题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-12-01 06:10:01

[单项选择] An administrator wants to have the flexibility to dynamically move a fibre channel PCI card between given LPARs. For each given LPAR how should they add the PCI card to the LPAR profile?()
A. Add the fibre channel card as hared?Add the fibre channel card as ?hared?
B. Add the fibre channel card as irtual?Add the fibre channel card as ?irtual?
C. Add the fibre channel card as esired?Add the fibre channel card as ?esired?
D. Add the fibre channel card as equired?Add the fibre channel card as ?equired?

更多"An administrator wants to have the "的相关试题:

[单项选择] An administrator wants to mirror an importantfilesystem between two disks without mirroring the entire volume group. Which command should be used?()
A. cplv
B. mirrorvg
C. mklvcopy
D. migratel
[单项选择] An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()
A. Multilayer switch
B. CSU
C. Proxy server
D. IDS
[单项选择]A network administrator wants to verify the active alarms on interface so-0/0/0. Which command displays this information?()
A. show interfaces alarms
B. show interfaces terse
C. show alarms extensive
D. show interfaces extensive
[单项选择] An administrator wants to deploy a complex LPARenvironment on a 595. What is the most current tool available for documenting the proposed LPAR configuration and determining if there are adequate IO resources?()
A. LPAR Planning Tool.
B. System Planning Tool.
C. LPAR Validation Tool.
D. System Validation Tool.
[单项选择]The administrator wants to verify the current state of the OSPF database loading process. Which show command should the administrator use?()
A. show ip ospf [process - id] interface
B. show ip ospf neighbor
C. show ip ospf [process - id]
D. show ip ospf [process - id area - id] database
[单项选择] A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()
A. from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
B. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
C. from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }
D. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
[单项选择] An administrator wants to test the performance of an application at different memory sizes. What is the most effective way to perform the test and collect statistical information for each test?()
A. Run DLPAR to change the LPAR memory for each test.
B. Run rmss command to simulate different memory for each test.
C. Run chdev command to limit the system memory size for each test.
D. Run chattr command to limit the system memory size for each test.
[单项选择]A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
[多项选择]A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()
A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C. Configure the MAC address of the server as a static entry associated with port Fa0/1.
D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
[单项选择] An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()
A. Disable SSID
B. WPA
C. MAC filtering
D. RAS
[单项选择] An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()
A. IDS
B. IPS
C. Firewall
D. Managed PKI
[单项选择] An administrator wants to host several LPARs on a JS23 Blade server. To achieve this what additional management software is required?()
A. HMC
B. IVM
C. VIOS
D. IBM Director
[单项选择]As a network administrator, you have configured a Catalyst 6500 Series Switch with redundant supervisor engine in a CIS network. What is the result of issuing the redundancy force-switchover command on that switch?()
A. Automatic switchover from active to standby on primary supervisor failure
B. Reset of the primary supervisor.
C. Manual switchover from active to standby supervisor
D. Manual switchover from standby to active supervisor
[单项选择]As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()
A. access-list 101 in
B. access-list 101 out
C. ip access-group 101 in
D. ip access-group 101 out

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码