更多"Which of the following documents is"的相关试题:
[单项选择]Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
A. Network diagram
B. Performance baseline
C. Network security procedure
D. Company policy
[单项选择]Which of the following techniques is used to control the project schedule
A. Pareto diagra
B. Performance measuremen
C. Parametric modelin
D. Statistical samplin
[单项选择]Which of the following methods is used to increase the number of processes sharing the CPU ?()
A. Interrupt
B. Scheduler
C. Swapping
D. Working Set
[单项选择]Which of the following methods is used to provide a standard to measure performance
A. Benchmarkin
B. Samplin
C. Estimatin
D. Levelin
[单项选择]Which of the following protocols is used to encrypt data between web servers and web browsers?()
A. SMTP
B. SIP
C. HTTP
D. SSL
[单项选择]Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()
A. RIP
B. 0S:F
C. STP
D. EGP
[单项选择]Which of the following tools is used to consolidate files and folders on a local drive?()
A. CHKDSK
B. DEFRAG
C. DISK CLEANUP
D. Computer Management
[单项选择]Which of the following technologies is used on the backbone of an ISDN?()
A. VDSL
B. SDSL
C. OC3
D. ATM
[单项选择]Which of the following interfaces is used to connect analog devices to the Internet?()
A. POTS
B. ATM
C. VDSL
D. SDSL
[单项选择]Which of the following interfaces are used to simultaneously transfer video and audio at highrates?()
A. HDMI
B. DVI-D
C. S-Video
D. DVI-I
[单项选择]Which of the following should be used to restrict access to a wireless network?()
A. Port forwarding
B. Enable SSID broadcast
C. Wireless encryption
D. Enable DMZ
[单项选择]Which of the following commands is used to retrieve database names from the local catalog for DRDA host databases on System i and System z?()
A. LIST DB DIRECTORY
B. LIST DCS DIRECTORY
C. LIST NODE DIRECTORY
D. LIST ACTIVE DATABASES
[单项选择]Which of the following statements is used to grant user TOM and Application team APPGRP the ability to add data to table TAB1?()
A. GRANT ADD DATA ON TABLE tab1 TO GROUP tom appgrp
B. GRANT INSERT TO USER tom, GROUP appgrp ON TABLE tab1
C. GRANT INSERT ON TABLE tab1 TO USER tom, GROUP appgrp
D. GRANT ADD DATA ON TABLE tab1 TO USER appgrp, GROUP tom
[单项选择]Which of the following techniques is used to extract the /usr/tmp directory from a mksysb backup?()
A. Use the tar command on the fifth image.
B. Use the restore command on the fourth image.
C. Use tctl -f /dev/rmt0.1 fsf 3 followed by the tar command on the fourth image.
D. Reboot using the mksysb tape and then use the dd command to extract the file.
[单项选择]Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()
A. REVOKE ALL PRIVILEGES FROM USER tom
B. REVOKE ALL ON EMPLOYEE FROM USER tom
C. REVOKE EXECUTE ON EMPLOYEE FROM USER tom
D. REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom
[单项选择]Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()
A. REVOKE ADD, DELETE FROM USER tom ON TABLE tab1
B. REVOKE ADD, DELETE ON TABLE tab1 FROM USER tom
C. REVOKE INSERT, DELETE FROM USER tom ON TABLE tab1
D. REVOKE INSERT, DELETE ON TABLE tab1 FROM USER tom
[单项选择]Which of the following commands is used to display other computers running on the network?()
A. hostname
B. ipconfig
C. net view
D. nslookup
[单项选择]Which of the following devices is used to connect a WAN to a LAN?()
A. Basic router
B. Basic switch
C. Bridge
D. Repeater
[单项选择]Which of the following computers are used for basic applications and meets the MINIMUMrequirements for running Windows?()
A. Virtualization workstation
B. Home server PC
C. CAD workstation
D. Thin client