-
Part of the job as a network administrator is being able to make a distinction between routed protocols and routing protocols. Which of the following statements is true regarding them?()
A . A routing protocol is assigned to an interface and determines the method of packet delivery.
B . A routed protocol is assigned to an interface and determines the method of packet delivery.
C . A routing protocol determines the path of a packet through a network.
D . A routed protocol determines the path of a packet through a network.
E . A routing protocol operates at the transport layer of the OSI model.
F . A routed protocol updates the routing table of a router.
-
Why would a network administrator configure port security on a switch?()
A . to prevent unauthorized Telnet access to a switch port
B . to limit the number of Layer 2 broadcasts on a particular switch port
C . to prevent unauthorized hosts from accessing the LAN
D . to protect the IP and MAC address of the switch and associated ports
E . to block unauthorized access to the switch management interfaces over common TCP port
-
As a network administrator, you are required to deploy MPLS technology. During the deployment, it is recommended to apply conditional label advertising. What is most probably the reason for that?()
A . to enable label switching on the frame mode interface
B . to restrict MPLS availability to predefined time periods
C . to restrict end users from seeing the routers in the MPLS network
D . to restrict label switching to a limited number of network
-
Exhibit:
https://assets.asklib.com/images/image2/2018073016154622176.jpg
You work as a network administrator at . You study the exhibit carefully.
What can be drawn about VLANs 200 and 202 from the exhibit?()
A . VLAN 200 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 202 carries traffic between community ports and to promiscuous ports.
B . VLAN 200 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 202 carries traffic from isolated ports to a promiscuous port.
C . VLAN 202 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 200 carries traffic from isolated ports to a promiscuous port.
D . VLAN 202 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in the same VLAN. VLAN 200 carries traffic between community ports and to promiscuous ports.
-
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
A . Campus
B . Teleworker
C . Branch
D . Data center
-
You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.How can you find out about the mailboxes that exceeds 2 GB in size?()
A . You must use the Get-MailboxStatistics cmdlet.
B . You must use the Test-Mailflow cmdlet.
C . You must use the Get-StoreUsageStatistics.
D . You must use the Test-ServiceHealth cmdlet.
-
A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge?()
A . Establish a direct link from the switch to all other switches in the network.
B . Assign the switch a higher MAC address than the other switches in the network have.
C . Configure the switch so that it has a lower priority than other switches in the network.
D . Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.
E . Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.
-
What are two reasons a network administrator would use CDP (Choose two.)()。
A . to verify the type of cable interconnecting two devices
B . to determine the status of network services on a remote device
C . to obtain VLAN information from directly connected switches
D . to verify Layer 2 connectivity between two devices when Layer 3 fails
E . to obtain the IP address of a connected device in order to telnet to the device
F . to determine the status of the routing protocols between directly connected router
-
What are three factors a network administrator must consider before implementing Netflow in the network?()
A . CPU utilization
B . where Netflow data will be sent
C . number of devices exporting Netflow data
D . port availability
E . SNMP version
F . WAN encapsulatio
-
As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()
A . NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
B . NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
C . NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.
D . NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.
-
A Cisco Catalyst switch is part of the CIS network. As an experienced network administrator, you are thinking of filtering the traffic within VLANI00 with the use of a VACL named "test" on that switch. Which of the following command will enable that?()
A . interface vlan 100 ip access-group test in
B . interface vlan 100 ip access-group test
C . vlan access-map test 100
D . vlan filter test vlan-list 100
-
Why would a network administrator configure port security on a switch()。
A . to prevent unauthorized Telnet access to a switch port
B . to limit the number of Layer 2 broadcasts on a particular switch port
C . to prevent unauthorized hosts from accessing the LAN
D . to protect the IP and MAC address of the switch and associated ports
E . to block unauthorized access to the switch management interfaces over common TCP port
-
A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?()
A . A switch in the VTP client mode cannot update its local VLAN database.
B . A trunk link must be configured between the switches to forward VTP updates.
C . A switch in the VTP server mode can update a switch in the VTP transparent mode.
D . A switch in the VTP transparent mode will forward updates that it receives to other switches.
E . A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.
F . A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.
-
As a junior network administrator of your company, you have been asked to move the printer spool off the system partition and onto another hard disk to solve disk space issues. How will you move the printer spool to another drive?()
A . From the command prompt run the command 'move c:\winnt\system32\spool printers [desired location]'.
B . From the command prompt run the command 'move c:\winnt\spool printers [desired location]'.
C . From the Advanced tab of printer server properties.
