网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Telneting from any machine on the network is taking 75 seconds.  Which of the following procedures should be checked to correct the error?()
A

 Check  /etc/hosts. 

B

 Check  /etc/resolv.conf. 

C

 Check for packet errors. 

D

 Check to see if the master server is up.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Telneting from any machine on the network is taking 75 seconds.  Which of the following procedures should be checked to correct the error?()A  Check  /etc/hosts. B  Check  /etc/resolv.conf. C  Check for packet errors. D  Check to see if the master server is up.” 相关考题
考题 Leave a few hours between eating and () any sporting activity. A、participating inB、taking inC、participating intoD、taking into

考题 This machine consists_____ many parts.If any part refuses to work ,the machine will fail. A. forB. onC. ofD. in

考题 Look, the little boy() a big dictionary from the shelf. A. is taking downB. is taking outC. is taking upD. is taking back

考题 The three players repeatedly denied _taking_ (take) any drug.

考题 The Turing machine is an abstract(71)of computer execution and storage introduced in 1936 by Alan Turing to give a mathematically precise definition of(72). or 'mechanical procedure'. As such it is still widely used in theoretical computer science, especially in(73)theory and the theory of computation. The thesis that states that Turing machines indeed capture the informal notion of effective or mechanical method in logic and mathematics is known as Turing's thesis.Every Turing machine computes a certain(74)partial function over the strings over its alphabet. In that sense it behaves like a computer with a fixed program. However, as Alan luring already described, we can encode the action table of every Turing machine in a string. Thus we might try to construct a Turing machine that expects on its tape a string describing an action table followed by a string describing the input tape, and then computes the tape that the encoded Turing machine would have computed. As Turing showed, such a luring machine is indeed possible and since it is able to simulate any other Turing machine it is called a(75)Turing machine.A universal Turing machine is Turing complete. It can calculate any recursive function, decide any recursive language, and accept any recursively enumerable language. According to the Church-Turing thesis, the problems solvable by a universal Turing machine are exactly those problems solvable by an algorithm or an effective method of computation, for any reasonable definition of those terms.A.implementB.patternC.toolD.model

考题 An internet is a combination of networks connected by (71) .When a datagram goes from a source to a (72) ,it will probably pass many (73) until it reaches the router attached to the destination network.A router receives a (74) from a network and passes it to another network.A router is usually attached to several networks.When it receives a packet,to which network should it pass the packet? The decision is based on optimization: Which of the available (75) is the optimum pathway?A.modemsB.routersC.switchesD.computers

考题 You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? () A. user nameB. password lengthC. certificateD. Host Checker

考题 Refer to the exhibit. R1 and R2 have been configured to share routing information via EIGRP. What will be the result of the configuration section shown for R2? () A. Any routes learned by R2 from the interface tied to the 172.16.0.0 network will not be advertised to neighbors on the 192.168.2.0 network.B. Only routes learned by R2 from the interface tied to the 172.16.0.0 network will be advertised to neighbors on the 192.168.2.0 network.C. Only the 172.16.0.0 network will be advertised to neighbors on the 192.168.2.0 network.D. All networks, except the 172.16.0.0 network will be advertised to neighbors on the 192.168.2.0 network .

考题 In view of ______ bilge water from any vessel,an application shall be made to Harbor Authorities for approval.A.dischargingB.recirclingC.loadingD.taking in

考题 You have water washed your cargo tanks using the fixed machines.What should you do before using portable machines to clean areas screened from the wash of the fixed machine by structural members ________.A.Ventilate the tank to eliminate any electrostatically charged mistB.Attach the water supply hose to the portable machine after the cleaning head is positioned inside the tankC.Insure that the tanks are not stripped until the final wash is startedD.Ground the fixed machines to eliminate any electrostatic buildup on the cleaning head

考题 For the purpose of ______ tank or hold washings from any vessel,an application shall be made to Harbor Authorities for approval.A.DischargingB.RecirclingC.LoadingD.Taking in

考题 Together with the network layer,the transport layer is the heart of the protocol ( 请作答此空).The network layer provides end-to-end () delivery using datagrams or virtual circuits.The transport layer builds on the network layer to provide data transport from a process on a () machine to a process on a destination machine with a desired level of reliability that is independent of the physical () currently in use.It provides the abstractions that applications nedd to use the network..Without the () layer,the whole concept of layered protocols would make little sense.A.transport B.network C.hierarchy D.service

考题 A user cannot ping any other hostnames from an AIX machine. The error received is "host name earth NOT FOUND". Which of the following files is most likely configured incorrectly?()A、/etc/resolv.confB、/etc/rc.tcpipC、/etc/aliasesD、/etc/hosts.equiv

考题 Which of the following cable types can cause interference on the network when disconnecting any one machine?()A、CoaxialB、Cat 1 UTPC、Cat 3 UTPD、Cat 5 UTP

考题 A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()A、The RADIUS serverB、The EAPoL serverC、The workstation's network adapterD、The Ethernet switch

考题 Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()A、prefixes received from any other BGP peer and prefixes locally originated via network statements or redistributedB、all prefixes in its routing tableC、prefixes received from EBGP peers and prefixes locally originated via network statements or redistributedD、prefixes received from EBGP peers and prefixes received from route reflectorsE、prefixes received from other IBGP peers, prefixes received from EBGP peers,and prefixes redistributedto BGPF、prefixes received from other IBGP peers and prefixes received from route reflectors

考题 Telneting from any machine on the network is taking 75 seconds.  Which of the following procedures should be checked to correct the error?()A、 Check  /etc/hosts. B、 Check  /etc/resolv.conf. C、 Check for packet errors. D、 Check to see if the master server is up.

