更多"Which of the following should be us"的相关试题:
[单项选择]Which of the following protocols should be used to monitor network performance?()
A. SNTP
B. SMTP
C. HTTP
D. SNMP
[单项选择]Which of the following commands should be used to check filesets for consistency?()
A. installp -C
B. lslpp -c
C. instfix -i
D. lppchk -v
[单项选择]Which of the following should be used to ensure that all packets are received by every connecteddevice?()
A. Hub
B. Router
C. Switch
D. Firewall
[单项选择]Which of the following RAID arrays should be used to achieve the BEST fault tolerance?()
A. Four drives with RAID 0
B. Four drives with RAID 3
C. Four drives with RAID 5
D. Four drives with RAID 10
[单项选择]Which of the following should be used to check a serial port for functionality?()
A. Loopback plug
B. Toner probe
C. Multimeter
D. Cable tester
[单项选择]Which of the following should be used to test an internal NIC without having to connect it to thenetwork?()
A. Loopback cable
B. Crossover cable
C. Rollover cable
D. Straight cable
[单项选择]Which of the following statements should be included when teaching clients about monoamine oxidase (MAO) inhibitor antidepressants
[单项选择]Which of the following activities should the nurse discourage the client with a peptic ulcer
A. Chewing gum.
B. Smoking cigarettes.
C. Eating chocolate.
D. Taking acetaminophen (Tylenol).
[单项选择]In which of the following situations should correlation names be used?()
A. A table referenced in the FROM clause has no indexed column.
B. The table referenced in the FROM clause has more than 200 columns.
C. Two or more tables in the FROM clause have identical column names.
D. The FROM clause contains two or more tables in the SELECT statement.
[单项选择]Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()
A. ARP spoofing
B. VLAN
C. Mirroring
D. Spanning tree
[单项选择]Which of the following procedure should be performed prior to delivery and generally involves running a suite of operations so as to verify that the solution is applicable for production?()
A. Security Check
B. Acceptance Testing
C. Project Close Out
D. Systems Integration
[单项选择]Which of the following procedures should occur before removing a failing disk from a volume group?()
A. Veryoff the volume group
B. Unmount any filesystems on the disk
C. Remove all physical partitions on the disk
D. Unmount mirrored filesystems from the disk
[单项选择]Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()
A. Hub
B. VLAN
C. Router
D. Server
[单项选择]In which of the following configurations should a SAS hard drive jumper be placed for single drive operation?()
A. The jumpers should be placed in the single/master position.
B. There are no configuration jumpers needed on a SAS hard drive.
C. The jumpers should be placed to give the drive a SCSI ID of 1.
D. The jumpers should be placed in the slave position.
[单项选择]Which of the following groups should staff accounts be placed in, if the staff is required to perform most but not all maintenance tasks on a Windows PC?()
A. Power Users
B. User
C. Administrator
D. Guest
[单项选择]Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
A. Network diagram
B. Performance baseline
C. Network security procedure
D. Company policy
[单项选择]Which of the following attributes should be specified when creating a volume group?()
A. stripe size
B. allocation policy
C. physical partition size
D. number of logical partitions
[单项选择]Which of the following instruments was widely used before the seventeenth century
A. The harpsichord
B. The spinet
C. The clavichord
D. The organ