D . Configure the print$ share on your computer to point to the desired location.
-
The system administrator notices that IP packets are not getting forwarded. The system administrator wants to use an AIX machine as an internetwork router over TCP/IP networks. Which of the following commands will allow this change on the fly?()
A . Some network attributes are runtime attributes that can be changed at any time. Others are loadtime attributes that must be set before the netinet kernel extension is loaded and be placed in the /etc/rc.net or /etc/rc.bsdnet file. This parameter cannot be done on the fly, since a reboot is required.
B . Add to the /etc/rc.net file or if a Berkelye-style network configuration, /etc/rc.bsdnet, and issue the command: no -a ipforwarding=1 to start ipforwarding immediately.
C . Add to the /etc/rc.net file or if a Berkeley-style network configuration, /etc/rc.bsdnet, and issue the command: no -o ipforwarding=0 to start ipforwarding immediately.
D . Add to the /etc/rc.net file or if a Berkeley-style network configuration, /etc/rc.bsdnet, and issue the command: no -o ipforwarding=1 to start ipforwarding immediately.
-
The Cluster Administrator wants to use disk heartbeats as a non-IP network. What Volume Group consideration must be accounted for prior to configuring disk heartbeats?()
A . The Volume Group major number must be the same on all nodes.
B . The Shared Volume Group must be created with the Big VG format.
C . The Volume Group must be created as Enhanced Concurrent Capable.
D . The "t factor" must be doubled to create the reserved area for disk hearbeats.
-
You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?()
A . show ppp authentication
B . debug PAP authentication
C . debug PPP authentication
D . show interface serial0
E . show CHAP authenticatio
-
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to allow a room mailbox to automatically take requests for meetings?()
A . You must use log transactions.
B . You must use Calendar Repair Assistant (CRA).
C . You must select the resource booking attendant.
D . You must set up Task Scheduler.
-
What are two reasons a network administrator would use CDP?()
A . to verify the type of cable interconnecting two devices
B . to determine the status of network services on a remote device
C . to obtain VLAN information from directly connected switches
D . to verify Layer 2 connectivity between two devices when Layer 3 fails
E . to obtain the IP address of a connected device in order to telnet to the device
F . to determine the status of the routing protocols between directly connected router
-
What are two reasons a network administrator would use CDP? (Choose two.)()
A . to verify the type of cable interconnecting two devices
B . to determine the status of network services on a remote device
C . to obtain VLAN information from directly connected switches
D . to verify Layer 2 connectivity between two devices when Layer 3 fails
E . to obtain the IP address of a connected device in order to telnet to the device
F . to determine the status of the routing protocols between directly connected router
-
You are a network administrator for The network consists of a single Active Directory domain named.
The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO.
Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:\Program Files\MT Apps. The financial application suite contains many executable files.
Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components.
The financial application suite and the browser-based application are frequently updates with patches or new versions.
You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration.
Which three actions should you perform to configure software restriction polices?()
(Each correct answer presents part of the solution. Choose three)
-
You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.
You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.
Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.
You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.
A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/c1ca10b5ef7976b1e62efd8e32fc3420.jpg' />
You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/35218487c59e1ec9d3305e8d5fd23b81.jpg' />
You need to ensure that Paul can establish Remote Desktop connections with DC1.
What should you do? ()
-
Your network contains a server named Server1 that runs Windows Server 2008 R2. The network contains multiple subnets.An administrator reports that Server1 fails to communicate with computers on remote subnets.You run route.exe print on Server1 as shown in the exhibit. (Click the Exhibit button.)You need to ensure that Server1 can communicate with all computers on the network.What should you do?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/71f5cf6cf8cbfe8d579365ba1e41e844.png' />
A. Disable IPv6.
B. Change the subnet mask.
C. Add a default gateway address.
D. Change the default metric to 100.
-
You?work?as?a?network?Exchange?administrator?at?Co...
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2000 and Microsoft Exchange Server 2003 Service Pack 2 (SP2) as their messaging solution.During the course of the business week you receive instruction from Company.com to transition the Exchange organization to Microsoft Exchange Server 2010 whilst preparing the Exchange organization for the deployment of the Exchange Server 2010 Hub Transport servers, Client Access and Mailbox servers.What should you do?()
A. You should consider having the Microsoft Exchange Server 2010 Edge Transport server deployed first.
B. You should consider having the Microsoft Exchange Server 2000 servers removed from the organization first.
C. You should consider having the Active Directory Connector (ADC) installed first.
D. You should consider having the Recipient Update service (RUS) objects deleted first.