题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-10-03 05:05:51

[单项选择]Which of the following would be used to monitor unauthorized access to data files?()
A. Performance Log and Alerts
B. Event Viewer
C. Security Configuration and Analysis
D. IP Security Monitor

更多"Which of the following would be use"的相关试题:

[单项选择]Which of the following is a laptop monitor technology that uses a backlight to produce an image on the screen?()
A. OLED
B. Plasma
C. DLP
D. LCD
[单项选择]Which of the following connectors would be used if the EIA/TIA 568 scheme is followed?()
A. ST
B. RJ-11
C. RJ-45
D. MT-RJ
[单项选择]Which of the following utilities would be used to configure energy saving measures when a laptop switches to battery power?()
A. MSTSC
B. ACPI
C. GDI
D. MSCONFIG
[单项选择]Which of the following protocols would be used in order to log into a router to configure a VLAN?()
A. RDP
B. SMTP
C. TELNET
D. FTP
[单项选择]Which of the following would be used to optimize network performance and increase bandwidth availability?()
A. Packet analysis
B. QoS
C. Traffic shaping
D. Fault tolerance
[单项选择]Which of the following would be used to connect two IDFs in the same building with the LAN, whileminimizing crosstalk?()
A. RG-6
B. STP
C. CAT3
D. UTP
[单项选择]Which of the following is NOT an input to monitor and control project work ?()
A. Project management pla
B. Enterprise environmental factor
C. Change request
D. Performance report
[单项选择]Which of the following would be used to lock all of the primary communication equipment of abuilding, including its demarcation point?()
A. MTR
B. MDF
C. Smart jack
D. IDF
[单项选择]Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS
[单项选择]Which of the following commands would be used to verify the integrity of critical system files?()
A. verify
B. nslookup
C. sfc
D. chkdsk
[单项选择]Which of the following commands would be used to display the IP address on a UNIX/Linux computer?()
A. netstat
B. ipconfig
C. ifconfig
D. dig
[单项选择]Which of the following commands would be used to go from c:/windows to c:/windows/system32?()
A. RD
B. MD
C. DIR
D. CD
[单项选择]Which of the following commands would be used to move the working directory from C:/ to C:/Windows?()
A. CD
B. RD
C. MD
D. SFC
[多项选择]Which of the following features would BEST be used to optimize real-time voice and video chat?()(Select TWO)
A. Load balancing
B. Caching engines
C. Qos
D. Fault tolerance systems
E. Traffic shaping
[单项选择]Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()
A. IDF
B. 66 block
C. MDF
D. 110 block
[单项选择]Which of the following would MOST likely be used with multimode fiber?()
A. 10GBase-LR
B. 10GBase-T
C. 10GBase-ER
D. 10GBase-SR
[多项选择]Which commands, when used together, would create an 802.1Q link?()
A. Switch(vlan)# mode trunk
B. Switch(config)# switchport access mode trunk
C. Switch(config-if)# switchport mode trunk
D. Switch(config-if)# switchport trunk encapsulation dot1q
E. Switch(config)# switchport access mode 1
F. Switch(vlan)# trunk encapsulation dot1q

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码