题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-12-04 05:38:44

[单项选择]Which of the following protocols should be used to monitor network performance?()
A. SNTP
B. SMTP
C. HTTP
D. SNMP

更多"Which of the following protocols sh"的相关试题:

[单项选择]Which of the following protocols is commonly used for VoIP technology?()
A. Telnet
B. SMTP
C. SIP
D. SNMP
[单项选择]Which of the following protocols would be used in order to log into a router to configure a VLAN?()
A. RDP
B. SMTP
C. TELNET
D. FTP
[单项选择]Which of the following protocols can be used to retrieve system and network performance information from a router?()
A. LDAP
B. IMAP
C. TFTP
D. SNMP
[单项选择]Which of the following protocols is used to encrypt data between web servers and web browsers?()
A. SMTP
B. SIP
C. HTTP
D. SSL
[单项选择]Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()
A. RIP
B. 0S:F
C. STP
D. EGP
[单项选择]Which of the following protocols is used by thin clients?()
A. IPX
B. NetBIOS
C. RDP
D. UDP
[单项选择]Which of the following commands should be used to check filesets for consistency?()
A. installp -C
B. lslpp -c
C. instfix -i
D. lppchk -v
[单项选择]Which of the following network protocols is used to ensure consistent time across network devices on the domain?()
A. NTP
B. FTP
C. RTP
D. IGMP
[单项选择]Which of the following should be used to restrict access to a wireless network?()
A. Port forwarding
B. Enable SSID broadcast
C. Wireless encryption
D. Enable DMZ
[单项选择]Which of the following should be used to ensure that all packets are received by every connecteddevice?()
A. Hub
B. Router
C. Switch
D. Firewall
[单项选择]Which of the following RAID arrays should be used to achieve the BEST fault tolerance?()
A. Four drives with RAID 0
B. Four drives with RAID 3
C. Four drives with RAID 5
D. Four drives with RAID 10
[单项选择]Which of the following should be used to check a serial port for functionality?()
A. Loopback plug
B. Toner probe
C. Multimeter
D. Cable tester
[单项选择]Which of the following should be used to test an internal NIC without having to connect it to thenetwork?()
A. Loopback cable
B. Crossover cable
C. Rollover cable
D. Straight cable
[多项选择]Which of the following protocols encrypt communication?()
A. HTTPS
B. TELNET
C. SMTP
D. DNS
E. SSH
[单项选择]Which of the following protocols requests membership to a multicast group?()
A. IGMP
B. SNMP
C. SMTP
D. ICMP
[单项选择]Which of the following protocols would BEST grant the user secure access to a remote location?()
A. VPN
B. FTP
C. POP3
D. DNS

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码