outlook Express as if they were(75)connected to the Internet service provider(ISP). When a request to the Internet is made, the ICS host computer connects to the ISP and creates the connection so that other computers can reach a specified Web address or download E-mail.
A.creating
B.reach
C.going for
D.setting up
第9题:
You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()
第10题:
While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop. Which of these can you implement to prevent future occurrences of this issue?()