网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which  of  the  following  commands  will  ncrease  the  contiguous  free  space  of  a  file  system  without  having to add additional partitions()

  • A、chfs
  • B、fsck
  • C、chlv
  • D、defragfs

参考答案

更多 “Which  of  the  following  commands  will  ncrease  the  contiguous  free  space  of  a  file  system  without  having to add additional partitions()A、chfsB、fsckC、chlvD、defragfs” 相关考题
考题 Using the data shown in the Special window, Activities P, Q, and T are critical path activities. In order to shorten the time duration of the project, which activity should be "crashed" first?A . PB . QC . RD . SE . T

考题 You issued the following RMAN command to back up the database:Which two statements are true regarding the backup performed?() A. Archived redo log files are backed up along with data files.B. Only data files are backed up and a restore point named FY06Q4 is created.C. Archived log files are backed up along with data files, and the archived log files are deleted.D. The command creates a restore point named FY06Q4 to match the SCN at which this backup is consistent.

考题 A new frame relay connection is being brought up. Which of the following are frame relay LMI type options that can be configured on this new link?() A. EIA/TIAB. Q.932C. Q.933AD. IEEEE. CiscoF. Annex D

考题 In which integration method is an IPV6 packet encapsulated within an IPV4 protocol?() A. proxy.B. dual-stackC. tunnelingD. dot1q

考题 Which three of these statements regarding 802.1Q trunking are correct? () A.802.1Q native VLAN frames are untagged by default.B.802.1Q trunking ports can also be secure ports.C.802.1Q trunks can use 10 Mb/s Ethernet interfaces.D.802.1Q trunks require full-duplex, point-to-point connectivity.E.802.1Q trunks should have native VLANs that are the same at both ends.

考题 Which statements about 802.1Q trunking in Secure Network Foundation Design Guide for Single Site Deployments are correct?()A、The Cisco Control VLAN carries only Layer 2 control trafficB、802.1Q trunking is used between the access switch and the routerC、There is no 802.1Q trunking used in these designsD、When 802.1Q trunks are configured, they are also called Native VLANsE、Trunking Ensures that traffic from only one VLAN is carried on that trunk

考题 The Outer.1Q tag represents customer VLAN ID and inner.1Q tag represents Provider VLAN?()A、The Outer.1Q tag represents customer VLAN ID and inner.1Q tag represents Provider VLAN (PVLAN )B、It is an effective way to achieve VLAN transparency between Provider and enterprise customer bytunneling one ser of VLAN tags inside a second VLAN tagC、The Outer.1Q tag represents Service VLAN (PVLAN) and inner.1Q tag represents customer VLAND、QinQ is a way to hide native VLAN which can conflict with Provider native VLAN

考题 Which of the following technologies would an Internet Service Provider use to support overlapping  customer VLAN ID’s over transparent LAN services? ()A、 802.1q tunnelingB、 ATMC、 SDHD、 IP Over Optical NetworkingE、 ISL

考题 A new frame relay connection is being brought up. Which of the following are frame relay LMI type options that can be configured on this new link?()A、EIA/TIAB、Q.932C、Q.933AD、IEEEE、CiscoF、Annex D

考题 Which two of the following are designated fields for MAC tunneling protocol(802.1 ah)?()A、Service EthertypeB、ISLC、PseudoLAN TAGD、802.1q VLAN TAGE、Control WordF、Tunnel Label

考题 For the following LMI types,which three can be configured for use with Frame Relay on a Cisco router?()A、CiscoB、ANSI - Annex DC、Q.931 - Annex BD、Q.933 - Annex A

考题 The core Company switches are configured to use 802.1Q trunks.  Which three statements are  correct with regard to the IEEE 802.1Q standard?()A、 The IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frameB、 The packet is encapsulated with a 26 byte header and a 4 byte FCSC、 The protocol uses point-to-multipoint connectivityD、 The protocol uses point-to-point connectivityE、 The IEEE 802.1Q frame uses multicast destination of 0x01-00-0c-00-00F、 The IEEE 802.1Q frame retains the original MAC destination address

考题 In which integration method is an IPV6 packet encapsulated within an IPV4 protocol?()A、proxyB、dual-stackC、tunnelingD、dot1q

考题 Which three of these statements regarding 802.1Q trunking are correct?()A、802.1Q native VLAN frames are untagged by default.B、802.1Q trunking ports can also be secure ports.C、802.1Q trunks can use 10 Mb/s Ethernet interfaces.D、802.1Q trunks require full-duplex, point-to-point connectivity.E、802.1Q trunks should have native VLANs that are the same at both ends.

