网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classfuladdress. Which of the following is the address that can be used in this scenario?()

  • A、10.178.1.5/1
  • B、10.178.1.5/8
  • C、10.178.1.5/16
  • D、10.178.15/30

参考答案

更多 “An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classfuladdress. Which of the following is the address that can be used in this scenario?()A、10.178.1.5/1B、10.178.1.5/8C、10.178.1.5/16D、10.178.15/30” 相关考题
考题 An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()A. WMIB. RISC. DNSD. SNMPE. SMTP

考题 An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classfuladdress. Which of the following is the address that can be used in this scenario?() A.10.178.1.5/1B.10.178.1.5/8C.10.178.1.5/16D.10.178.15/30

考题 Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()A、assigning a private IP address to the APB、changing the default SSID valueC、configuring a new administrator passwordD、changing the mixed mode setting to single modeE、configuring traffic filtering

考题 Which two EIGRP options will limit a query domain?()A、configuring EIGRP stubsB、configuring a second EIGRP AS and redistributingC、configuring summary addressesD、configuring an offset-listE、configuring a prefix-listF、configuring unicast neighbors

考题 The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

考题 An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()A、WMIB、RISC、DNSD、SNMPE、SMTP

考题 When configuring a DHCP server, which of the following can the administrator define for DHCPusers?()A、 Database serverB、 NTP serverC、 DHCP serverD、 SQL serverE、 DNS serverF、 Domain name

考题 An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues.  All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic.  Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs

考题 While configuring a new adapter using cfgmgr, an administrator receives a warning message indicating that some device packages are not installed. Additionally, the adapter displays in the Defined state. Which command will resolve the issue and make the adapter available?()A、shutdown -FrB、cfgmgr -i lpp_sourceC、mkdev -l device_nameD、mknode /dev/device_name

考题 An administrator is configuring a new cluster and has a requirement for a notification to be generated if the /tmp File System becomes greater than 90% full. Which of the following PowerHA components will support theadministrator’s requirement?()A、Pre-defined EventsB、User-defined EventsC、Remote notification methodsD、The integration between RMC and WebSM

考题 A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()A、are mandatoryB、specify action group ExecuteCommandActionGroup for Controller commandsC、specify action group ViewCommandActionGroup for View commandsD、specify resource group ControllerCommandResourceGroup for Controller commandsE、specify resource group ViewCommandResourceGroup for View commands

考题 An administrator wants to use the online planning worksheets as an aid to configuring a PowerHA cluster.Which PowerHA fileset would the administrator need to install in order to obtain this tool?()A、cluster.es.hawB、cluster.es.worksheetsC、cluster.es.tools.worksheetsD、cluster.es.server.worksheets

考题 A system was rebooted and is taking a long time toreturn. The administrator has logged into the HMC and sees reference code 0c9. What does this mean?()A、The system is configuring a device.B、A system initiated dump has started.C、The system is varyingon a volume group.D、The system is running an inbuilt self test.

考题 While configuring a new adapter using cfgmgr, an administrator receives a warning message indicating that some device packages are not installed.  Additionally, the adapter displays in the Defined state.  Which command will resolve the issue and make the adapter available?()  A、shutdown -FrB、cfgmgr -i C、mkdev -l D、mknode /dev/

考题 Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.

考题 单选题You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()A You should consider configuring recipient filtering.B You should consider configuring sender reputation.C You should consider configuring content filtering.D You should consider configuring sender filtering.

考题 单选题An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()A Multilayer switchB CSUC Proxy serverD IDS

考题 多选题When configuring a DHCP server, which of the following can the administrator define for DHCPusers?()ADatabase serverBNTP serverCDHCP serverDSQL serverEDNS serverFDomain name

考题 单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to modify the name of the local Administrator account on all ABC.com workstations. You want to achieve this using as little administrative effort as possible. Which of the following actions should you take?()A You should consider configuring the Security Options settings via the Group Policy Management Console (GPMC).B You should consider configuring the Security Options settings via Server Manager.C You should consider configuring the replication settings.D You should consider navigating to Local Users and Groups via Computer Management on each workstation.

考题 多选题An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()AWMIBRISCDNSDSNMPESMTP

考题 单选题An administrator is configuring cross-site LVM and wants to ensure that logical volume copies are always onseparate disks. When creating a new logical volume, how could the administrator ensure that this requirement is achieved?()A Set the allocation policy to strictB Set the allocation policy to superstrictC Set the Maximum Number of Physical Volumes to 2D Set the Number of Copies for each logical partition to 2

考题 单选题An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classfuladdress. Which of the following is the address that can be used in this scenario?()A 10.178.1.5/1B 10.178.1.5/8C 10.178.1.5/16D 10.178.15/30

考题 多选题The network administrator wants to enable an EtherChannel between two switches in "on" mode. The administrator connects the cables and enables the interfaces, but while configuring the EtherChannel in the first switch, a spanning-tree loop was detected. Which two of these  procedures can avoid this problem?()AConfigure the EtherChannel as desirable first.BAssign all interfaces to the same VLAN.CDisable PortFast on the interfaces in the EtherChannels.DDisable all interfaces first.EFast Ethernet and Gigabit Ethernet ports cannot be assigned to the same EtherChannel.FFix cabling problems.

考题 单选题An administrator wants to use the online planning worksheets as an aid to configuring a PowerHA cluster.Which PowerHA fileset would the administrator need to install in order to obtain this tool?()A cluster.es.hawB cluster.es.worksheetsC cluster.es.tools.worksheetsD cluster.es.server.worksheets