更多"Which of the following technologies"的相关试题:
[单项选择]Which of the following technologies causes a single processor to appear as multiple processors within System Properties in a Windows Server?()
A. RISC
B. Multicore
C. Symmetric multi-processing
D. Hyper-V
[单项选择]Which of the following technologies allows an administrator to submit traffic to an IDS for review?()
A. Spanning tree
B. VLAN
C. PoE
D. Port mirroring
[单项选择]Which of the following memory technologies allows for single bit errors to be detected and subsequently fixed?()
A. RAID
B. ECC
C. CAS
D. SDRAM
[单项选择]Which of the following allows multiple applications toshare a single operating system resource?()
A. Logical Partition
B. Workload Partition
C. Dynamic Logical Partition
D. Shared Processor Logical Partition
[单项选择]Which of the following allows network administrators to easily apply common services and employ features across Cisco switches, routers, and access points with an intuitive GUI?()
A. Cisco IPS
B. Cisco Network Assistant
C. Cisco VAM2+
D. Cisco SDM
[单项选择]Which of the following allows verification of the port that a printer is currently using?()
A. The print queue window from system tray
B. Properties of the printer from the Printers Control Panel
C. Print spooler view in the Printers Control Panel
D. Properties of the port within Device Manager
[单项选择]Which of the following allows an administrator to recover the MOST data?()
A. System image
B. Incremental backup
C. System state restore
D. Differential backup
[单项选择]Which of the following allows a technician to mask a private network of IP addresses behind onepublic IP address?()
A. NAT
B. Subnetting
C. DHCP
D. DNS
[单项选择]Which of the following allows a program or port through a software firewall?()
A. Exception
B. Pass-through
C. Port-forwarding
D. Punch-through
[单项选择]Which of the following allows a Windows 7 remote user to edit a file offline then automatically update the changes when back in the office?()
A. Windows Defender
B. Sync Center
C. Windows Aero
D. HomeGroup
[单项选择]Which of the following allows a WAP to be installed in a location where there are no power outletsavailable?()
A. Port authentication
B. PoE
C. PPTP
D. Trunking
[单项选择]Which of the following keystrokes allows installation of third party storage drivers during a Windows set-up?()
A. F6
B. F7
C. F8
D. F9
[单项选择]Which of the following tools allows an administrator to determine the MAC address of another computer?()
A. ping
B. arp
C. ifconfig
D. ipconfig
[单项选择]Which of the following devices allows multiple internal IP addresses to access an external websitewith minimal impact to the network bandwidth?()
A. Proxy
B. Load balancer
C. Router
D. Bandwidth shaper
[单项选择]Which of the following statements allows USER1 to take away read access on the table ORG.TAB1 from USER2?()
A. REVOKE SELECT FROM user2 ON TABLE org.tab1
B. REVOKE SELECT ON TABLE org.tab1 FROM user2
C. REVOKE READ ACCESS FROM user2 ON TABLE org.tab1
D. REVOKE READ ACCESS ON TABLE org.tab1 FROM user2
[单项选择]Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()
A. REVOKE ACCESS ON DATABASE FROM USER bob
B. REVOKE CONNECT ON DATABASE FROM USER tom
C. REVOKE tom FROM ACCESS ON DATABASE BY USER bob
D. REVOKE tom FROM CONNECT ON DATABASE BY USER bob
[单项选择]Which of the following command allows you to view the UDI information for a Cisco device?()
A. show environment
B. show status
C. show inventory
D. show hardware
[单项选择]Which one of the following protocols allows the information about the configuration of a new VLAN to be distributed across entire switched network?()
A. STP
B. VTP
C. EIGRP
D. SNMP
E. CDP
F. None of the above
[单项选择]Which of the following technologies when implemented allows for the GREATEST fault tolerance for memory?()
A. RAID
B. Registered memory
C. ECC
D. Memory pairing