考题 You have two hosts that run VMware ESX. You need to recommend a management solution for the virtual machines (VMs) on the VMware hosts. The solution must support the ability to move the VMs from one VMware host to the other VMware host by using VMware vMotion technology. What should implement on the network?()A、a failover cluster between the VMsB、Second-Level Address Translation (SLAT)C、Windows System Resource Manager (WSRM)D、quick migrationE、a Fibre Channel Storage Area Network (SAN)F、an iSCSI Storage Area Network (SAN)G、Virtual Machine ChimneyH、Cluster Shared Volumes (CSV)I、a failover cluster for the Hyper-V hostsJ、virtual machine queue (VMQ)K、Network Load Balancing (NLB) for the Hyper-V hostsL、Microsoft System Center Operations Manager with Performance and Resource Optimization (PRO)M、Microsoft System Center Virtual Machine Manager 2008 R2N、Network Attached Storage (NAS)

考题 单选题You are an enterprise administrator for Cer-tech .com. All the servers on the network run Windows Server2008. The network consists of a Server that has the Windows Server virtualization role service installed.You create a new virtual machine, installed Windows Server 2008 on it, and configure it to use the physicalnetwork card of the host server. After this installation and configuration the virtual machine, you wereunable to access network resources from the virtual machine. Which of the following options would youchoose to ensure that the virtual host can connect to the physical network?()A Install the MS Loopback adapter on the virtual machine.B Enable the Multipath I/O feature on the host server.C Install Windows Server virtualization Guest Integration Components on the virtual machine.D Install the MS Loopback adapter on the host server.E None of the above

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Hyper-V server role installed. You create a new virtual machine and perform an installation of WindowsServer 2003 on the virtual machine. You have the virtual machine configured to use the physical networkcard of the host server. You find that you are unable to access network resources from the virtual machine.You have to make sure that the virtual host can connect to the physical network. What action should youperfrom?()A In order to make sure that the virtual host can connect to the physical network, the Multipath I/O feature should be enabled on the host server.B In order to make sure that the virtual host can connect to the physical network, you should perform the installation of the Microsoft Loopback adapter on the virtual machine.C In order to make sure that the virtual host can connect to the physical network, you should perform the installation of Microsoft Hyper-V Integration Components on the virtual machine.D In order to make sure that the virtual host can connect to the physical network, you should perform the installation of the Microsoft Loopback adapter on the host server.

考题 单选题Which of these best identifies the types of prefixes a router running BGP will advertise to an EBGP peer?()A prefixes received from any other BGP peer and prefixes locally originated via network statements or redistributed to BGPB all prefixes in its IP routing tableC only prefixes received from EBGP peers and prefixes locally originated via network statements or redistributedD only prefixes received from EBGP peers and prefixes received from route reflectorsE all prefixes in its routing table except the prefixes received from other EBGP peersF all prefixes in its routing table except the prefixes received from other IBGP peers

考题 单选题Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()A prefixes received from any other BGP peer and prefixes locally originated via network statements or redistributedB all prefixes in its routing tableC prefixes received from EBGP peers and prefixes locally originated via network statements or redistributedD prefixes received from EBGP peers and prefixes received from route reflectorsE prefixes received from other IBGP peers, prefixes received from EBGP peers,and prefixes redistributedto BGPF prefixes received from other IBGP peers and prefixes received from route reflectors

考题 多选题You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()Auser nameBpassword lengthCcertificateDHost Checker

考题 单选题A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()A The RADIUS serverB The EAPoL serverC The workstation's network adapterD The Ethernet switch

考题 单选题You have a server that runs Windows Server 2008. The server has the Windows Server virtualization role service installed.  You create a new virtual machine and perform an installation of Windows Server 2008 on the virtual machine. You configure the virtual machine to use the physical network card of the host server. You notice that you are unable to access network resources from the virtual machine. You need to ensure that the virtual host can connect to the physical network. What should you do?()A On the host server, install the MS Loopback adapter.B On the host server, enable the Multipath I/O feature.C On the virtual machine, install the MS Loopback adapter.D On the virtual machine, install Windows Server virtualization Guest Integration Components.

考题 单选题You are the network administrator at TestKing. You apply the following access list on the E0 outbound interface connected to the 192.168.1.8/29 LAN: access-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 20 any access-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 21 any What will the effect of this access list be?()A All traffic will be allowed to out of E0 except FTP traffic.B FTP traffic from 192.168.1.22 to any host will be blocked.C FTP traffic from 192.168.1.9 to any host will be blocked.D All traffic will be prevented from leaving E0.E All FTP traffic to network 192.168.1.9/29 from any host will be blocked.

考题 单选题Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is not configured as a route reflector? ()A  prefixes received from any other BGP peer and prefixes locally originated via network statements or redistributedB  all prefixes in its routing tableC  prefixes received from EBGP peers and prefixes locally originated via network statements or redistributedD  prefixes received from EBGP peers and prefixes received from route reflectorsE  prefixes received from other IBGP peers, prefixes received from EBGP peers, and prefixes redistributed to BGPF  prefixes received from other IBGP peers and prefixes received from route reflectors