网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
What are two appropriate uses for Internet Protocol TV broadcasting (IP/TV) technology? ()
- A、Enabling online collaboration among research personnel
- B、Delivering a strategic business update from the CEO to all personnel
- C、Enabling an interactive virtual classroom for sales personnel in remote locations
- D、Delivering information about changes in health benefit enrollment to all personnel
参考答案
更多 “What are two appropriate uses for Internet Protocol TV broadcasting (IP/TV) technology? ()A、Enabling online collaboration among research personnelB、Delivering a strategic business update from the CEO to all personnelC、Enabling an interactive virtual classroom for sales personnel in remote locationsD、Delivering information about changes in health benefit enrollment to all personnel” 相关考题
考题
Maybe we’ll soon be able to forecast the weather fo______.A.one dayB.two daysC.five daysD.seven days or even longer
考题
Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)
A. LDP uses Down Stream On Demand.B. RSVP uses Down Stream On Demand.C. LDP uses Down Stream Unsolicited.D. RSVP uses Down Stream Unsolicited.
考题
What are two uses of the AS Path attribute?() (Choose two.)
A. route selectionB. loop avoidanceC. determining equal cost paths for reachabliltyD. defining the application of other BGP attributes
考题
What are two appropriate uses for Internet Protocol TV broadcasting (IP/TV) technology? ()
A.Delivering information about changes in health benefit enrollment to all personnelB.Enabling online collaboration among research personnelC.Enabling an interactive virtual classroom for sales personnel in remote locationsD.Delivering a strategic business update from the CEO to all personnel
考题
What are two characteristics of RIPv2?()
A. classful routing protocolB. variable-length subnet masksC. broadcast addressingD. manual route summarizationE. uses SPF algorithm to compute path
考题
What are the two benefits of any intelligent network that uses a systems-level approach to integrate applications and services across an infrastructure?()A、 reduce complexityB、 reduced costs for all types of usersC、 packet inspection at wire speedD、 QoS to the desktopE、 LAN encryption services
考题
What are two characteristics of RIPv2? ()A、classful routing protocolB、variable-length subnet masksC、broadcast addressingD、manual route summarizationE、uses SPF algorithm to compute path
考题
When troubleshooting an EIGRP connectivity problem, you notice that two connected EIGRP routers are not becoming EIGRP neighbors. A ping between the two routers was successful.What is the next thing that should be checked?()A、Verify that the EIGRP hello and hold timers match exactly.B、Verify that EIGRP broadcast packets are not being dropped between the two routers with the show ip EIGRP peer command.C、Verify that EIGRP broadcast packets are not being dropped between the two routers with the show ip EIGRP traffic command.D、Verify that EIGRP is enabled for the appropriate networks on the local and neighboring router.
考题
What are two functions that WLAN management provides? ()A、 enhances securityB、 system testsC、 accommodates additional routersD、 simplifies daily operationsE、 uses standalone access points
考题
When arriving at the customers location, two different users describe the problem, and from their description it seems to be two separate problems. Which of the following is an appropriate step to take?()A、Ignore both of them and decide what the real problem is.B、Set up a separate call for each problem.C、Have them duplicate the problem at the device.D、Ask a third person and see if the problem is the same thing.
