网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which option is correct to configure the maximum transmit packet size of a Fast Ethernet interface?()
A

set interfaces fe-0/0/0 unit 0 ethernet-options mtu 1200

B

set interfaces fe-0/0/0 mtu 1200

C

set interfaces fe-0/0/0 unit 0 mtu 1200

D

set interfaces fe-0/0/0.0 mtu 1200


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which option is correct to configure the maximum transmit packet size of a Fast Ethernet interface?()A set interfaces fe-0/0/0 unit 0 ethernet-options mtu 1200B set interfaces fe-0/0/0 mtu 1200C set interfaces fe-0/0/0 unit 0 mtu 1200D set interfaces fe-0/0/0.0 mtu 1200” 相关考题
考题 ● Your team has prepared a CPM schedule for your review. You notice that one node has six inputs (including two dummy activities) and four outputs (which include one dummy activity). Select the correct statement from the following:A This is a valid representation if the logic is correct.B This is invalid because a node can have a maximum of one dummy input representation if the logic is correct.C This is invalid because nodes cannot have both dummy inputs and dummy outputs.D This is a invalid because the number of outputs must equal the number of inputs.E This is invalid because a maximum of two inputs and two outputs are allowed using the critical path method.

考题 Which two statements about the track configuration option are correct?() A. The track option monitors interfaces as defined by the user.B. The track option monitors all interfaces participating in VRRP.C. The track option allows for a reduction of the priority value if the monitored interface goes down.D. The track option causes syslog entries to be written in the messages log file, if the monitored interface goes down.

考题 Which utility is used to restrict the number of addresses assigned to subscribers on a Bridged 1483 interface?() A. proxy DHCPB. RADIUS VSAC. DHCP option 82D. maximum sessions

考题 Which of the following statements is mot correct about mirroring?() A.Mirroring, with the write-verify option turned on, can be used to increase performance.B.Mirroring is a better choice that disk-striping, for large sequential-access file system when one is looking for performance.C.Mirroring, with a parallel-scheduling policy, may improve I/O read-operation performance.D.Mirroring, with maximum inter-disk allocation policy, is used to enhance availability.

考题 The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems (Choose two.)()。 A.Configure the gateway on Host A as 10.1.1.1B.Configure the gateway on Host B as 10.1.2.254C.Configure the IP address of Host A as 10.1.2.2D.Configure the IP address of Host B as 10.1.2.2E.Configure the masks on both hosts to be 255.255.255.224F.Configure the masks on both hosts to be 255.255.255.240

考题 Which three flow-control port states lead to enabled link flow control? ()A、 Receive port: Enabled, Transmit port: EnabledB、 Receive port: Enabled, Transmit port: DesiredC、 Receive port: Enabled, Transmit port: DisabledD、 Receive port: Disabled, Transmit port: DesiredE、 Receive port: Desired, Transmit port: Desired

考题 Which option correctly identifies the four main menus of a Cisco Wireless Control System (WCS)? ()A、 Home, Configure, Location, and MonitorB、 Home, Configure, Monitor, and RefreshC、 Home, Monitor, Refresh, and AdministrationD、 Monitor, Configure, Location, and AdministrationE、 Monitor, Configure, Refresh, and AdministrationF、 Monitor, Location, Refresh, and Administration

考题 As the network technician at Company, you need to configure DHCP snooping on a new switch.   Which three steps are required? ()A、 Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.B、 Configure DHCP snooping globally.C、 Configure the switch as a DHCP server.D、 Configure DHCP snooping on an interface.E、 Configure all interfaces as DHCP snooping trusted interfaces.F、 Configure DHCP snooping on a VLAN or range of VLANs.

考题 A client is configuring an x3650 M3. Once the system is in production, they need to able to remotely view and make changes to the UEFI interface. Which of the following is the correct way to configure this?()A、Configure the RSA with an IP addressB、Configure the BMC with an IP addressC、Configure the AMM with an IP addressD、Configure the IMM with an IP address

考题 Which utility is used to restrict the number of addresses assigned to subscribers on a Bridged 1483 interface?()A、proxy DHCPB、RADIUS VSAC、DHCP option 82D、maximum sessions

考题 Which of the following statements is correct regarding a hybridcrypto system?()A、 uses symmetric crypto for keys distributionB、 uses symmetric crypto for proof of originC、 uses symmetric crypto for fast encrypted/decryptionD、 uses asymmetric crypto for message confidentialityE、 uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session

考题 When surveying for VoWLAN, which power level should you base the access point coverage designon?()A、40mW maximum transmit powerB、average power level of the VoWLAN clientsC、100mW transmit powerD、lowest power level of the VoWLAN clients

考题 What is the correct fastpath to configure or add a TTY Terminal (directly from the screen), which connects to a serial port?()A、smitty ttyB、smitty devicesC、smitty ptyD、smitty dev

考题 Which of the following statements is mot correct about mirroring?()A、Mirroring, with the write-verify option turned on, can be used to increase performance.B、Mirroring is a better choice that disk-striping, for large sequential-access file system when one is looking for performance.C、Mirroring, with a parallel-scheduling policy, may improve I/O read-operation performance.D、Mirroring, with maximum inter-disk allocation policy, is used to enhance availability.

