网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A network administrator wants to analyze the historical performance of the servers in the organization and forecast the system performance needs into the future. Which add-on component of IBM Director would be used to assist with this task?()
A
Capacity Manager
B
Resource Monitors
C
System Availability
D
System Performance Monitor
参考答案
参考解析
解析:
暂无解析
更多 “单选题A network administrator wants to analyze the historical performance of the servers in the organization and forecast the system performance needs into the future. Which add-on component of IBM Director would be used to assist with this task?()A Capacity ManagerB Resource MonitorsC System AvailabilityD System Performance Monitor” 相关考题
考题
Historical records during close-out are useful to _____ and _____ for future projects.A.Predict trends, highlight problems.B.Analyze successes, shortfalls.C.Analyze strengths, document results.D.Support litigation, defend claims.E.Justify results, set standards.
考题
The Ezonexam network administrator wants to use a router named VE1 to segment the local network. What are some of the advantages of using VE1 to segment the network? (Choose two)A. Routers generally cost less than switchesB. Filtering can occur based on Layer 3 informationC. Broadcasts are not forwarded across the routerD. Broadcasts are eliminatedE. Adding a router to the network decreases latencyF. Routers can generally support more LAN ports than switches
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode
考题
A network administrator wants to verify the active alarms on interface so-0/0/0.0. Which command displays this information?()
A. show interfaces alarmsB. show interfaces terseC. show alarms extensiveD. show interfaces extensive
考题
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?()
A.IDSB.IPSC.FirewallD.Managed PKI
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
考题
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS
考题
An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()
A.netstatB.tracerouteC.nbtstatD.ping
考题
A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()A、Logging detect fail-loginB、Login on-failure logC、Login detect login-failure logD、Logging login on-failureE、none of the above
考题
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode
考题
An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()A、netstatB、tracerouteC、nbtstatD、ping
考题
An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs
考题
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI
考题
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS
考题
An AIX server is configured with a static IP address but the system administrator wants the server to give out IP addresses for clients who want to use the dynamic host configuration protocol instead of static IP addresses.How is this accomplished?()A、Use SMIT to have the server use DHCP instead of a static addressB、Edit /etc/rc.tcpip and start the dhcpsd daemonC、Use the network options command to enable ipforwardingD、Edit /etc/rc.net to set network options back to default
考题
A network administrator wants to analyze the historical performance of the servers in the organization and forecast the system performance needs into the future. Which add-on component of IBM Director would be used to assist with this task?()A、Capacity ManagerB、Resource MonitorsC、System AvailabilityD、System Performance Monitor
考题
The bos.perf package is part of the base operating system. Performance Diagnostic tool, PDT, is a part of bos.perf. All of the following statements are true EXCEPT?()A、 PDT attempts to identify performance problems automatically by collecting and integrating a wide range of performance, configuration and availability data.B、 PDT consists of three components, the collection component comprises a set of programs that periodically collect and record data, the retention component periodically reviews the collected data and discards data that is obsolete, and the reporting component periodically produces a diagnostic report from the current set of historical data.C、 PDT contains motif-based, AIX licensed programs that can easily access tools for system and network performance tuning, monitoring, and analysis.D、 PDT assesses the current state of a system and tracks changes in workload and performance. It attempts to identify incipient problems and suggest solutions before the problems become critical.
考题
An AIX server has 2 network interfaces and the system administrator wants to enable the users on the locally configured network interface to be able to connect to systems configured on the global network interface. How is it accomplished?()A、Enable routed on the serverB、Enable gated on the serverC、Enable ipforwarding on the serverD、Set network options back to default
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
考题
单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()A
AB
BC
CD
D
考题
单选题A network administrator wants to verify the active alarms on interface so-0/0/0. Which command displays this information?()A
show interfaces alarmsB
show interfaces terseC
show alarms extensiveD
show interfaces extensive
考题
单选题The administrator wants to backup the existing VIO server software and its current configuration before applying an update. What command will the administrator use to backup the VIO server software so that the backup can be restored from a Network Installation Manager (NIM) server or a Hardware Management Console (HMC)?()A
mksysb -t vio /mountpointB
backupios -file /mountpointC
mksysb -i /mountpoint/vio.mksysbD
backupios -mksysb -file /mountpoint/vio.mksysb
考题
单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A
Disable SSIDB
WPAC
MAC filteringD
RAS
考题
单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A
BPDUB
Port securityC
RSTPD
STPE
VTPF
Blocking mode
考题
单选题A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()A
Logging detect fail-loginB
Login on-failure logC
Login detect login-failure logD
Logging login on-failureE
none of the above
考题
多选题An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()ASetting up a custom community nameBConfiguring the network to block traffic on port 161CConfiguring the Windows Firewall to block port 161DSetting SNMP to read only on the devicesEInstalling new MIBs
考题
单选题You are the network administrator at TestKing. TestKing has been provided withthe network address 165.100.27.0/24. The TestKing CEO wants to know how many subnetworks this address provides, and how many hosts can be supported on each subnet. What would your reply be?()A
One network with 254 hosts.B
254 networks with 254 hosts per network.C
65,534 networks with 255 hosts per network.D
30 networks with 64 hosts per network.E
254 networks with 65,534 per network.
热门标签
最新试卷