考题
You are designing a Hyper-V solution. You plan to virtualize an application server. The application server requires failover clustering that uses shared storage. You need to choose the correct storage solution. What should you choose?()A、two child partitions with VHDs stored on an iSCSI SANB、two child partitions with volumes mounted from an iSCSI SANC、two host servers with iSCSI-attached storage enabled for Cluster Shared Volumes (CSVs)D、two host servers with Fibre ChannelCattached storage enabled for Cluster Shared Volumes (CSVs)
考题
Which two statements are true about encrypting RMAN backup?() (Choose two.)A、The transparent encryption of backups uses the encryption walletB、The database uses the same encryption key for every encrypted backupC、The password encryption of backups only uses the password while creating and restoring backupD、If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
考题
单选题A password is made up of two letters followed by two single-digit numbers. If a person is assigned a password at random, what is the probability, rounded to the nearest hundredth, that the password uses only even digits for the numbers?A
0.25B
0.35C
0.5D
0.15E
0.1
考题
多选题What are two uses of the AS Path attribute?() (Choose two.)Aroute selectionBloop avoidanceCdetermining equal cost paths for reachabliltyDdefining the application of other BGP attributes
考题
单选题A just announced two-port Ethernet card has been installed on a system and it is not recognized. On the HMC the slot shows empty. The device driver has been installed and cfgmgr runs normally. What is the most appropriate action to solve this problem?()A
Update the HMC softwareB
Update the system firmwareC
Re-install the device driverD
Flash update the two-port card
考题
多选题What are two appropriate uses for Internet Protocol TV broadcasting (IP/TV) technology? ()AEnabling online collaboration among research personnelBDelivering a strategic business update from the CEO to all personnelCEnabling an interactive virtual classroom for sales personnel in remote locationsDDelivering information about changes in health benefit enrollment to all personnel
考题
单选题You need to design a method for junior IT administrators to perform more IT support tasks. Your solution must meet business and security requirements. What should you do?()A
Delegate appropriate Active Directory permissions to the junior IT administratorsB
Add the junior IT administrators’ user accounts to the Domain Admins user groupC
Create a custom Microsoft Management Console (MMC) that uses taskpad views to enable the appropriate tasks for the junior IT administratorsD
Make the junior IT administrators’ domain user accounts member of the local Administrators group on all client computersE
Create new domain user accounts for each junior IT administrator. Make the new accounts members of the Domain Admins group and instruct junior IT administrators to use the new accounts only for appropriate administrative tasks
考题
多选题Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that aresupported by the IETF?()AVPLS uses LDP for signaling.BVPLS uses BGP for autodiscovery and signaling.CVPLS uses extended IS-IS for signalingDVPLS uses OSPF version 3 for auto discovery and signalingEVPLS uses spanning tree for signaling
考题
多选题What are the two advantages of any intelligent network that uses a systems-level approach?()AimproveQosBreduced costs for all types of usersCpacket inspection at wire speedDreduced complexity
考题
多选题Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)ALDP uses Down Stream On Demand.BRSVP uses Down Stream On Demand.CLDP uses Down Stream Unsolicited.DRSVP uses Down Stream Unsolicited.
考题
多选题What are the two benefits of any intelligent network that uses a systems-level approach to integrate applications and services across an infrastructure?()Areduce complexityBreduced costs for all types of usersCpacket inspection at wire speedDQoS to the desktopELAN encryption services
考题
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()A
ServiceGreatUser should be added to the appropriate fixed database roles. B
You should assign the appropriate object-level permissions to ServiceGreatUser C
You should assign the appropriate server-level permissions to ServiceGreatLogin D
You should assign the appropriate database-level permissions to ServiceGreatUser
考题
单选题What channel is general communication used?()A
any appropriate channel except public communicationB
any appropriate channel except for public communicationsC
any appropriate channel besides public communicationD
any appropriate channel beside public communication
考题
多选题What are two benefits of the modular design of the Junos OS?()AEach module uses application-specific integrated circuits (ASICs).BEach module runs in its own protected memory space.CEach module can be individually restarted.DEach module is supported across all Junos platforms.
考题
多选题What are two uses of NAT?()Aconserving public IP addressesBallowing stateful packet inspectionCpreventing unauthorized connections from outside the networkDallowing networks with overlapping private address space to communicate
考题
单选题You are the administrator of a Windows Server 2003 computer named Testking1. An application on Testking1 gradually uses more and more memory until it causes Testking1 to stop responding. If you restart the application before it uses the available memory, there is no interruption of user services. You need to configure Testking1 to notify you when it encounters a low-memory condition. What should you do?()A
Using Task Scheduler, schedule a repeating task that runs the tracert command.B
Using Performance Logs and Alerts, configure an alert for the appropriate performance object.C
Using System Monitor, configure the appropriate performance object to display.D
Using Startup and Recovery Settings, configure Testking1 to send an Administrative Alert.
考题
多选题Which two statements correctly identify factors to consider when Configuring WAN QoS?()AVoice Traffic uses Assured ForwardingBVoice Signaling traffic uses Assured ForwardingCVoice Signaling traffic uses priority queuingDVoice Traffic uses priority queuingEVoice signaling traffic should use priority queuing with Assured Forwarding
考题
多选题What are three security problems with Wi-Fi Protected Access (WPA)?()AWPA is based on the outdated IEEE 802.11i standard.BWPA uses RSN,which uses the same base encryption algorithm as RC4.CWPA requires a hardware upgrade that may not be supported by all vendors.DWPA uses TKIP,which uses the same base encryption algorithm as WEP.EWPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.FWPA is susceptible to a security weakness when preshared keys are used.
热门标签
最新试卷