网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following devices is used to provide appropriate voltage to the CPU?()
A
Redundant power supply
B
VRM
C
Heat sink
D
HBAs
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following devices is used to provide appropriate voltage to the CPU?()A Redundant power supplyB VRMC Heat sinkD HBAs” 相关考题
考题
Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
A.VLANB.Peer to PeerC.VTPD.VPN
考题
Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()
A.568AB.568BC.CrossoverD.Loopback
考题
Which of the following wireless standards was the FIRST standard to be ratified and is used to support legacy wireless devices?()
A.802.11aB.802.11gC.802.11bD.802.11n
考题
Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()
A.SwitchB.HubC.ModemD.Repeater
考题
Which of the following could be used to provide a Layer 3 data path between separate VLANs?()A、 VLAN trunkingB、 An external routerC、 An internal route processorD、 VLAN capable bridgeE、 EtherChannel
考题
Which of the following devices is used to provide appropriate voltage to the CPU?()A、 Redundant power supplyB、 VRMC、 Heat sinkD、 HBAs
考题
Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()A、SwitchB、HubC、ModemD、Repeater
考题
Which of the following devices is used to connect a WAN to a LAN?()A、Basic routerB、Basic switchC、BridgeD、Repeater
考题
Which of the following interfaces is used to connect analog devices to the Internet?()A、POTSB、ATMC、VDSLD、SDSL
考题
Physical and logical network diagrams are used for which of the following configuration management goals?()A、Track DHCP distributionB、Compare MAC and IP addressesC、Document Internet access historyD、Identity network devices
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS
考题
A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()A、Unmanaged switchB、Hardware firewallC、HubD、Managed switch
考题
Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A、tracertB、netstatC、nslookupD、ping
考题
A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A、IGPB、EIGRPC、EGPD、BGP
考题
Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP
考题
Which of the following are types of biometric devices used in server rooms? ()A、 MantrapsB、 Fingerprint scannersC、 CCTV systemsD、 Retina scannerE、 Proxy card readers
考题
Which of the following commands should be used to tune parameters of devices that are displayed with lsattr?()A、 chdevB、 cfgmgrC、 vmtuneD、 schedtune
考题
Which of the following is used in an IBM Blade Center to provide cooling?()A、Fans for each bladeB、Chilled WaterC、BlowersD、Freon
考题
单选题Which of the following devices is used to provide appropriate voltage to the CPU?()A
Redundant power supplyB
VRMC
Heat sinkD
HBAs
考题
单选题Rewrite rules are used in which CoS scenario?()A
When a single device is configured to provide differentiated services.B
When multiple devices in a network are configured to use CoS to provide differentiated services.C
When a device is used to connect to another autonomous system.D
When CoS is used to classifiy traffic as low priority.
考题
单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A
VLANB
Peer to PeerC
VTPD
VPN
考题
单选题A system administrator is in the process of documenting the system. Which of the following commands will provide a list of the devices defined on the system?()A
lsdev -CB
lslpp -CC
lsattr -CD
odmget -C
考题
多选题Which of the following could be used to provide a Layer 3 data path between separate VLANs?()AVLAN trunkingBAn external routerCAn internal route processorDVLAN capable bridgeEEtherChannel
热门标签
最新试卷