网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Refer to the exhibit. R1 accesses the Internet using E0/0. You have been asked to co nfigure R1 so that a default route is generated to its downstream devices (191.0.0.1 and 192.0.0.1). Which commands would create this configuration? ()

A.router eigrp 190redistribute static ! ip route 0.0.0.0 0.0.0.0 Null0

B.ip default - network 2 0.0.0.0

C.router eigrp 190 redistribute static ! ip route 0.0.0.0 255.255.255.255 Null0

D.ip default - network 20.20.20.0


参考答案

更多 “ Refer to the exhibit. R1 accesses the Internet using E0/0. You have been asked to co nfigure R1 so that a default route is generated to its downstream devices (191.0.0.1 and 192.0.0.1). Which commands would create this configuration? ()A.router eigrp 190redistribute static ! ip route 0.0.0.0 0.0.0.0 Null0B.ip default - network 2 0.0.0.0C.router eigrp 190 redistribute static ! ip route 0.0.0.0 255.255.255.255 Null0D.ip default - network 20.20.20.0 ” 相关考题
考题 (b) As a newly-qualified Chartered Certified Accountant in Boleyn Co, you have been assigned to assist the ethicspartner in developing ethical guidance for the firm. In particular, you have been asked to draft guidance on thefollowing frequently asked questions (‘FAQs’) that will be circulated to all staff through Boleyn Co’s intranet:(i) What Information Technology services can we offer to audit clients? (5 marks)Required:For EACH of the three FAQs, explain the threats to objectivity that may arise and the safeguards that shouldbe available to manage them to an acceptable level.NOTE: The mark allocation is shown against each of the three questions.

考题 (b) As a newly-qualified Chartered Certified Accountant, you have been asked to write an ‘ethics column’ for a traineeaccountant magazine. In particular, you have been asked to draft guidance on the following questions addressedto the magazine’s helpline:(i) What gifts or hospitality are acceptable and when do they become an inducement? (5 marks)Required:For each of the three questions, explain the threats to objectivity that may arise and the safeguards thatshould be available to manage them to an acceptable level.NOTE: The mark allocation is shown against each of the three questions above.

考题 Certkiller.com is currently using a performance counter named HitCounter.You are required to increment each time a user accesses the UI classes within the application.To do this, you start by creating performance counters using the following code:GRAFIK - wird nicht fr Antwort ben?tigt !!!You have to adjust the HitCounter performance counter when a hit occurs.What should you do?()A.B.C.D.

考题 You, like many of your classmates, probably have been in such a situation where you are asked to do something to help a foreign friend. (翻译)

考题 In your database, the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:Which authentication method would be used first?()A. authentication by password fileB. authentication by using certificates over SSLC. authentication by using the Oracle Internet DirectoryD. authentication by using the local OS of the database server

考题 Router R1 sits at an Enterprise branch office, using the Internet for its only connectivity back to the rest of the EnterprisE.Which of the following is not a ben efit of using an IPsec tunnel for packets sent through the Internet, between R1 and the rest of the Enterprise?()A. PrivacyB. AuthenticationC. Allows using an IGP between R1 and the EnterpriseD. Secure communications

考题 Refer to the exhibit. The routing protocols EIGRP and OSPF have been configured as indicated in the exhibit. Given the partial configuration of router R2, which network will be present in th e routing table of R4?()A. Network BB. Network A and Network BC. Network AD. neither Network A nor Network B

考题 Refer to the exhibit. ROUTE.com is planning to implement a secure OSPF network to support traffic between clients on the 172.16.10.0/24 network and the file server on the 172.16.20./24 network. You have been asked to review the implementation and verification plans for this OSPF project. Which statement about the plan is true? ()A. It is complete as writtenB. It should include a task that verifie s that the interarea routes are using the proper MEDC. It should include a task that verifies that load sharing is active on R1 and R4D. It should include a task that verifies that all redundant links will become active when the primary links are sh ut down

考题 Refer to the exhibit. ROUTE.com is planning to implement a new secure OSPF network to support traffic between clients on the 172.16.10.0/24 network and the file server on th e 172.16.20./24 network. You have been asked to review the implementation plan for the OSPF project. Which statement about the plan is true?()A. It is complete as written.B. It should include a task that shuts down all unused interfaces.C. It sho uld include tasks that enable and verify OSPF authentication.D. It should include a task that establishes a file transfer baseline before and after the configuration is changed.

考题 Refer to the exhi bit. ROUTE.com is planning to implement load balancing for traffic between host on the 172.16.10.0/24 and 172.16.20./24 networks. You have been asked to review the implementation plan for this project. Which statement about the plan is true?()A. It is complete as written.B. It should include a task to configure multipath to equal a value of 2 on R1 and R4.C. It should use a ping instead of a traceroute to validate that load balancing has been activated.D. It should conta in a task that documents the changes made to the configurations.

考题 Refer to the exhibit. ROUTE.com is planning to implement load balancing for traffic between hosts on the 172.16.10.0/24 and 172.16.20./24 networks. You have been ask ed to review the implementation plan for this project. Which statement about the plan is true?()A. It is complete as written.B. It should include a task to configure EIGRP multipath equal to 2 on R1 and R4.C. It should inc lude a task to implement OSPF because it handles unequal cost load balancing most efficiently using variance.D. It should include a task that establishes a baseline before and after the configuration has been changed.

