网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()

A. The switch name must match the workgroup name of the local network.

B. The switch must be configured with an IP address and default gateway.

C. The remote workstations must have access to the management VLAN of the switch.

D. CDP must be enabled on the switch so that it can be located by other devices on the network.


参考答案

更多 “ You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A. The switch name must match the workgroup name of the local network.B. The switch must be configured with an IP address and default gateway.C. The remote workstations must have access to the management VLAN of the switch.D. CDP must be enabled on the switch so that it can be located by other devices on the network. ” 相关考题
考题 Examine this statement: SELECT student_id, gpa FROM student_grades WHERE gpa > You run the statement once, and when prompted you enter a value of 2.0. A report is produced. What happens when you run the statement a second time?()A. An error is returned.B. You are prompted to enter a new value.C. A report is produced that matches the first report produced.D. You are asked whether you want a new value or if you want to run the report based on the previous value.

考题 In which case would you use a FULL OUTER JOIN? () A. Both tables have NULL values.B. You want all unmatched data from one table.C. You want all matched data from both tables.D. You want all unmatched data from both tables.E. One of the tables has more data than the other.F. You want all matched and unmatched data from only one table.

考题 You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?() A. When you want all unauthenticated traffic to be redirectedB. When you want all clear text traffic to be redirected.C. When you want all authenticated traffic to be redirected.D. When you want all encrypted traffic to be redirected.

考题 The CPU does not have to look(66)all of RAM to find the spot it needs. But RAM only(67)the data temporarily. As soon as you switch the computer(68), all that information disappears from the RAM. When you switch the computer on again, the RAM is(69), and ready(70)a new program and new data.A.onB.throughC.forD.down upon

考题 You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()A. Fast ForwardB. Store and forwardC. Frag-freeD. None of the above

考题 You are bringing up a new Cisco Catalyst switch, and wish to connect it via a trunk to another switch from a different vendor, which uses the IEEE standard for the trunking method.When setting the encapsulation type on the trunk, what should you configure on the Cisco switch?()A. Switch(config)# switchport trunk encapsulation islB. Switch(config)# switchport trunk encapsulation ietfC. Switch(config-if)# switchport trunk encapsulation islD. Switch(config-if)# switchport trunk encapsulation ietfE. Switch(config-if)# switchport trunk encapsulation dot1q

考题 You are at a client site. It is a medium-sized business and needs a Cisco Catalyst switch that offers high availability and security. What type of Catalyst switches would you recommend?()A、 Catalyst 2960 SeriesB、 Catalyst 3750 SeriesC、 Catalyst 4900 SeriesD、 Catalyst 6500 Series

考题 You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()A、Fast ForwardB、Store and forwardC、Frag-freeD、None of the above

考题 Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()A、You may use Cisco Network Assistant to set up the initial configurationB、You must use CLI for initial configurationC、You may use either CLI or CAN for configurationD、You may make a direct connection to the PC from any point on the switchE、You may only make a direct connection from the port with the flashing green LED to the PC

考题 You are bringing up a new Cisco Catalyst switch, and wish to connect it via a trunk to another switch from a different vendor, which uses the IEEE standard for the trunking method. When setting the encapsulation type on the trunk, what should you configure on the Cisco switch?()A、Switch(config)# switchport trunk encapsulation islB、Switch(config)# switchport trunk encapsulation ietfC、Switch(config-if)# switchport trunk encapsulation islD、Switch(config-if)# switchport trunk encapsulation ietfE、Switch(config-if)# switchport trunk encapsulation dot1q

考题 What will happen if you issue the redundancy force-switchover command on a Catalyst 6500Series Switch with redundant supervisor modules?()A、reset of the primary supervisorB、manual switchover from standby to active supervisorC、manual switchover from active to standby supervisorD、automatic switchover from active to standby on primary supervisor failure

考题 You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A、The switch name must match the workgroup name of the local network.B、The switch must be configured with an IP address and default gateway.C、The remote workstations must have access to the management VLAN of the switch.D、CDP must be enabled on the switch so that it can be located by other devices on the network.

考题 In which scenario will you use the Flashback Version Query feature?()A、 when you want to restore a table that has been dropped from the Recycle BinB、 when you want to identify the transaction ID of the transaction that deleted some important records from a tableC、 when you want to recover the schema of a dropped userD、when you want to restore a dropped tablespace

考题 You have a computer that runs Windows XP Professional. You connect one local print device and install a printer. You share the printer. You need to give a user the ability to manage all new print jobs submitted to the printer. Your solution must prevent the user from installing additional local printers. What should you do?()A、In the printer properties, assign the Manage Printers permission to the user.B、In the printer properties, assign the Manage Documents permission to the user.C、From the Local Users and Groups snap-in, add the user to the Power Users group.D、From the Local Users and Groups snap-in, add the user to the Replicators group.

