网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which mode is used to allow only a single person to edit a configuration?()
- A、configure batch
- B、configure private
- C、configure exclusive
- D、configure dynamic
参考答案
更多 “Which mode is used to allow only a single person to edit a configuration?()A、configure batchB、configure privateC、configure exclusiveD、configure dynamic” 相关考题
考题
Given:11. public void go(int x) {Which statement is true?()
A.All of the assert statements are used appropriately.B.Only the assert statement on line 12 is used appropriately.C.Only the assert statement on line 15 is used appropriately.D.Only the assert statement on line 18 is used appropriately.E.Only the assert statements on lines 12 and 15 are used appropriately.F.Only the assert statements on lines 12 and 18 are used appropriately.G.Only the assert statements on lines 15 and 18 are used appropriately.
考题
An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.)
A. Only main mode can be used for IKE negotiationB. A local-identity must be definedC. It must be the initiator for IKED. A remote-identity must be defined
考题
Which mode is used to allow only a single person to edit a configuration?()
A. configure batchB. configure privateC. configure exclusiveD. configure dynamic
考题
Which command is used on the local router to invoke a loopback mode on a remote ERX Edge Router?()
A.AB.BC.CD.D
考题
A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()
A.EDITB.CHMODC.ATTRIBD.CONVERT
考题
The enable secret command is used to secure access to which CLI mode?()
A.user EXEC modeB.global configuration modeC.privileged EXEC modeD.auxiliary setup mode
考题
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
考题
The ip pim autorp listener command is used to do which of these?()A、enable a Cisco router to "passively" listen to Auto-RP packets without the router actively sending or forwarding any of the packetsB、allow Auto-RP packets in groups 224.0.1.39 and 224.0.1.40 to be flooded in dense mode out interfaces configured with the ip pim sparse-mode commandC、enable the use of Auto-RP on a routerD、configure the router as an Auto-RP mapping agent
考题
The Cisco 521 Wireless Express Access Point used in the Smart Business Communications System can be configured to operate in which mode?()A、controller-based mode onlyB、either standalone mode or controller-based modeC、standalone mode only
考题
Which statement is true about XpauseTarget in Oracle JRockit JVM ? ()A、 This option is supported by all type of Garbage collection modes.B、 This option is only supported by Generational Garbage Collection mode.C、 This option is only supported by Mark and Sweep Garbage Collection mode.D、 This option is only supported by Dynamic Garbage Collection mode.
考题
A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT
考题
Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering
考题
What information is displayed by the command cat/proc/dma?()A、 whether DMA is enabledB、 which DMA channels are in useC、 which DMA mode is in useD、 general information about DMA on the machine
考题
Which procedure should be used to configure the system to prevent all users from using the ’at’ command()? A、Create a /var/adm/cron/at.allow file with no entriesB、Create a /var/adm/cron/at.deny file with ’*’ as the only entryC、Create a /var/adm/at/at.deny file with ’ALL’ as the only entryD、Create a /var/adm/at/at.allow file with ’NONE’ as the only entry
考题
which one of the following accurately describes field names?()A、they must be unique in a database B、they can only be used once in a view C、they can only used once on each form D、they can be used mulriple times on a form
考题
Which of the following best describes how locks are used in DB2?()A、To maintain control of updated rows for commit processingB、To ensure only committed changes are altered by another applicationC、To allow two applications to update the same row of data simultaneouslyD、To prevent multiple applications from accessing the same data simultaneously
考题
An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.)A、Only main mode can be used for IKE negotiationB、A local-identity must be definedC、It must be the initiator for IKED、A remote-identity must be defined
考题
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.
考题
单选题Which setting change would you allow to make a child object to be moved out of a parent object?()A
Flex mode on. B
Flex mode off. C
Confined mode on. D
Confined mode off.
考题
单选题Which of the following best describes how locks are used in DB2?()A
To maintain control of updated rows for commit processingB
To ensure only committed changes are altered by another applicationC
To allow two applications to update the same row of data simultaneouslyD
To prevent multiple applications from accessing the same data simultaneously
考题
单选题which one of the following accurately describes field names?()A
they must be unique in a database B
they can only be used once in a view C
they can only used once on each form D
they can be used mulriple times on a form
考题
单选题Which Behavior Aggregate (BA) is used to classify traffic arriving on an LSP?()A
expB
dscpC
802.1PD
inet-precedence mode ipprec-defaultE
inet-precedence mode ipprec-compatability
考题
单选题The Cisco 521 Wireless Express Access Point used in the Smart Business Communications System can be configured to operate in which mode?()A
controller-based mode onlyB
either standalone mode or controller-based modeC
standalone mode only
考题
单选题Which mode is used to allow only a single person to edit a configuration?()A
configure batchB
configure privateC
configure exclusiveD
configure dynamic
考题
单选题Which statement is true about XpauseTarget in Oracle JRockit JVM ? ()A
This option is supported by all type of Garbage collection modes.B
This option is only supported by Generational Garbage Collection mode.C
This option is only supported by Mark and Sweep Garbage Collection mode.D
This option is only supported by Dynamic Garbage Collection mode.
考题
单选题The enable secret command is used to secure access to which CLI mode?()A
user EXEC modeB
global configuration modeC
privileged EXEC modeD
auxiliary setup mode
考题
问答题Which spanning tree mode will allow you to put multiple vlans into one instance?
热门标签
最新试卷