考题 Which two statements about the track configuration option are correct?()A、The track option monitors interfaces as defined by the user.B、The track option monitors all interfaces participating in VRRP.C、The track option allows for a reduction of the priority value if the monitored interface goes down.D、The track option causes syslog entries to be written in the messages log file, if the monitored interface goes down.

考题 Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A、the log option for the particular SCREEN optionB、the permit option for the particular SCREEN optionC、the SCREEN option, because it does not drop traffic by defaultD、the alarm-without-drop option for the particular SCREEN option

考题 You deploy mobile devices that run Microsoft Windows Mobile 5.0 Pocket PC Phone Edition.   You need to prevent the device screen from turning dark when users view documents.   Which two actions should you perform?()A、Configure the backlight brightness setting to maximum.B、Display the soft input panel (SIP) when users read documents.C、Increase the value of the Turn off device if not used for option.D、Increase the value of the Turn off backlight if device is not used for option.

考题 Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.  Which two actions should you perform?()A、Right-click and click the Diagnose option in the Connect to a network window.B、Set the security type value to No authentication in the wireless network properties dialog box.C、Click the Manually connect to a wireless network option in the Set up a connection or network window.D、In the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.E、Configure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.

考题 Terminal Services application runs on the server. Users report that the application stops responding. You monitor the memory usage on the server for a week. You discover that the application has a memory leak. A patch is not currently available.  You create a new resource-allocation policy in Microsoft Windows Server Resource Manager. You configure a Process Matching Criteria named TrackShip and select the application.  You need to terminate the application when the application consumes more than half of the available memory on the server. What should you do?()A、Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Profiling Policy.B、Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Managing Policy.C、Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Profiling Policy.D、Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Managing Policy.

考题 多选题Which two statements about the track configuration option are correct?()AThe track option monitors interfaces as defined by the user.BThe track option monitors all interfaces participating in VRRP.CThe track option allows for a reduction of the priority value if the monitored interface goes down.DThe track option causes syslog entries to be written in the messages log file, if the monitored interface goes down.

考题 单选题When surveying for VoWLAN, which power level should you base the access point coverage designon?()A 40mW maximum transmit powerB average power level of the VoWLAN clientsC 100mW transmit powerD lowest power level of the VoWLAN clients

考题 单选题Which option correctly identifies the four main menus of a Cisco Wireless Control System (WCS)? ()A  Home, Configure, Location, and MonitorB  Home, Configure, Monitor, and RefreshC  Home, Monitor, Refresh, and AdministrationD  Monitor, Configure, Location, and AdministrationE  Monitor, Configure, Refresh, and AdministrationF  Monitor, Location, Refresh, and Administration

考题 单选题Which of the following statements is correct regarding a hybridcrypto system?()A  uses symmetric crypto for keys distributionB  uses symmetric crypto for proof of originC  uses symmetric crypto for fast encrypted/decryptionD  uses asymmetric crypto for message confidentialityE  uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session

考题 单选题What is the correct procedure for adding an access point in WCS?()A Choose Configure Access_Point, then enter the AP MAC addressB Choose Configure Access_Point, then enter the IP address of the APC Wait until the WLC downloads its code from the WCS and choose the access point from the list under the WLC option of the Configure menuD Wait until the AP downloads its code from the WCS and choose the access point from the list under the Access_Point option of the Configure menu

考题 单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A the log option for the particular SCREEN optionB the permit option for the particular SCREEN optionC the SCREEN option, because it does not drop traffic by defaultD the alarm-without-drop option for the particular SCREEN option

考题 多选题Which three flow-control port states lead to enabled link flow control? ()AReceive port: Enabled, Transmit port: EnabledBReceive port: Enabled, Transmit port: DesiredCReceive port: Enabled, Transmit port: DisabledDReceive port: Disabled, Transmit port: DesiredEReceive port: Desired, Transmit port: Desired

考题 单选题You must configure a SCREEN option that would protect your device from a session table flood.Which configuration meets this requirement?()A AB BC CD D