更多"An administrator wants to have the "的相关试题:
[单项选择] An administrator wants to mirror an importantfilesystem between two disks without mirroring the entire volume group. Which command should be used?()
A. cplv
B. mirrorvg
C. mklvcopy
D. migratel
[单项选择] An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()
A. Multilayer switch
B. CSU
C. Proxy server
D. IDS
[单项选择]A network administrator wants to verify the active alarms on interface so-0/0/0. Which command displays this information?()
A. show interfaces alarms
B. show interfaces terse
C. show alarms extensive
D. show interfaces extensive
[单项选择] An administrator wants to deploy a complex LPARenvironment on a 595. What is the most current tool available for documenting the proposed LPAR configuration and determining if there are adequate IO resources?()
A. LPAR Planning Tool.
B. System Planning Tool.
C. LPAR Validation Tool.
D. System Validation Tool.
[单项选择]The administrator wants to verify the current state of the OSPF database loading process. Which show command should the administrator use?()
A. show ip ospf [process - id] interface
B. show ip ospf neighbor
C. show ip ospf [process - id]
D. show ip ospf [process - id area - id] database
[单项选择] A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()
A. from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
B. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
C. from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }
D. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
[单项选择] An administrator wants to test the performance of an application at different memory sizes. What is the most effective way to perform the test and collect statistical information for each test?()
A. Run DLPAR to change the LPAR memory for each test.
B. Run rmss command to simulate different memory for each test.
C. Run chdev command to limit the system memory size for each test.
D. Run chattr command to limit the system memory size for each test.
[单项选择]A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
[多项选择]A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()
A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C. Configure the MAC address of the server as a static entry associated with port Fa0/1.
D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
[单项选择] An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()
A. Disable SSID
B. WPA
C. MAC filtering
D. RAS
[单项选择] An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()
A. IDS
B. IPS
C. Firewall
D. Managed PKI
[单项选择] An administrator wants to host several LPARs on a JS23 Blade server. To achieve this what additional management software is required?()
A. HMC
B. IVM
C. VIOS
D. IBM Director
[单项选择]As a network administrator, you have configured a Catalyst 6500 Series Switch with redundant supervisor engine in a CIS network. What is the result of issuing the redundancy force-switchover command on that switch?()
A. Automatic switchover from active to standby on primary supervisor failure
B. Reset of the primary supervisor.
C. Manual switchover from active to standby supervisor
D. Manual switchover from standby to active supervisor
[单项选择]As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()
A. access-list 101 in
B. access-list 101 out
C. ip access-group 101 in
D. ip access-group 101 out