题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2024-03-20 21:18:34

[单项选择] A Company switch was configured as shown below:  switchport mode access  switchport port-security   switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002   switchport port-security violation shutdown   Given the configuration output shown above,  what happens when a host with the MAC address of  0003.0003.0003 is directly connected to the switch port? ()
A.  The host will be allowed to connect.
B.  The port will shut down.
C.  The host can only connect through a hub/switch where 0002.0002.0002 is already connected.  
D.  The host will be refused access.
E.  None of the other alternatives apply

更多"A Company switch was"的相关试题:

[单项选择]Which options must you configure while performing an automated Tablespace Point-in-Time Recovery(TSPITR) by using Recovery Manager (RMAN)?()
A. New channels for restore and recovery tasks
B. New name for the data files of the tablespace
C. Auxiliary name for the data files of the tablespace
D. Auxiliary destinations for an auxiliary set of data files
[多项选择]Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0?()
A. TestKingRouter(config)# router ospf 0
B. TestKingRouter(config)# router ospf 1
C. TestKingRouter(config)# router ospf area 0
D. TestKingRouter(config)# network 192.168.16.0 0.0.0.255 0
E. TestKingRouter(config)# network 192.168.16.0 0.0.0.255 area 0
F. TestKingRouter(config)# network 192.168.16.0 255.255.255.0 area 0
[单项选择]A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()
A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command
B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command
C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them
D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security
[多项选择]Which three actions are required to configure the Flashback Database? ()
A. set Flash Recovery Area
B. enable Flashback logging
C. create FLASHBACK tablespace
D. start the database in the ARCHIVELOG mode
E. start the database in the NOARCHIVELOG mode
[多项选择]What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
A. Configure an authentication policy as part of the user role definitions.
B. Configure a Sign-in Policy.
C. Configure authentication agents as part of the user role definitions
D. Configure an authentication policy as part of the authentication realm definition.
[单项选择]Which command will configure a directory /commonfiles so that a user cannot delete files owned by other users in the same group?()
A. chmod +S /commonfiles
B. chmod 4775 /commonfiles
C. chmod 1777 /commonfiles
D. chmod -orgx /commonfiles
[多项选择]You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
A. Junos Pulse
B. Java Agent
C. Odyssey Access Client
D. Native 802.1X supplicant
[多项选择]You are asked to configure the configuration archival feature on your Junos devices.Which two transfer methods are available?()
A. TFTP
B. FTP
C. SCP
D. SFTP
[单项选择]You enter configuration mode with the configure command. You need to abort the changes that you have made and start again with a fresh copy of the active configuration. Which command should you use?()
A. rollback 0
B. load active
C. reset config
D. clear candidate config
[单项选择] You issued the following commands to configure setting in RMAN; RMAN> CONFIGURE DEVICE TYPE sbt PARALLELISM 1; RMAN> CONFIGURE DEFAULT DEVICE TYPE TO sbt; RMAN> CONFIGURE DATAFILE BACKUP COPIES FOR DEVICE TYPE sbt TO 2; RMAN> CONFIGURE ARCHIVELOG BACKUP COPIES FOR DEVICE TYPE sbt TO 2; RMAN> CONFIGURE DATAFILE BACKUP COPIES FOR DEVICE TYPE DISK TO 2; Then you issued the following command to take the backup: RMAN> BACKUP DATABASE PLUS ARCHIVELOG; Which statement is true about the execution of the above command?()
A. The backup will terminate because the FORMAT clause was not configured for the channel
B. It backs up two copies of data files to tape and disk, and two copies of archived log file on tape
C. It backs up the data files and archived log files to disk, making two copies of each data file and archived log file
D. It backs up the data files and archived log files to tape, making two copies of each data file and archived log file
[单项选择]Which command is used to initialize and configure a NIM master?()
A. /usr/sbin/nim_init
B. /usr/bin/installnim
C. /usr/sbin/nimconfig
D. /usr/sbin/setup_server
[多项选择]An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()
A. The switch must be configured with an IP address, subnet mask, and default gateway.
B. The switch must be connected to a router over a VLAN trunk.
C. The switch must be reachable through a port connected to its management VLAN.
D. The switch console port must be connected to the Ethernet LAN.
E. The switch management VLAN must be created and have a membership of at least one switch port.
F. The switch must be fully configured as an SMTP agent.
[多项选择]Which two statements are true about the configure exclusive command?()
A. It allows users to retain all uncommitted changes when exiting exclusive configuration mode.
B. It allows multiple users to edit private copies of the configuration concurrently.
C. It causes the loss of all uncommitted changes when exiting exclusive configuration mode.
D. It excludes other users from editing the configuration.
[单项选择]An engineer plans to configure summary routes with the ip summary - address eigrp asn prefix mask command. Which of the following, when added to such a command, would create a summary that includes all four of the following subnets: 10.1.100.0/25, 10.1.101.96/27, 10.1.101.224/28, and 10.1.100.128.25?()
A. 10.1.0.0 255.255.192.0
B. 10.1.64.0 255.255.192.0
C. 10.1.100.0 255.255.255.0
D. 10.1.98.0 255.255.252.0
[单项选择] A technician is attempting to configure Windows XP Media Center on a desktop from a CD. The message that comes up on the screen says ‘Missing NTLDR press any key to reboot’. Which of the following should the technician do NEXT?()
A. Replace the video card with a compatible one.
B. Check the Windows XP Hardware Compatibility List.
C. Verify the boot order in the BIOS.
D. Install Windows XP RC2 first, then upgrade to Windows XP Media Center.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码