更多"switch(x) {  default:&ens"的相关试题:
[单项选择] switch (i) { default: System.out.printIn(“Hello”); } What is the acceptable type for the variable i?()
A. Byte
B. Long
C. Float
D. Double
E. Object
F. A and B
G. C and D
[多项选择] switch (i) { default: System.out.printIn(“Hello”); ) What are the two acceptable types for the variable i?()
A. Char
B. Byte
C. Float
D. Double
E. Object
[多项选择] The default domain GPO in your company is configured by using the following account policy settings: ( Minimum password length: 8 characters .Maximum password age: 30 days. Enforce password history: 12 passwords remembered .Account lockout threshold: 3 invalid logon attempts .Account lockout duration: 30 minutes You install Microsoft SQL Server on a computer named Server1 that runs Windows Server 2008 R2. The SQL Server application uses a service account named SQLSrv. The SQLSrv account has domain user rights. The SQL Server computer fails after running successfully for several weeks. The SQLSrv user account is not locked out. You need to resolve the server failure and prevent recurrence of the failure. Which two actions should you perform()
A. Reset the password of the SQLSrv user account.
B. Configure the local security policy on Server1 to grant the Logon as a service right on the SQLSrv user
C. Configure the properties of the SQLSrv account to Password never expires.
D. Configure the properties of the SQLSrv account to User cannot change password.
E. Configure the local security policy on Server1 to explicitly grant the SQLSrv user account the allow logon locally user right.
[单项选择] You configured the default backup device type as disk for RMAN backups. In your database,because of business requirements,you have to take a simultaneous duplicate backup of the data files when the RMAN BACKUP command is used. What must you set using the RMAN CONFIGURE command to achieve this?()
A. MAXSETSIZE TO 2
B. DEVICE TYPE DISK PARALLELISM 2
C. RETENTION POLICY TO REDUNDANCY 2
D. DATAFILE BACKUP COPIES FOR DEVICE TYPE DISK TO 2
[单项选择] 研究下面的Java代码: switch (x) { case 1: System.out.println(1); case 2: case 3: System.out.println(3); case 4: System.out.println(4); } 当x=2时,运行结果是()。
A. 没有输出任何结果
B. 输出结果为3
C. 输出结果是3和4
D. 输出结果是1、3和4
[单项选择] On a Company switch named R1 you configure the following: iparp inspection vlan 10-12, 15 What is the purpose of this global configuration command made on R1?()
A. Discards ARP packets with invalid IP-to-MAC address bindings on trusted ports
B. Validates outgoing ARP requests for interfaces configured on VLAN 10, 11, 12, or 15
C. Intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings
D. Intercepts all ARP requests and responses on trusted ports
E. None of the other alternatives apply
[单项选择] A new Company switch was just configured using the "switchport trunk native vlan 7" command. What does this interface command accomplish?()
A. Causes the interface to apply ISL framing for traffic on VLAN 7
B. Configures the trunking interface to forward traffic from VLAN 7
C. Configures the interface to be a trunking port and causes traffic on VLAN 7 to be 802.1q tagged
D. Configures the trunking interface to send traffic from VLAN 7 untagged
E. None of the other alternatives apply
[单项选择] A Cisco switch has this configuration for a port channel connecting to an ESXi using dual NICs and is intended for use with an N1Kv. Interface fastethernet 1/10 Switchport mode trunk Switchport trunk allowed vlan all Channel-group 10 mode on No shut Interface fastethernet 1/11 Switchport mode trunk Switchport trunk allowed vlan all Channel-group 10 mode on No shut Interface port-channel 10 Switchport mode trunk Switchport allowed vlan all No shut Which Port Channel configuration must be used on the Nexus 1000v port-profile?()
A. MAC pinning
B. Cisco Discovery Protocol pinning
C. Mode On
D. Mode Active
E. No port channel configuration
[单项选择] A Company switch was configured as shown below: switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002 switchport port-security violation shutdown Given the configuration output shown above, what happens when a host with the MAC address of 0003.0003.0003 is directly connected to the switch port? ()
A. The host will be allowed to connect.
B. The port will shut down.
C. The host can only connect through a hub/switch where 0002.0002.0002 is already connected.
D. The host will be refused access.
E. None of the other alternatives apply
[单项选择] A switch that is to be added to the production network has been preconfigured (trunks, VLANs, VTP, and STP) and was tested in your lab. After installing the switch into the network, the entire network went down. What might explain what happened? ()
A. The new switch happened to be running Cisco Catalyst operating system, while the other network switches were running Cisco IOS Software.
B. The configuration revision of the new switch was higher than the configuration revision of the production VTP domain.
C. The link costs on the new switch are set to a high value, causing all ports on the new switch to go into a forwarding mode and none into blocking mode, thereby causing a spanning-tree loop.
D. The ports connecting to the two switches have been configured incorrectly. One side has the command switchport mode access and the other switchport mode trunk.
[单项选择] On switch R1 you issue the "udld enable" global command. What does this command accomplish? ()
A. Enables all fiber-optic LAN ports for Unidirectional LINK Detection (UDLD)
B. Enables all copper media LAN ports Unidirectional Link Detection (UDLD)
C. Overrides the default UDLS setting for all ports
D. Globally enables all ports on the device for Unidirectional Link Detection (UDLS)
E. None of the other alternatives apply
[单项选择] A switch port on TK1 is being configured to support 802.1Q trunking. Which of the following are true about 802.1Q trunking?()
A. Both switches must be in the same VTP domain.
B. The encapsulation type of both ends of the trunk does not have to match.
C. The native VLAN on both ends of the trunk must be VLAN 1.
D. 802.1Q trunking can only be configured on a Layer 2 port.
E. In 802.1Q trunking, all VLAN packets are tagged on the trunk link, except the native VLAN.
[多项选择] When the Catalyst switch R1 is enabled to use VTP, which information does it advertise on its trunk ports?()
A. VTP mode
B. STP root status
C. Negotiation status
D. Management domain
E. Configuration revision number
[单项选择] Switch R1 has been configured with Private VLANs. With that type of PVLAN port should the default gateway be configured?()
A. Trunk
B. Isolated
C. Primary
D. Community
E. Promiscuous
F. None of the other alternatives apply