对于 知识 相当于 分析 对于 ()
A.书本 理论
B.学习 结论
C.学问 研究
D.学生 研究员
第1题
A. Add Session-Timeout attribute with value equal to the session lifetime
B. Add Termination-Action attribute with value equal 1
C. VLAN
D. Open port
第2题
A.The network administrator can apply port security to dynamic access ports
B.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D.The network administrator can apply port security to EtherChannels.
E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
第3题
A.The network administrator can apply port security to dynamic access ports
B.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D.The network administrator can apply port security to EtherChannels.
E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
第4题
A.Wireless router
B.Hub
C.Repeater
D.Wireless network adapter
第5题
A.
B.
C.
D.
第6题
A.Telnet to WANRouter and execute the command show interfaces S0/0
B.Telnet to WANRouter and execute the commandshow processes S0/0
C.Telnet to WANRouter and execute the command show running-configuration
D.Telnet to WANRouter and execute the command show controller S0/0
E.Physically examine the cable between WANRouter S0/0 and the DCE.
F.Establish a console sessionon WANRouter and execute the command show interfaces S0/0
第7题
A. The drivers for the printers are failing.
B. The spool folder is full.
C. The spool folder is not on the C drive.
D. A network printer was disconnected.
第8题
A. Network management
B. Protocol analyzer
C. Network monitoring
D. System diagnostic
第9题
A. Install anti-virus software on the student computers.
B. Put the faculty computers in a separate VLAN.
C. Power down the switches that connect to faculty computers when they are not in use.
D. Remove the student computers from the network and put them on a peer-to-peer network.
E. Create an access list that blocks the students from the Internet where the hacking tolls are located.
为了保护您的账号安全,请在“上学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!