You work as a technician at TestKing. You are configuring a

题目
单选题
You work as a technician at TestKing. You are configuring a Cisco router. You want to configure the IP address on an interface.Which command should you use?()
A

router(config-if)#ip address 142.8.2.1 subnet mask 255.255.252.0

B

router(config-if)#142.8.2.1 0.0.3.255

C

router(config-if)#ip address 142.8.2.1 255.255.252.0

D

router(config-if)#142.8.2.1 subnet mask 255.255.252.0

E

router(config-if)#ip address 142.8.2.1 0.0.3.255

F

router(config-if)#ip address 142.8.2.1 subnet mask /22

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()

  • A、Configuration register
  • B、NVRAM
  • C、Boot flash
  • D、CMOS
  • E、Flash

正确答案:A,B

第2题:

You work as a technician at TestKing. You are configuring a Cisco router. You want to configure the IP address on an interface.Which command should you use?()

  • A、router(config-if)#ip address 142.8.2.1 subnet mask 255.255.252.0
  • B、router(config-if)#142.8.2.1 0.0.3.255
  • C、router(config-if)#ip address 142.8.2.1 255.255.252.0
  • D、router(config-if)#142.8.2.1 subnet mask 255.255.252.0
  • E、router(config-if)#ip address 142.8.2.1 0.0.3.255
  • F、router(config-if)#ip address 142.8.2.1 subnet mask /22

正确答案:C

第3题:

You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()

A. show access-list

B. show ip access-list

C. show ip interface

D. show interface

E. show interface list


参考答案:C

第4题:

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()

  • A、You should configure SSL Settings
  • B、You should configure Authentication
  • C、You should configure Authorization Rules
  • D、You should configure IIS Manager Permissions

正确答案:C

第5题:

You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()

  • A、You should consider configuring recipient filtering.
  • B、You should consider configuring sender reputation.
  • C、You should consider configuring content filtering.
  • D、You should consider configuring sender filtering.

正确答案:A

第6题:

You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()

  • A、show access-list
  • B、show ip access-list
  • C、show ip interface
  • D、show interface
  • E、show interface list

正确答案:C

第7题:

You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()

  • A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.
  • B、You must then zeroize the keys to reset secure shell before configuring other parameters.
  • C、All vty ports are automatically enabled for SSH to provide secure management.
  • D、The SSH protocol is automatically enabled.

正确答案:D

第8题:

Do you commute to work? No, I work at home.()

  • A、You work?
  • B、How about you? 
  • C、You do not work.  
  • D、You work by train.

正确答案:B

第9题:

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()

  • A、You should create a discover image
  • B、You should create an install image
  • C、You should create a capture image
  • D、You should create a CD-ROM that contains PXE drivers

正确答案:A

第10题:

You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()

  • A、The user permissions on the zone should be granted.
  • B、The user permissions on the DNS zone should be granted.
  • C、The user should be added to the DNSUpdateProxy Global security group.
  • D、The user should be added to the DNSAdmins domain local security group.

正确答案:A

更多相关问题