-
Refer to the exhibit. Give this output for SwitchC, what should the network administrator's next action be?()https://assets.asklib.com/images/image2/2018072409443229245.jpg
A . Check the trunk encapsulation mode for SwitchC's fa0/1 port.
B . Check the duplex mode for SwitchC's fa0/1 port.
C . Check the duplex mode for SwitchA's fa0/2 port.
D . Check the trunk encapsulation mode for SwitchA's fa0/2 port.
-
Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()
A . Content networking
B . Campus local-area networking
C . Network management
D . Network security
-
Which command will enable the administrator to query the current network adapter configuration?()
A . netstat -v
B . entstat -d
C . lsattr -El
D . lsdev -C -attr
-
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
A . Wireless router
B . Hub
C . Repeater
D . Wireless network adapter
-
You need to ensure that the network administrators are able to administer the NewApp database servers. Which two actions should you perform?()
A . Create an organizational unit (OU) for all users who log on to any of the NewApp servers.
B . Create an organizational unit (OU) named NewApp Users for the NewApp users.
C . Create an organizational unit (OU) named NewApp Servers for the NewApp servers.
D . Create a Group Policy object (GPO) for the NewApp Users OU to enforce the use of IPSec.
E . Create a global group for all NewApp servers. Add this group to the NewApp Servers OU.
F . Create a Group Policy object (GPO) for the NewApp Servers OU to enforce the use of smart cards.
-
What are three factors a network administrator must consider before implementing Netflow in the network?()
A . CPU utilization
B . where Netflow data will be sent
C . number of devices exporting Netflow data
D . port availability
E . SNMP version
F . WAN encapsulatio
-
A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?()
A . ARP
B . CDP
C . DHCP
D . DNS
E . ICMP
-
Which command will enable the administrator toquery the current network adapter configuration?()
A . netstat -v
B . entstat -d
C . lsattr -El
D . lsdev -C -attr
-
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()
A . IP
B . ICMP
C . TCP
D . UDP
-
When upgrading the IOS image, the network administrator receives the exhibited error message. What could be the cause of this error?()
A . The new IOS image is too large for the router flash memory.
B . The TFTP server is unreachable from the router.
C . The new IOS image is not correct for this router platform.
D . The IOS image on the TFTP server is corrupt.
E . There is not enough disk space on the TFTP server for the IOS image.
-
Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()
A . A level 5 password is not set
B . The vty password is missing
C . The console password is missing
D . An ACL is blocking Telnet acce
-
A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?()
A . A switch in the VTP client mode cannot update its local VLAN database.
B . A trunk link must be configured between the switches to forward VTP updates.
C . A switch in the VTP server mode can update a switch in the VTP transparent mode.
D . A switch in the VTP transparent mode will forward updates that it receives to other switches.
E . A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.
F . A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.
-
The network administrator has enabled BPDU guard on the LAN. Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()
A . BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network.
B . BPDU guard can guarantee proper selection of the root bridge.
C . BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.
D . BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.
E . None of the other alternatives apply
-
A new system has been installed and the network connection is very slow. The network administrators are sure that the network port is set to 100 full duplex. What command will display the configured and current speed settings of the adapter?()
A . lsdev
B . lsattr
C . entstat
D . ifconfig
-
You are the network administrator tasked with designing a switching solution for the Company network. Which of the following statements describing trunk links are INCORRECT?()
A . The trunk link belongs to a specific VLAN.
B . Multiple trunk links are used to connect multiple end user devices.
C . A trunk link only supports native VLAN.
D . Trunk links use 802.10 to identify a VLAN.
E . The native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets.
-
A user complains that the network printer is not printing. The system administrator knows there is a print queue for the network printer and needs to check on the queue. Which command is run?()
A . netstat
B . lpstat
C . telinit
D . prtconf&e
-
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。
A . IP
B . ICMP
C . TCP
D . UDP
-
You are the network administrator in the New York office of TestKing.The company net
You are the network administrator in the New York office of TestKing.
The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA.
All file servers in the New York office are in an organizational unit (OU) named
New York Servers. You have been assigned the Allow - Change permission for a
Group Policy object (GPO) named NYServersGPO, which is linked to the New
York Servers OU.
The written company security policy states that all new servers must be configured
with specified predefined security settings when the servers join the domain. These
settings differ slightly for the various company offices.
You plan to install Windows Sever 2003, on 15 new computers, which all functions
as file servers. You will need to configure the specified security settings on the new
file servers.
TestKingA currently has the specified security settings configured in its local
security policy. You need to ensure that the security configuration of the new file
servers is identical to that of TestKingA. You export a copy of TestKingA‘s local
security policy settings to a template file.
You need to configure the security settings of the new servers, and you want to use
the minimum amount of administrative effort.
What should you do?()
-
You are a network administrator for The network consists of a single Active Directory domain named.
The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO.
Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:\Program Files\MT Apps. The financial application suite contains many executable files.
Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components.
The financial application suite and the browser-based application are frequently updates with patches or new versions.
You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration.
Which three actions should you perform to configure software restriction polices?()
(Each correct answer presents part of the solution. Choose three)
-
An administrator needs to authenticate users to the network, authorize network activities, andaccount for activities done.Which of the following are services that will BEST meet these goals?()(Select TWO).
A.TACACS+
B.RADIUS
C.Kerberos
D.802.1X
E.RRAS
-
You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.
You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.
Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.
You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.
A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/c1ca10b5ef7976b1e62efd8e32fc3420.jpg' />
You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/35218487c59e1ec9d3305e8d5fd23b81.jpg' />
You need to ensure that Paul can establish Remote Desktop connections with DC1.
What should you do? ()
-
You are the administrator of the Coho Vineyard network. The network consists of 10 Windows 2000 Advanced Server computers and 250 Windows 2000 Professional computers.
Your company has two domains cohovineyard.com and westcoastsales.com.
The company's intranet site is on a Windows 2000 Advanced Server computer named ServerA. ServerA is in the cohovineyard.com domain and is running Internet Information Services (IIS) and Microsoft Proxy Server 2.0
You want to configure the Windows 2000 Professional computers in the westcoastsales.com domain to access the intranet site. You want users to be able to connect to the intranet site by using the URL http://serverA rather than its fully qualified domain name.
What should you do?
A.Add cohovineyard.com to the Domain Suffix Search Order on the computers.
B.Add westcoastsales.com to the Domain Suffix Search Order on the computers.
C.Add westcoastsales.com to the exceptions list in the proxy server settings on the computers.
D.Configure the proxy server settings on the computers to bypass the proxy server for intranet addresses.
-
You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.
However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?
A. STP
B. GVRP
C. SNMP
D. VTP
E. DHCP
F. None of the above
-
You are the administrator on a Linux network.You have created and are ready to impleme
A.Chmod-M30
B.Chgrp-d30
C.Chage-M30
D.Useradd-D30