考题 A switch port on TK1 is being configured to support 802.1Q trunking.  Which of the following are true about 802.1Q trunking?()A、Both switches must be in the same VTP domain.B、The encapsulation type of both ends of the trunk does not have to match.C、The native VLAN on both ends of the trunk must be VLAN 1.D、802.1Q trunking can only be configured on a Layer 2 port.E、In 802.1Q trunking, all VLAN packets are tagged on the trunk link, except the native VLAN.

考题 For the following LMI types, which three can be configured for use with Frame Relay on a Cisco router?()A、CiscoB、ANSI-Annex DC、Q.931-Annex BD、Q.933-Annex A

考题 Which of the following can LCP successfully negotiate during the establishment of a PPP connection?()A、Q.931B、IPCPC、multilinkD、CHAPE、callback

考题 Which command will determine if the Trusted Computer Base is enabled on a system?()  A、getrunmodeB、getsecconfC、tcbck -displayD、odmget -q attribute=TCB_STATE PdAt

考题 多选题The core Company switches are configured to use 802.1Q trunks.  Which three statements are  correct with regard to the IEEE 802.1Q standard?()AThe IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frameBThe packet is encapsulated with a 26 byte header and a 4 byte FCSCThe protocol uses point-to-multipoint connectivityDThe protocol uses point-to-point connectivityEThe IEEE 802.1Q frame uses multicast destination of 0x01-00-0c-00-00FThe IEEE 802.1Q frame retains the original MAC destination address

考题 多选题If p and q are primes greater than 2, which of the following statements must be true? (Indicate all such statements.)Ap + q is evenBpq is oddCp2-q2 is even

考题 单选题Which sar option generates real-time disk I/O statistics?()A  sar -q B  sar -P C  sar -d D  sar -D 

考题 多选题Which two of the following are designated fields for MAC tunneling protocol(802.1 ah)?()AService EthertypeBISLCPseudoLAN TAGD802.1q VLAN TAGEControl WordFTunnel Label

考题 单选题A layer 3 switch can move packets between subnets based on which of the following criteria?()A 802.1q tagB PortC ApplicationD IP address

考题 单选题In which integration method is an IPV6 packet encapsulated within an IPV4 protocol?()A proxyB dual-stackC tunnelingD dot1q

考题 单选题Which statements about 802.1Q trunking in Secure Network Foundation Design Guide for Single Site Deployments are correct?()A The Cisco Control VLAN carries only Layer 2 control trafficB 802.1Q trunking is used between the access switch and the routerC There is no 802.1Q trunking used in these designsD When 802.1Q trunks are configured, they are also called Native VLANsE Trunking Ensures that traffic from only one VLAN is carried on that trunk

考题 单选题The Outer.1Q tag represents customer VLAN ID and inner.1Q tag represents Provider VLAN?()A The Outer.1Q tag represents customer VLAN ID and inner.1Q tag represents Provider VLAN (PVLAN )B It is an effective way to achieve VLAN transparency between Provider and enterprise customer bytunneling one ser of VLAN tags inside a second VLAN tagC The Outer.1Q tag represents Service VLAN (PVLAN) and inner.1Q tag represents customer VLAND QinQ is a way to hide native VLAN which can conflict with Provider native VLAN

考题 单选题You have a client computer that runs Windows 7. You need to identify which unsigned drivers have beeninstalled.  Which command should you run?()A Cipher.exe /s.B Driverquery.exe /si.C Msinfo32.exe /q.D Pnputil.exe i.

考题 单选题Let @ represent one of the four basic arithmetic operations such that, for any nonzero real numbers P and Q, P @ 0=P and P @ Q=Q @ P. Which arithmetic operation(S) does the symbol @ represent?A ×onlyB +onlyC -onlyD -and×E +and÷