juniper认证考试

A network administrator would like to view detailed interface status, properties, statistics, errors,and CoS packet counters.Which operational command will display this information?()A、show interfaces extensiveB、show interfacesC、show configuration interfa

题目

A network administrator would like to view detailed interface status, properties, statistics, errors,and CoS packet counters.Which operational command will display this information?()

  • A、show interfaces extensive
  • B、show interfaces
  • C、show configuration interfaces
  • D、show interface status
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()

A. Network management

B. Protocol analyzer

C. Network monitoring

D. System diagnostic


参考答案:A

第2题:

Using network monitoring tools would allow an administrator to do which of the following?()

A. Configure offline devices

B. Examine performance issues

C. Install additional software and updates

D. View syslog events


参考答案:B

第3题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?

A.To prevent unauthorized hosts from getting access to the LAN

B.To limit the number of Layer 2 broadcasts on a particular switch port

C.To prevent unauthorized Telnet or SSH access to a switch port

D.To prevent the IP and MAC address of the switch and associated ports

E.None of the above


正确答案:A
解析:Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

第4题:

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

  • A、STP
  • B、GVRP
  • C、SNMP
  • D、VTP
  • E、DHCP

正确答案:D

第5题:

An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()

A.NAT

B.Dynamic

C.Subnetting

D.Static


参考答案:D

第6题:

An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()

A. Disable SSID

B. WPA

C. MAC filtering

D. RAS


参考答案:A

第7题:

Which of the following tools would an administrator BEST use to trace a network cable?()

A.Toner

B.Cable tester

C.Butt set

D.Multimeter


参考答案:A

第8题:

Which of the following configuration management documentation types would an administrator useto know how and when to property install new network devices on the LAN?()

A. Baseline configuration

B. Logical network diagram

C. Network policy

D. Wiring schematic


参考答案:C

第9题:

Which of the following would help a new administrator quickly determine if a network had a VLANfor its publicly accessible servers?()

A. Baselines

B. Regulations

C. Logical network diagrams

D. Wiring schematics


参考答案:C

第10题:

Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()

  • A、WPA-PSK encryption
  • B、SSID broadcast
  • C、Port forwarding
  • D、MAC filtering

正确答案:A

更多相关问题