考题 You work as a network administrator, and your responsibilities include managing server storage. You havebeen asked to purchase a new disk subsystem for your company’s storage-area network (SAN). You arein the process of testing hardware solutions before making purchases, and you attach a new disksubsystem to the network. You want to provision the new disks and create new logical unit numbers (LUNs)to assign to a server named Server1. You open Storage Manager for SANs, but you can’t see the newhardware. However, you can connect to the new hardware by using the software provided by the vendor.You want to be able to manage the new disk subsystem you purchase by using Storage Manager for SANs. What should you do?()A、In Disk Management, chooses the Rescan Disks option.B、Choose a disk subsystem from a vendor that has a Virtual Disk Service hardware provider.C、On Server1, configures iSCSI Initiator to specify the new hardware as a favorite target.D、Use Storage Explorer to configure Server1 as an iSNS server.

考题 单选题In which scenario will you use the Flashback Version Query feature?()A  when you want to restore a table that has been dropped from the Recycle BinB  when you want to identify the transaction ID of the transaction that deleted some important records from a tableC  when you want to recover the schema of a dropped userD when you want to restore a dropped tablespace

考题 单选题You are bringing up a new Cisco Catalyst switch, and wish to connect it via a trunk to another switch from a different vendor, which uses the IEEE standard for the trunking method. When setting the encapsulation type on the trunk, what should you configure on the Cisco switch?()A Switch(config)# switchport trunk encapsulation islB Switch(config)# switchport trunk encapsulation ietfC Switch(config-if)# switchport trunk encapsulation islD Switch(config-if)# switchport trunk encapsulation ietfE Switch(config-if)# switchport trunk encapsulation dot1q

考题 单选题You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()A When you want all unauthenticated traffic to be redirectedB When you want all clear text traffic to be redirected.C When you want all authenticated traffic to be redirected.D When you want all encrypted traffic to be redirected.

考题 多选题You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()AThe switch name must match the workgroup name of the local network.BThe switch must be configured with an IP address and default gateway.CThe remote workstations must have access to the management VLAN of the switch.DCDP must be enabled on the switch so that it can be located by other devices on the network.

考题 单选题In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the data file in a different location while resto ing the file.  Which option must you consider for this task?()A  using only the RMAN SWITCH command to set the new location for the data fileB  placing the database in the MOUNT state for the restore and recovery operationsC  using an RMAN RUN block with the SET NEWNAME and then the SWITCH commandD  configuring two channels: one for the restore operation and the other for the recovery operation

考题 单选题You work as a database administrator at Certkiller .com. Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()A  mount the new disk group in the ASM instanceB  restart the ASM instance and the production database instanceC  register the new disk groups in the production database instanceD  restart the ASM instance without restarting the production database instanceE  include the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance

考题 单选题You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?()A Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. B Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. C Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. D Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. 

考题 单选题As a network administrator, you have configured a Catalyst 6500 Series Switch with redundant supervisor engine in a CIS network. What is the result of issuing the redundancy force-switchover command on that switch?()A Automatic switchover from active to standby on primary supervisor failureB Reset of the primary supervisor.C Manual switchover from active to standby supervisorD Manual switchover from standby to active supervisor

考题 单选题You work as a network administrator, and your responsibilities include managing server storage. You havebeen asked to purchase a new disk subsystem for your company’s storage-area network (SAN). You arein the process of testing hardware solutions before making purchases, and you attach a new disksubsystem to the network. You want to provision the new disks and create new logical unit numbers (LUNs)to assign to a server named Server1. You open Storage Manager for SANs, but you can’t see the newhardware. However, you can connect to the new hardware by using the software provided by the vendor.You want to be able to manage the new disk subsystem you purchase by using Storage Manager for SANs. What should you do?()A In Disk Management, chooses the Rescan Disks option.B Choose a disk subsystem from a vendor that has a Virtual Disk Service hardware provider.C On Server1, configures iSCSI Initiator to specify the new hardware as a favorite target.D Use Storage Explorer to configure Server1 as an iSNS server.

考题 单选题Examine this statement: SELECT student_id, gpa FROM student_grades WHERE gpa value; You run the statement once, and when prompted you enter a value of 2.0. A report is produced. What happens when you run the statement a second time?()A An error is returned.B You are prompted to enter a new value.C A report is produced that matches the first report produced.D You are asked whether you want a new value or if you want to run the report based on the previous value.

考题 单选题You are at a client site. It is a medium-sized business and needs a Cisco Catalyst switch that offers high availability and security. What type of Catalyst switches would you recommend?()A  Catalyst 2960 SeriesB  Catalyst 3750 SeriesC  Catalyst 4900 SeriesD  Catalyst 6500 Series

考题 单选题You completed the development of a new application and want to create a new domain in a new environment for functional testing. You want to have the same settings for your new domain as your old domain, with the option of changing the configuration in the new target environment. Which two actions should you execute?()A Use the introspect () command in WLST to gather the configuration information from the  original domain.B Use pack/unpack to transfer the domain from one machine to another.C Create a domain template from the original domain using the Domain Template Builder and use  the Configuration Wizard to create a new domain from the template.D Use the Admin Console of the original domain to create a domain template from the original  domain and use the Configuration Wizard to create a new domain from the template.

考题 单选题Where do you configure SCREEN options?()A zones on which an attack might arriveB zones you want to protect from attackC interfaces on which an attack might arriveD interfaces you want to protect from attack