单选题You need make configuration changes to an existing layer 3 switch in the Company network. On a  multilayer Catalyst switch,  which interface command is used to convert a Layer 3 interface to a  Layer 2 interface?()A switchport access vlan vlan-idB switchportC switchport mode accessD no switchportE None of the other alternatives apply

单选题
You need make configuration changes to an existing layer 3 switch in the Company network. On a  multilayer Catalyst switch,  which interface command is used to convert a Layer 3 interface to a  Layer 2 interface?()
A

 switchport access vlan vlan-id

B

 switchport

C

 switchport mode access

D

 no switchport

E

 None of the other alternatives apply


参考解析

解析: 暂无解析

相关考题:

Which CLI mode allows you to make configuration changes?() A. enable modeB. configuration modeC. operational modeD. active mode

After editing to your device’s configuration, which command must you enter to activate the configuration changes?() A. setB. copy candidate activeC. apply-configD. commit

You have a computer that runs Windows Vista.You need to configure the computer to meet the following requirements:·You must be able to make configuration changes remotely.·You must be able to make the changes without the permission of the locally logged-on user.What should you do?()A.AB.BC.CD.D

You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D

After making changes to the router, you issue the copy running-config startup-config command to save changes. After reloading the router, the router comes up in setup mode. You again make changes, save them, and reboot. Again,the router comes up in setup mode.What is the most likely cause of this?()A. The NVRAM is corrupted.B. The boot system commands were omitted in the configuration.C. The configuration register setting is incorrect.D. The upgraded configuration incompatible with the hardware platform.E. The upgraded IOS incompatible with the hardware.

You need make configuration changes to an existing layer 3 switch in the Company network. On a  multilayer Catalyst switch,  which interface command is used to convert a Layer 3 interface to a  Layer 2 interface?()A、 switchport access vlan vlan-idB、 switchportC、 switchport mode accessD、 no switchportE、 None of the other alternatives apply

After making changes to the router, you issue the "copy running-config startup-config" command to save changes. After reloading the router, the router comes up in setup mode. You again make changes, save them, and reboot. Again,the router comes up in setup mode. What is the most likely cause of this?()A、The NVRAM is corrupted.B、The boot system commands were omitted in the configuration.C、The configuration register setting is incorrect.D、The upgraded configuration incompatible with the hardware platform.E、The upgraded IOS incompatible with the hardware.

Which CLI mode allows you to make configuration changes?()A、enable modeB、configuration modeC、operational modeD、active mode

Which of these is true regarding the configuration and application of port access control lists? ()A、PACLs can be applied in the inbound or outbound direction of a Layer 2 physical interface. B、At Layer 2, a MAC address PACL will take precedence over any existing Layer 3 PACL.C、When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port.D、PACLs are not supported on EtherChannel interfaces.

You have a single network segment. All servers run Windows Server 2003 Service Pack 2 (SP2). You have a DHCP server named Server1. Client computers receive IP addresses from Server1. You add a second network segment separated by a RFC 1542-compliant router. You need to ensure that computers in the new network segment can receive their IP configurations from Server1. You make the appropriate configuration changes on the router.  What should you do on Server1?()A、Create a new scope.B、Configure a DHCP Relay Agent.C、Add an Extensions Path scope option.D、Create a new exclusion range in the existing scope.

You need to make structural changes to the cube. You also need to ensure that appropriate aggregations are created after the changes are made. What should you do?()A、Record a weeks user activity by using SQL Profiler. Apply structural changes. Replay the activity and then run the Usage Based Optimization Wizard.B、Apply structural changes. Run the Database Engine Tuning Advisor.C、Apply structural changes. Run the Usage Based Optimization Wizard.D、Record a weeks user activity by using SQL Profiler. Apply structural changes. Run the Database Engine Tuning Advisor.

You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()A、the Authorization Manager snap-in on Node1 and Node2B、the Authorization Manager snap-in on the VMsC、the Network Configuration Operators local group on each VMD、the Network Configuration Operators local group on Node1 and Node2

You have the Web Server (IIS) role installed on a server that runs Windows Server 2008.   You make changes to the configuration of an application named APP1. Users report that the application fails. You examine the event log and discover the following error message:  503 Service Unavailable.  You need to ensure that users are able to connect to APP1.  Which command should you run at the command prompt on the server?()A、appcmd set configB、appcmd stop apppoolC、appcmd start apppoolD、appcmd set apppool