考题 Refer to the exhibit. A Boston company bought th e assets of a New York company and is trying to route traffic between the two data networks using EIGRP. The show command output shows that traffic will not flow between the networks. As a network consultant, you were asked to modify the configuration a nd certify the interoperability of the two networks. For traffic to flow from subnet 172.16.8.0/24 to the 172.16.16.0/24 subnet, which configuration change do you recommend?()A. Turn off autosummarization on routers N1 and B1.B. Add IP summary addre sses to the Internet - pointing interfaces of routers N1 and B1.C. Turn off autosummarization on routers N2 and B2.D. Add wildcard masks to the network commands on routers N2 and B2.

考题 Refer to the exhibit. Routers R1 and R2 have been configured to operate with OSPF. Routers R1 and R3 have been configured to operate with RIP. After configuring the redistribution between OSPF a nd RIP on R1, no OSPF routes are distributed into RIP. What should be done to correct this problem? ()A. The redistribution command should be reentered with the match route - type parameter included.B. The redistribution command should be reentered wit h the route - map map - tag parameter included.C. The redistribution command should be reentered with the metric metric - value parameter included.D. Routes will first need to be distributed into another protocol, and then into RIP.

考题 Refer to the exhibit. Which two statements are true?() A. DHCPDISCOVER packets will reach the DHCP server.B. The router will not forward DHCPDIS COVER packets because it has not been configured to do so.C. This configuration is applied to interface Fa0/1.D. DHCPDISCOVER packets will not reach the DHCP server because DHCPDISCOVER packets are broadcasts.E. DHCPDISCOVER packets will not reach the DHCP server because ports 67 and 68 have not been explicitly allowed by the ip forward - protocol command.F. This configuration is applied to interface Fa0/0.

考题 Refer to the exhibit. All routers have Protocol Independent Multicast (PIM) enabled interfaces. On the basis of the configuration provided on routers R1 and R2, which router will take on the func tion of rendezvous point (RP) for the multicast network? ()A. both routers R1 and R2B. router R1C. router R2D. none of the routers since they are not configured with static RP

考题 Refer to the exhibit. EIGRP has been configured on routers R1 and R2. However, R1 does not show R2 as a neighbor and does not accept routing updates from R2.What could be the cause of the problem?() A. The no auto - summary command has not been issued under the EIGRP process on both routers.B. Interface E0 on router R1 has not been configured with a secondary IP address of 10.1.2.1/24.C. EIGRP cannot exchange routing updates with a neighbor‘s router interface that is configured with tw o IP addresses.D. EIGRP cannot form neighbor relationship and exchange routing updates with a secondary address.

考题 You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()A、EncryptionB、Bandwidth limitsC、Minimal signal lossD、No EMI

考题 A customer reports the optical drive is no longer responding. Which of the following questionsshould be asked FIRST?()A、“Did you log in with an administrator account?”B、“Have you been to any inappropriate websites?”C、“What have you changed since the optical drive worked properly?”D、“What has changed since the optical drive worked properly?”

考题 In your database,the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:$ SQLPLUS scott/tiger@DB01 AS SYSDBA   where DB01 is the net service name.   Which authentication method would be used first?()  A、 authentication by password fileB、 authentication by using certificates over SSLC、 authentication by using the Oracle Internet DirectoryD、 authentication by using the local OS of the database server

考题 Using Oracle Scheduler you have scheduled two jobs, JOB_A and JOB_B, to run at 9:00 p.m. every Friday. You want both the jobs to use a single resource plan, WEEKEND_PLAN. Which task must have already been performed to enable you to achieve this objective?()A、 A window must have been created with the WEEKEND_PLAN resource plan.B、 A program must have been created with the WEEKEND_PLAN resource plan.C、 A job class must have been created with the WEEKEND_PLAN resource plan.D、 A windows group must have been created with the WEEKEND_PLAN resource plan.

考题 单选题Router R1 sits at an Enterprise branch office, using the Internet for its only connectivity back to the rest of the EnterprisE. Which of the following is not a ben efit of using an IPsec tunnel for packets sent through the Internet, between R1 and the rest of the Enterprise?()A PrivacyB AuthenticationC Allows using an IGP between R1 and the EnterpriseD Secure communications

考题 单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server connects to the Internet by using a router.You attempt to ping an Internet host and receive the following error message: “Destination host unreachable.”The server’s routing table is configured as shown in the exhibit. (Click the Exhibit button.) You need to ensure that you can access Internet hosts. What should you do?()A Modify the subnet mask. B Modify the default gateway address. C Clear the Address Resolution Protocol (ARP) cache. D Stop the Windows Firewall/Internet Connection Sharing (ICS) service.

考题 单选题A customer reports the optical drive is no longer responding. Which of the following questionsshould be asked FIRST?()A “Did you log in with an administrator account?”B “Have you been to any inappropriate websites?”C “What have you changed since the optical drive worked properly?”D “What has changed since the optical drive worked properly?”

考题 多选题You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()APPPBUDPCTCPDICMP

考题 单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()A Run ipconfig /flushdns at the command prompt. B Reset the password for the local administrator user account. C From the Internet Options in Internet Explorer, clear the AutoComplete history.D From the Internet Options in Internet Explorer, delete the Temporary Internet Files. 

考题 多选题You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()AEncryptionBBandwidth limitsCMinimal signal lossDNo EMI

考题 单选题You have been asked to create a static route with a next hop that is not directly connected to the router. Which configuration parameter enables the static route to accomplish this scenario?()A resolveB indirectC next-hopD recursive