网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which set of commands is recommended to prevent the use of a hub in the access layer?()
A
switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1
B
switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1
C
switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1
D
switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which set of commands is recommended to prevent the use of a hub in the access layer?()A switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1B switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1C switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1D switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1” 相关考题
考题
You would like to configure an Ethernet interface with the following characteristics:Which set of configuration commands accurately completes this task?()
A.AB.BC.CD.D
考题
You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?()
A. Bandwidth 56000B. Bandwidth 56000000C. Bandwidth 56D. Bandwidth 56kbps
考题
Which two of these are recommended practices with trunks? ()
A. use ISL encapsulationB. use 802.1q encapsulationC. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD. use VTP server mode to support dynamic propagation of VLAN information across the networkE. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
考题
Which set of commands is recommended to prevent the use of a hub in the access layer?()
A.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1B.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1C.switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1D.switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1
考题
Which two of these are recommended practices with trunks? ()A、 use ISL encapsulationB、 use 802.1q encapsulationC、 set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD、 use VTP server mode to support dynamic propagation of VLAN information across the network E、 set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
考题
What are two commands that can be used to configure MBGP for multicast?()A、Under the BGP group, configure family inet anyB、Use the set protocol MBGP command to enable MBGPC、Under the BGP group, configure family inet multicastD、Use the set rib-group command to copy the multicast routes into inet.1
考题
Which mechanism does External BGP use to prevent the formation of routing loops?()A、AS pathB、Split horizonC、Poison reverseD、Unicast RPF check
考题
Which of these commands can you use to show if an operational Catalyst switch port is set for autonegotiation of speed and duplex when running Cisco IOS software?()A、show port networkB、 show running-configC、show controllers Ethernet-controllerD、 show interfaces
考题
You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?()A、Bandwidth 56000B、Bandwidth 56000000C、Bandwidth 56D、Bandwidth 56kbps
考题
Which two of these are recommended practices with trunks?()A、use ISL encapsulationB、use 802.1q encapsulationC、set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD、use VTP server mode to support dynamic propagation of VLAN information across the networkE、set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation
考题
Which of the following commands would a technician MOST likely use to map a printer from aremote computer?()A、NET USEB、IPCONFIGC、NSLOOKUPD、TRACERT
考题
Which of the following ping commands would a technician use to ping continuously?()A、PING -lB、PING -RC、PING -tD、PING -a
考题
Which of the following commands should Karen, a technician, use to examine and restoreprotected system files?()A、SFCB、RECOVERC、REPLACED、COPY
考题
Which of the following commands will be run at a command prompt to determine which WindowsOS is running on the computer?()A、VERB、Device ManagerC、VERIFYD、SET
考题
Which of the following commands should be used to set network attributes on a currently running kernel?()A、 noB、 chdevC、 vmtuneD、 schedtune
考题
What are two commands that can be used to configure MBGP for multicast?()A、Under the BGP group, configure family inet any.B、Use the set protocol MBGP command to enable MBGP.C、Under the BGP group, configure family inet multicast.D、Use the set rib-group command to copy the multicast routes into inet.1.
考题
You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()A、 Use the CHANGE_PASSWORD command of the Listener control utility.B、 Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.C、 Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.D、 Manually modify the listener.ora file to include the password for the listener and restart the listener.
考题
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.
考题
单选题Which extinguishing agent is recommended in the Chemical Data Guide for use on a carbon disulfide fire?()A
Alcohol foamB
Dry chemicalC
Chemical foamD
Water fog
考题
单选题You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()A
Use the CHANGE_PASSWORD command of the Listener control utility.B
Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.C
Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.D
Manually modify the listener.ora file to include the password for the listener and restart the listener.
考题
单选题Which set of commands allows PPPoE dynamic interfaces to use a profile called config-info?()A
profile config-info auto-configure pppB
profile config-info auto-configure anyC
profile ppp config-info auto-configure pppoeD
profile pppoe config-info auto-configure pppoe
考题
单选题Which of the following commands should be used to set network attributes on a currently running kernel?()A
noB
chdevC
vmtuneD
schedtune
考题
单选题Which of these commands can you use to show if an operational Catalyst switch port is set for autonegotiation of speed and duplex when running Cisco IOS software?()A
show port networkB
show running-configC
show controllers Ethernet-controllerD
show interfaces
考题
单选题Which extinguishing agent is NOT recommended in the Chemical Data Guide for use on a cyclohexane fire?()A
FoamB
Carbon dioxideC
Dry chemicalD
Water fog
考题
多选题Which two commands would you use to discard a candidate configuration?()ArollbackBdeleteCdelete 0Drollback 0
考题
单选题You want to perform in incomplete recovery of your database. You plan to use these commands to recover your database: SET UNTIL TIME = ’2000-12-09:11:44:00’; RESTORE DATABASE; RECOVER DATABASE; How should the commands be executed? ()A
Only the SET command must be within a RUN block.B
All commands should be executed at the RMAN prompt.C
All three commands must be within a single RUN block.D
Only the RESTORE and RECOVER commands must be within a single RUN block.
考题
单选题Which of the following commands would a technician use to view the active applicationconnections on a local PC to the network?()A
ipconfigB
netstatC
nslookupD
net use
热门标签
最新试卷