You are planning the consolidation of the application servers. You need to identify the appropriate disk configuration for the VMs based on the company’s planned changes. Which disk configuration should you identify?()A、fixed-size virtual hard disk (VHD)B、dynamically expanding virtual hard disk (VHD)C、differencing disksD、pass-through disks

单选题You are changing the security settings of a file named MyData.xml.You need to preserve the existing inherited access rules.You also need to prevent the access rules from inheriting changes in the future.   Which code segment should you use?()A AB BC CD D

单选题Which CLI mode allows you to make configuration changes?()Aenable modeBconfiguration modeCoperational modeDactive mode

单选题You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()Athe Authorization Manager snap-in on Node1 and Node2Bthe Authorization Manager snap-in on the VMsCthe Network Configuration Operators local group on each VMDthe Network Configuration Operators local group on Node1 and Node2

单选题You enter configuration mode with the configure command. You need to abort the changes that you have made and start again with a fresh copy of the active configuration. Which command should you use?()Arollback 0Bload activeCreset configDclear candidate config

单选题You need to recommend a solution for managing the GPOs that supports the company's planned changes.   What should you include in the recommendation?()AGroup Policy Management Console (GPMC) and Authorization ManagerBGroup Policy Management Console (GPMC) and Microsoft SharePoint Foundation 2010CMicrosoft Desktop Optimization Pack (MDOP)DMicrosoft System Center Configuration Manager

单选题You need to recommend a solution for deploying App1. The solution must support the company’s  planned changes.   What should you include in the recommendation?()AGroup Policy Software InstallationBMicrosoft Application Virtualization (App-V)CMicrosoft Enterprise Desktop Virtualization (MED-V)DMicrosoft System Center Configuration Manager

单选题You have an existing Windows Communication Foundation (WCF) service that exposes a service contract over HTTP. You need to expose that contract over HTTP and TCP. What should you do?()AAdd a net.tcp base address to the host.BAdd an endpoint configured with a netTcpBinding.CAdd an endpoint behavior named netTcpBehavior to the existing endpoint.DAdd a binding configuration to the existing endpoint named netTcpBinding.

单选题The character mode sales report is stored on the network drive as a .REX. You need to make changes to the report layout. Using the report builder how would you change this file?()AOpen the file using the menu option file-open make the changes and recompile the report. BConvert the file into .REP file using the report compiler make the changes and convert the file back to a .REX file. CExecute the R30CONV command to convert the file to a .RDF file, make the changes and convert the file back to a .REX file. DChoose file - administration-compile. Convert the file to a .REP file, make the changes and convert the file back to a .REX file. EExecute the R30CONV command to convert the file to a .REP file, make the changes and convert the file back to a .REX file.

单选题You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.  What should you do? ()AEnable the User Account Control: Only elevate executables that are signed and validated option.BDisable the User Account Control: Only elevate executables that are signed and validated option.CConfigure the User Account Control: Behavior of the elevation prompt for standard users setting to the Prompt for credentials option.DConfigure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to the Prompt for consent option.

单选题You are designing a Windows Azure application that will execute long-running business processes.  Applying a configuration change requires role instances to recycle. You must not recycle until processing is finished.  You need to recommend an approach for applying configuration changes.  What should you recommend?()A Apply the service configuration changes to the role instance and then recycle the role instance.B Suspend each role instance and then apply the service configuration changes to the role instance.C Before a change to the service configuration is applied to the role instance, defer recycling until processing is complete.D After a change to the service configuration is applied to the role instance, defer recycling until processing is complete.

单选题You want to consolidate some of the databases onto existing SQL Server computers until additional hardware can be purchased.You need to identify which of the servers, in its current configuration, can support additional databases. You need to ensure that your solution fulfills the company’s securiy requirements while allowing for future database growth requirements. Which server and database combination can be used?()ASQL3 with the OnlineReadOnly and HR databasesBSQL4 with the TravelOnline and Storefront databasesCSQL2 with the Storefront and TravelOnline databasesDSQL2 with the Storefront and HR databases

单选题After editing to your device’s configuration, which command must you enter to activate the configuration changes?()AsetBcopy candidate activeCapply-configDcommit

单选题You are performing a test deployment of Microsoft Enterprise Desktop virtualization (MED-V) 2.0. You discover that applications deployed by using MED-V run much slower than expected. You need to recommend configuration changes to improve the performance of the MED-V workspace applications. Which configuration changes should you recommend?()ADisable cached mode in Outlook 2010BAdd exclusions to Forefront EndPoint ProtectionCAdd URL exclusions to the Forefront TMG ClientDModify the network settings in SharePoint Workspace 2010