niusouti.com

Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?()A.ping addressB.tracert addressC.traceroute addressD.arp address

题目
Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?()

A.ping address

B.tracert address

C.traceroute address

D.arp address


相似考题
更多“Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?() ”相关问题
  • 第1题:

    Which two statements are true regarding the USING clause in table joins?()

    • A、It can be used to join a maximum of three tables 
    • B、It can be used to restrict the number of columns used in a NATURAL join 
    • C、It can be used to access data from tables through equijoins as well as nonequijoins 
    • D、It can be used to join tables that have columns with the same name and compatible data types

    正确答案:B,D

  • 第2题:

    Hosts on the same VLAN can communicate with each other but are unable to communicate with hosts on different VLANs. What is needed to allow communication between VLANs()。

    • A、a switch with a trunk link that is configured between the switches
    • B、a router with an IP address on the physical interface that is connected to the switch
    • C、a switch with an access link that is configured between the switches
    • D、a router with subinterfaces configured on the physical interface that is connected to the switch

    正确答案:D

  • 第3题:

    Which three statements describe the configuration change management feature in DCNM LAN? ()

    • A、 Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.
    • B、 DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.
    • C、 You can archive a maximum of 50 configuration versions per managed device.
    • D、 Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.
    • E、 Device-running configuration will be archived only if it differs from the last archived version.

    正确答案:C,D,E

  • 第4题:

    Which router IOS commands can be used to troubleshoot LAN connectivity problems?()

    • A、ping
    • B、tracert
    • C、ipconfig
    • D、show ip route
    • E、winipcfg
    • F、show interfaces

    正确答案:A,D,F

  • 第5题:

    On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()

    • A、a router with subinterfaces configured on the physical interface that is connected to the switch
    • B、a router with an IP address on the physical interface connected to the switch
    • C、a switch with an access link that is configured between the switches
    • D、a switch with a trunk link that is configured between the switches

    正确答案:A

  • 第6题:

    An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()

    • A、As the root user from serverA run the command rhost serverB
    • B、As the root user from serverA run the command rlogin serverB
    • C、As the desired user from serverB run the command rhost serverA
    • D、As the desired user from serverA run the command rlogin serverB

    正确答案:D

  • 第7题:

    多选题
    Which two statements are true regarding the USING clause in table joins?()
    A

    It can be used to join a maximum of three tables

    B

    It can be used to restrict the number of columns used in a NATURAL join

    C

    It can be used to access data from tables through equijoins as well as nonequijoins

    D

    It can be used to join tables that have columns with the same name and compatible data types


    正确答案: B,A
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following would be used to connect two IDFs in the same building with the LAN, whileminimizing crosstalk?()
    A

    RG-6

    B

    STP

    C

    CAT3

    D

    UTP


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?()
    A

    ping address

    B

    tracert address

    C

    traceroute address

    D

    arp address


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
    A

    BPDU

    B

    Port security

    C

    RSTP

    D

    STP

    E

    VTP

    F

    Blocking mode


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()
    A

    a router with subinterfaces configured on the physical interface that is connected to the switch

    B

    a router with an IP address on the physical interface connected to the switch

    C

    a switch with an access link that is configured between the switches

    D

    a switch with a trunk link that is configured between the switches


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    Which router IOS commands can be used to troubleshoot LAN connectivity problems?()
    A

    ping

    B

    tracert

    C

    ipconfig

    D

    show ip route

    E

    winipcfg

    F

    show interfaces


    正确答案: A,D,E
    解析: 暂无解析

  • 第13题:

    For which type of connection should a straight-through cable be used?()

    • A、switch to switch
    • B、switch to hub
    • C、switch to router
    • D、hub to hub
    • E、router to PC

    正确答案:C

  • 第14题:

    What is the use of an "all configuration" backup in Cisco UCS?()

    • A、 Can be used to migrate from a 6120 to a 6140 and retain the same service profiles
    • B、 Can only be used on the fabric interconnect on which it was created
    • C、 Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster information
    • D、 Can be used to match firmware versions between 6120 and 6140 during a migration

    正确答案:A

  • 第15题:

    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

    • A、BPDU
    • B、Port security
    • C、RSTP
    • D、STP
    • E、VTP
    • F、Blocking mode

    正确答案:B

  • 第16题:

    What is the purpose of assigning an IP address to a switch?()

    • A、Provides local hosts with a default gateway address
    • B、Allows remote management of the switch.
    • C、Allows the switch to respond to ARP requests between two hosts
    • D、Ensures that hosts on the same LAN can communicate with each other.

    正确答案:B

  • 第17题:

    A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()

    • A、Micro segmentation
    • B、Transparent switching
    • C、peer-to-peer networking
    • D、port security
    • E、store-and-forward switching
    • F、virtual local area networks

    正确答案:A

  • 第18题:

    单选题
    Hosts on the same VLAN can communicate with each other but are unable to communicate with hosts on different VLANs. What is needed to allow communication between VLANs()。
    A

    a switch with a trunk link that is configured between the switches

    B

    a router with an IP address on the physical interface that is connected to the switch

    C

    a switch with an access link that is configured between the switches

    D

    a router with subinterfaces configured on the physical interface that is connected to the switch


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()
    A

    Micro segmentation

    B

    Transparent switching

    C

    peer-to-peer networking

    D

    port security

    E

    store-and-forward switching

    F

    virtual local area networks


    正确答案: F
    解析: 暂无解析

  • 第20题:

    单选题
    What is the use of an "all configuration" backup in Cisco UCS?()
    A

     Can be used to migrate from a 6120 to a 6140 and retain the same service profiles

    B

     Can only be used on the fabric interconnect on which it was created

    C

     Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster information

    D

     Can be used to match firmware versions between 6120 and 6140 during a migration


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which command can be used from a PC to verfy the connectivity between host that connect through path?()
    A

    tracert address

    B

    ping address

    C

    arp address

    D

    traceroute address


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()
    A

    As the root user from serverA run the command rhost serverB

    B

    As the root user from serverA run the command rlogin serverB

    C

    As the desired user from serverB run the command rhost serverA

    D

    As the desired user from serverA run the command rlogin serverB


    正确答案: D
    解析: 暂无解析

  • 第23题:

    多选题
    Which of the following answers are correct characteristics of microsegmentation, in the context of a Local Area Network (LAN)?()
    A

    Dedicated paths between sending and receiving hosts are established.

    B

    Multiple subnetwork broadcast addresses are created.

    C

    Multiple ARP tables are needed.

    D

    The decrease in the number of collision domains.

    E

    Broadcast domains are enhanced.

    F

    Additional bandwidth is used to connect hosts.


    正确答案: C,D
    解析: 暂无解析