单选题A user downloads a 4.1 GB ISO image from a website. Which of the following media types isrequired for the user to burn the image?()ACD+RBBD-RCDVD-ROMDCD-ROM

单选题
A user downloads a 4.1 GB ISO image from a website. Which of the following media types isrequired for the user to burn the image?()
A

CD+R

B

BD-R

C

DVD-ROM

D

CD-ROM


参考解析

解析: 暂无解析

相关考题:

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?() A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob

Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?() A.REVOKE ALL PRIVILEGES FROM USER tomB.REVOKE ALL ON EMPLOYEE FROM USER tomC.REVOKE EXECUTE ON EMPLOYEE FROM USER tomD.REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. Client computers run Windows Vista and Windows 7.You need to automate the migration of user settings from client computers to the RD Session Host server.Which tool should you use?()A.Windows Easy TransferB.User State Migration Tool (USMT)C.Windows System Image Manager (Windows SIM)D.Deployment Image Servicing and Management (DISM)

A technician purchases a new 120 GB IDE hard disk to use in an old server as a swap drive. After adding the drive to the server, the technician discovers that the operating system does not detect the drive.   After rebooting the server, the technician notices the drive is missing from POST and comes to the conclusion that the BIOS needs to be updated. The technician downloads the latest version of the BIOS update from the manufacturer website.   Which action should the technician take next?()A、 backup the BIOS configuration to use laterB、 install the BIOS update from a command promptC、 create a bootable floppy and copy the BIOS update tools to the floppyD、 read the manufacturer’s guidelines and recommendations on installing the update

For an incomplete recovery, which four backup types can be used by Recovery Manager (RMAN) to restore data files? ()A、RMAN image copiesB、RMAN database backupsC、RMAN tablespace backupsD、user­managed backups placed in the flash recovery areaE、user­managed backups that have been cataloged with RMANF、user­managed data file backups for which the full path name is specified

A user reports that they are unable to reach a particular website. The user had no issues reaching the site earlier in the day. Which of the following is the MOST likely cause of the lack of access?()A、The VLAN is misconfiguredB、The user has an improperly configured NICC、The DHCP server is downD、The DNS server is down

A user downloads a 4.1 GB ISO image from a website. Which of the following media types isrequired for the user to burn the image?()A、CD+RB、BD-RC、DVD-ROMD、CD-ROM

A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()A、Allow the user to continue workingB、Check for virusesC、Re-image the hard driveD、Document time/date for later referenceE、Prevent users from accessing the PCF、Turn off PC

Which of the following commands is used to restore the VIO server from a backup image?()A、ddB、tarC、restoreD、installios

Which installation method enables the quickest recovery in the event of failure when upgrading from AIX 5.3 to AIX 6.1?()A、Use alt_disk_install.B、Apply the upgrade without commit.C、Use a backup image from a NIM server.D、Use a mksysb image from a locally attached DVD-RAM.

Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()A、REVOKE ADD, DELETE FROM USER tom ON TABLE tab1B、REVOKE ADD, DELETE ON TABLE tab1 FROM USER tomC、REVOKE INSERT, DELETE FROM USER tom ON TABLE tab1D、REVOKE INSERT, DELETE ON TABLE tab1 FROM USER tom

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

Which of the following statements allows USER1 to take away read access on the table ORG.TAB1 from USER2?()A、REVOKE SELECT FROM user2 ON TABLE org.tab1B、REVOKE SELECT ON TABLE org.tab1 FROM user2C、REVOKE READ ACCESS FROM user2 ON TABLE org.tab1D、REVOKE READ ACCESS ON TABLE org.tab1 FROM user2

An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB

Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()A、REVOKE ALL PRIVILEGES FROM USER tomB、REVOKE ALL ON EMPLOYEE FROM USER tomC、REVOKE EXECUTE ON EMPLOYEE FROM USER tomD、REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

A user reports a corrupted boot logical volume. In order to recreate the contents of the boot logical volume which of the following procedures should the user be advised to perform?()A、Reboot the system in normal mode.B、Use the bosboot command to rebuild the boot image.C、Restore the boot logical volume from a mksysb image.D、Reboot the system into maintenance mode and run fsck on the boot logical volume.

You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()A、user nameB、password lengthC、certificateD、Host Checker

You want to perform a backup of your database to tape. Which backup format can you use?()A、backup set onlyB、image copy onlyC、only user-managed backupD、both image copy and backup setE、only incremental image copy backup

You are designing a Windows 7 deployment image.   You receive a baseline image over the network, from a different geographic location.   You need to verify that the baseline image is valid.   Which tool should you use?()A、ImageXB、Windows Compatibility EvaluatorC、Windows System Image Manager (Windows SIM)D、the Deployment Image Servicing and Management (DISM) tool

Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. Client computers run Windows Vista and Windows 7. You need to automate the migration of user settings from client computers to the RD Session Host server. Which tool should you use?()A、Windows Easy TransferB、User State Migration Tool (USMT)C、Windows System Image Manager (Windows SIM)D、Deployment Image Servicing and Management (DISM)

单选题You want to perform a backup of your database to tape. Which backup format can you use?()Abackup set onlyBimage copy onlyConly user-managed backupDboth image copy and backup setEonly incremental image copy backup

单选题Which result is of securing the Cisco IOS image by use of the Cisco IOS image resilience feature?()AThe Cisco IOS image file will not be visible in the output from the show flash command.BThe show version command will not show the Cisco IOS image file location.CWhen the router boots up, the Cisco IOS image will be loaded from a secured FTP location.DThe running Cisco IOS image will be encrypted and then automatically backed up to a TFTP server.

单选题A technician purchases a new 120 GB IDE hard disk to use in an old server as a swap drive. After adding the drive to the server, the technician discovers that the operating system does not detect the drive.   After rebooting the server, the technician notices the drive is missing from POST and comes to the conclusion that the BIOS needs to be updated. The technician downloads the latest version of the BIOS update from the manufacturer website.   Which action should the technician take next?()A backup the BIOS configuration to use laterB install the BIOS update from a command promptC create a bootable floppy and copy the BIOS update tools to the floppyD read the manufacturer’s guidelines and recommendations on installing the update

多选题A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()AAllow the user to continue workingBCheck for virusesCRe-image the hard driveDDocument time/date for later referenceEPrevent users from accessing the PCFTurn off PC

单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()AAs the root user from serverA run the command rhost serverBBAs the root user from serverA run the command rlogin serverBCAs the desired user from serverB run the command rhost serverADAs the desired user from serverA run the command rlogin serverB

单选题A user reports that they are unable to reach a particular website. The user had no issues reaching the site earlier in the day. Which of the following is the MOST likely cause of the lack of access?()AThe VLAN is misconfiguredBThe user has an improperly configured NICCThe DHCP server is downDThe DNS server is down

单选题A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()APhishingBSmurf attackCDenial of serviceDMan-in-the-middle