АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция

Q.43 What are two purposes of DNS ? (Choose two.)

Читайте также:
  1. Q.21 A ping 192.1.1.20 command is issued on workstation A to determine if workstation B can be reached. What events will occur if this command is successful ? (Choose two.)
  2. Q.28 Refer to the exhibit. Which two sets of commands are required to configure passwords for all management ports on a Catalyst 2960 switch ? (Choose two.)

 

to dynamically assign IP addressing information to network hosts

to simplify the administration of host and default gateway addressing on client computers

to assign TCP port numbers to hosts as part of the data transfer process

to resolve human-readable domain names to numeric IP addresses

to replace the static HOSTS file with a more practical dynamic system

 

 

Q.44 A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network?

 

an IDS

an IPS

a host-based firewall

Anti-X software

 

 

Q.45 How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?

 

 

 

Q.46 In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?

 

destination network address

source network address

source MAC address

well known port destination address

 

 

Q.47 A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer sales in real time. Which WAN connection type is best suited to its needs?

 

Sonet

T3

dialup

DSL

leased line

 

 

Q.48 The command copy tftp running-config has been entered on the router. What will this command do?

copy the configuration in RAM to a server

copy the configuration file from a server to RAM

copy the configuration file in NVRAM to RAM

copy the configuration file in NVRAM to a server

copy the configuration file from a server to NVRAM

 

Q.49 Refer to the exhibit. The network administrator needs to configure the Fa0/0 interface of RTB so that hosts from RTA can connect to the server that is attached to RTB. Which two commands will the administrator use to accomplish this task? (Choose two.)

 

RTB# ipaddress 192.168.102.98 255.255.255.248

RTB(config-if)# ip address 192.168.102.99 255.255.255.252

RTB(config)# ip address 192.168.102.97 255.255.255.252

RTB(config)# no shutdown

RTB(config-if)# no shutdown

RTB(config-if)# ip address 192.168.102.97 255.255.255.252

 

Q.50 Refer to the exhibit. A NOC technician at an ISP enters the command shown. What are two reasons to use this command? (Choose two.)

 

to map the path to 192.168.1.7

to test reachability to 192.168.1.7

to locate connectivity problems along the route to 192.168.1.7

to identify the ISPs that interconnect the NOC with the remote host with the address 192.168.1.7

to measure the time that packets take to reach 192.168.1.7 and return to the technician's workstation

 


1 | 2 | 3 | 4 | 5 | 6 |

Поиск по сайту:



Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.003 сек.)