多选题Which two of the following options are categories of Network Maintenance tasks?()AFirefightingBInterrupt-drivenCPolicy-basedDStructuredEFoundational

多选题
Which two of the following options are categories of Network Maintenance tasks?()
A

Firefighting

B

Interrupt-driven

C

Policy-based

D

Structured

E

Foundational


参考解析

解析: 暂无解析

相关考题:

If you want to test if fragmentation is causing problems on the network, which two ping command options are useful?() A. ttlB. sizeC. rapidD. do-not-fragment

Which of the following statements describe the network shown in the graphic?() A. There are two broadcast domains in the network.B. There are four broadcast domains in the network.C. There are six broadcast domains in the network.D. There are four collision domains in the network.E. There are five collision domains in the network.F. There are seven collision domains in the network.

For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()A、secure network platformB、secure connectivityC、threat control and containmentD、policy management

Which two of the following options are categories of Network Maintenance tasks?()A、FirefightingB、Interrupt-drivenC、Policy-basedD、StructuredE、Foundational

Router R1 sits at an Enterprise branch office, using both the Internet and a leased line to another Enterprise router for its two connectivity options back into the rest of the Enterprise network. The engineer planning for this branch decided to use the leased line for all Enterprise traffic, unless it fails, in which case the Internet connection should be used to pass traffic to the Enterprise. Which of the following is most likely to be useful on the branch router?()A、IPsec tunnelB、GRE tunnelC、Floating stati c routeD、An IGP

A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network.  Which of the following options is the most probable cause?()A、A large FTP job is in process. B、A network interface was misconfigured. C、The ping command is being used excessively. D、A bad network interface card and/or network cable is in use.

An administrator has provided a 24 bit netmask.  Which of the following options indicates the number of host addresses that are available in a network?()A、24B、126C、128D、254

Which are the two options to which a menu can be assigned?() (Choose two.)A、menuB、functionsC、data groupD、responsibilityE、functional group

Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack

Which of the following network topologies BEST describes a VPN? ()(Select TWO)A、Point to PointB、Point to MultipointC、VLAND、RingE、Bus

Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A、tracertB、netstatC、nslookupD、ping

Which of the following options best justifies why a DNS server should be run in a large network system?()A、To use ftp and telnetB、To perform NFS mountsC、To make /etc/hosts files unnecessaryD、To reduce network traffic and save bandwidth

A DNS server for a large network is experiencing performance problems.  Which of the following options is the best solution to fix the problem?()A、Enable NISB、Purchase a larger serverC、Use /etc/hosts on all of the systemsD、Create secondary name servers throughout the network

To change the read sizes on a V3 network file system server, which of the following options would need to be set?()A、rsizeB、nfs_max_read_sizeC、nfs_server_clreadD、nfs_rfc1323

Which of the following allows the user to have two separate Ethernet networks share the same network adapter?()A、VLAN tagsB、EtherChannelC、Virtual EthernetD、Shared Ethernet Adapter

If you want to test if fragmentation is causing problems on the network, which two ping command options are useful?()A、ttlB、sizeC、rapidD、do-not-fragment

A class B network 129.35 has 10 subnets. Which of the following options is the correct subnet mask?()A、255.255.128.0 (11111111.11111111.10000000.00000000)B、255.255.192.0 (11111111.11111111.11000000.00000000)C、255.255.224.0 (11111111.11111111.11100000.00000000)D、255.255.240.0 (11111111.11111111.11110000.00000000)

An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).A、TACACS+B、RADIUSC、KerberosD、802.1XE、RRAS

单选题To change the read sizes on a V3 network file system server, which of the following options would need to be set?()ArsizeBnfs_max_read_sizeCnfs_server_clreadDnfs_rfc1323

单选题An administrator has provided a 24 bit netmask.  Which of the following options indicates the number of host addresses that are available in a network?()A24B126C128D254

多选题Which are the two options to which a menu can be assigned?() (Choose two.)AmenuBfunctionsCdata groupDresponsibilityEfunctional group

单选题Which of the following items is not one of the grammatical categories of English pronouns? _____AgenderBnumberCcaseDvoice

多选题The following terms describe various design options for Enterprise connectivity to the Internet.Which of the follow ing imply that the Enterprise connects to two or more ISPs?()ASingle HomedBDual HomedCSingle MultihomedDDual Multihomed

多选题Which of the following network topologies BEST describes a VPN? ()(Select TWO)APoint to PointBPoint to MultipointCVLANDRingEBus

单选题A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network.  Which of the following options is the most probable cause?()AA large FTP job is in process. BA network interface was misconfigured. CThe ping command is being used excessively. DA bad network interface card and/or network cable is in use.

单选题Which of the following options best justifies why a DNS server should be run in a large network system?()ATo use ftp and telnetBTo perform NFS mountsCTo make /etc/hosts files unnecessaryDTo reduce network traffic and save bandwidth

多选题An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).ATACACS+BRADIUSCKerberosD802.1XERRAS