单选题The network administrator is asked to configure 113 point-to-point links. Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?()A 10.10.0.0/18 subnetted with

题目
单选题
The network administrator is asked to configure 113 point-to-point links. Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?()
A

10.10.0.0/18 subnetted with mask 255.255.255.252

B

10.10.0.0/25 subnetted with mask 255.255.255.252

C

10.10.0.0/24 subnetted with mask 255.255.255.252

D

10.10.0.0/23 subnetted with mask 255.255.255.252

E

10.10.0.0/16 subnetted with mask 255.255.255.252


相似考题
更多“The network administrator is asked to configure 113 point-to”相关问题
  • 第1题:

    A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()

    A.

    B.

    C.

    D.


    参考答案:B

  • 第2题:

    You are the network administrator of a small Layer 2 network with 50 users. Lately, users have beencomplaining that the network is very slow. While troubleshooting, you notice that the CAM table of yourswitch is full, although it supports up to 12, 000 MAC addresses. How can you solve this issue and preventit from happening in the future?()

    • A、Upgrade the switches
    • B、Configure BPDU guard
    • C、Configure VLAN access lists
    • D、Configure port security
    • E、Configure Dynamic ARP inspection

    正确答案:D

  • 第3题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第4题:

    A network administrator repeatedly receives support calls about network issues. After investigating the issues, the administrator finds that the source NAT pool is running out of addresses.To be notified that the pool is close to exhaustion, what should the administrator configure?()

    • A、Use the pool-utilization-alarm raise-threshold under the security nat source stanza.
    • B、Use a trap-group with a category of services under the SNMP stanza.
    • C、Use an external script that will run a show command on the SRX Series device to see when the pool is close to exhaustion.
    • D、Configure a syslog message to trigger a notification when the pool is close to exhaustion.

    正确答案:A

  • 第5题:

    Users report an intermittent degradation of sound on their IP phones. Which of the following woulda network administrator do to alleviate the problem?()

    • A、Use plenum cables
    • B、Provide fault tolerance for the switch
    • C、Configure VLAN trunking on the switch
    • D、Configure QoS

    正确答案:D

  • 第6题:

    A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()

    • A、Configure roles based on departments and assign access based on source IP address.
    • B、Configure roles based on the user's manager and assign access based on the user's MAC address
    • C、Configure roles based on group memberships and assign a specific VLAN to the role.
    • D、Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.

    正确答案:C

  • 第7题:

    Cisco IOS is the software used on the vast majority of Cisco Systems routers and current Cisco network switches. As a network administrator, you are required to configure MPLS on Cisco IOS. In such a situation, which three of the following steps are necessary to take?()

    • A、Start LDP.
    • B、Enable CEF switching.
    • C、Configure conditional label advertising.
    • D、Enable label switching on frame mode interfaces.
    • E、disable IP TTL propagation
    • F、configure conditional label advertising

    正确答案:A,B,D

  • 第8题:

    A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge()。

    • A、Establish a direct link from the switch to all other switches in the network.
    • B、Assign the switch a higher MAC address than the other switches in the network have.
    • C、Configure the switch so that it has a lower priority than other switches in the network.
    • D、Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.
    • E、Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.

    正确答案:C

  • 第9题:

    You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.  What supported authentication server should be chosen?()

    • A、TACACS with LEAP extensions
    • B、RADIUS with EAP extensions
    • C、TACACS+
    • D、LDAP

    正确答案:B

  • 第10题:

    You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()

    • A、Configure a HOSTS file.
    • B、Configure a LMHOSTS file.
    • C、Configure a WINS server database.
    • D、Configure a DHCP server address.
    • E、Configure at least one DNS address.

    正确答案:A,E

  • 第11题:

    You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()

    • A、Enable Internet Connection Sharing
    • B、Enable on-demand dialing
    • C、Enable sharing a modem on one computer on the network
    • D、Configure a DHCP Server
    • E、Disable Internet Connection Sharing
    • F、Configure all the other computers to be DHCP enabled.

    正确答案:A,F

  • 第12题:

    You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()

    • A、Replace the network adapters with 10/100 Mbps network adapters. 
    • B、Enable TCP/IP on all of the computers on the network.
    • C、Configure the NWLink frame type of the network adapters to be Ethernet II. 
    • D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.

    正确答案:A

  • 第13题:

    You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()

    • A、Upgrade the switches
    • B、Configure BPDU guard
    • C、Configure VLAN access lists
    • D、Configure port security
    • E、Configure Dynamic ARP inspection

    正确答案:D

  • 第14题:

    The network administrator has asked you to check the status of the workstation’s IP stack by pinging the loopback address.Which address would you ping to perform this task?()

    • A、10.1.1.1
    • B、127.0.0.1
    • C、192.168.0.1
    • D、239.1.1.1

    正确答案:B

  • 第15题:

    Using network monitoring tools would allow an administrator to do which of the following?()

    • A、Configure offline devices
    • B、Examine performance issues
    • C、Install additional software and updates
    • D、View syslog events

    正确答案:B

  • 第16题:

    You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()

    • A、Configure a DNS suffix.
    • B、Configure a subnet mask.
    • C、Configure an LMHOSTS file.
    • D、Configure an Interface metric.
    • E、Configure at least one DNS address.

    正确答案:B,E

  • 第17题:

    You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()

    • A、ICMP
    • B、SNMP
    • C、TCP
    • D、HTTPS

    正确答案:A,C

  • 第18题:

    Certkiller .com has a domain controller that runs Windows Server 2008. The Certkiller .com network boosts 40 Windows Vista client machines. As an administrator at Certkiller .com, you want to deploy Active Directory Certificate service (AD CS) to authorize the network users by issuing digital certificates.  What should you do to manage certificate settings on all machines in a domain from one main location()

    • A、Configure Enterprise CA certificate settings
    • B、Configure Enterprise trust certificate settings
    • C、Configure Advance CA certificate settings
    • D、Configure Group Policy certificate settings
    • E、All of the above

    正确答案:D

  • 第19题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第20题:

    The network administrator is asked to configure 113 point-to-point links.Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?()

    • A、10.10.0.0/18 subnetted with mask 255.255.255.252
    • B、10.10.0.0/25 subnetted with mask 255.255.255.252
    • C、10.10.0.0/24 subnetted with mask 255.255.255.252
    • D、10.10.0.0/23 subnetted with mask 255.255.255.252
    • E、10.10.0.0/16 subnetted with mask 255.255.255.252

    正确答案:D

  • 第21题:

    On which of the following network devices would an administrator configure an ACL?()

    • A、Router
    • B、Hub
    • C、Repeater
    • D、NIC

    正确答案:A

  • 第22题:

    You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()

    • A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.
    • B、Start the RunAs service and configure the service to start automatically.
    • C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.
    • D、Use Scheduled Tasks to configure the task to run under the security context of your account.

    正确答案:D

  • 第23题:

    You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()

    • A、Configure a WMI event trigger.
    • B、Configure a Network Monitor capture filter.
    • C、Configure a Network Monitor trigger.
    • D、Configure a System Monitor alert.

    正确答案:C

  • 第24题:

    单选题
    The network administrator is asked to configure 113 point-to-point links.Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?()
    A

    10.10.0.0/18 subnetted with mask 255.255.255.252

    B

    10.10.0.0/25 subnetted with mask 255.255.255.252

    C

    10.10.0.0/24 subnetted with mask 255.255.255.252

    D

    10.10.0.0/23 subnetted with mask 255.255.255.252

    E

    10.10.0.0/16 subnetted with mask 255.255.255.252


    正确答案: B
    解析: 暂无解析