单选题Which of the following protocols should be used to monitor network performance?()ASNTPBSMTPCHTTPDSNMP

单选题
Which of the following protocols should be used to monitor network performance?()
A

SNTP

B

SMTP

C

HTTP

D

SNMP


参考解析

解析: 暂无解析

相关考题:

A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?() A.FTPB.SMTPC.POPD.SNMP

Which of the following protocols would be used in order to log into a router to configure a VLAN?() A.RDPB.SMTPC.TELNETD.FTP

Which of the following protocols is commonly used for VoIP technology?() A.TelnetB.SMTPC.SIPD.SNMP

Which of the following protocols is used to encrypt data between web servers and web browsers?() A.SMTPB.SIPC.HTTPD.SSL

Which of the following protocols is the LEAST secure and should be avoided on a wireless network?() A.WEPB.PEAPC.WPAD.TKIP

Which of the following protocols should be used to monitor network performance?() A.SNTPB.SMTPC.HTTPD.SNMP

Which of the following network protocols is used to ensure consistent time across network devices on the domain?() A.NTPB.FTPC.RTPD.IGMP

Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A、WEPB、PEAPC、WPAD、TKIP

Which of the following protocols is used to encrypt data between web servers and web browsers?()A、SMTPB、SIPC、HTTPD、SSL

Which of the following commands should be used to monitor disk utilization during the time a system is experiencing a disk I/O performance problem?()A、 istatB、 topasC、 vmstatD、 filemon

Which of the following protocols can be used to retrieve system and network performance information from a router?()A、LDAPB、IMAPC、TFTPD、SNMP

A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?()A、FTPB、SMTPC、POPD、SNMP

Which of the following protocols is commonly used for VoIP technology?()A、TelnetB、SMTPC、SIPD、SNMP

A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?()A、IPv6B、RIPC、IGRPD、RIPv2

Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP

Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP

Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor

Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP

Which of the following WLM commands should be used to monitor performance on a system running wlm?()A、 wlmcntrlB、 wlmstatC、 wlmcheckD、 wlmassign

Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig

单选题Which of the following commands should be used to monitor disk utilization during the time a system is experiencing a disk I/O performance problem?()A istatB topasC vmstatD filemon

单选题A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?()AIPv6BRIPCIGRPDRIPv2

单选题Which of the following protocols can be used to retrieve system and network performance information from a router?()ALDAPBIMAPCTFTPDSNMP

单选题Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()AWEPBPEAPCWPADTKIP

单选题Which of the following WLM commands should be used to monitor performance on a system running wlm?()A wlmcntrlB wlmstatC wlmcheckD wlmassign

单选题Which of the following commands should be used to report statistics on network protocols used by the system?()A lsattrB pstatC netstatD ifconfig

单选题Which of the following network protocols is used to ensure consistent time across network devices on the domain?()ANTPBFTPCRTPDIGMP