多选题Which two statements are true about the configure exclusive command?()AIt allows users to retain all uncommitted changes when exiting exclusive configuration mode.BIt allows multiple users to edit private copies of the configuration concurrently.CIt causes the loss of all uncommitted changes when exiting exclusive configuration mode.DIt excludes other users from editing the configuration.

多选题
Which two statements are true about the configure exclusive command?()
A

It allows users to retain all uncommitted changes when exiting exclusive configuration mode.

B

It allows multiple users to edit private copies of the configuration concurrently.

C

It causes the loss of all uncommitted changes when exiting exclusive configuration mode.

D

It excludes other users from editing the configuration.


参考解析

解析: 暂无解析

相关考题:

Which configuration statement allows local non-root users access to the router only when theRADIUS server is unreachable?() A.B.C.D.

Which configuration command allows the router to utilize a RADIUS server to authenticate incoming Telnet users?() A.aaa new-modelB.aaa telnet loginC.telnet authentication loginD.authentication telnet login

You have been asked to configure a login class which will permit its users to view and edit the configuration. The class should only allow the configuration of the interfaces and firewall heirarchies. Which configuration correctly accomplishes this?()A.AB.BC.CD.D

Which two statements are true about bandwidth guarantee?()A、When congestion is present,the priority command doesn’t allow exceeding the allocated rateB、When congestion isn’t present,the priority command doesn’t allow exceeding the allocated rateC、When congestion is present,the priority command allows exceeding the allocated rateD、When congestion isn’t present,the priority command allows exceeding the allocated rate

Which two statements are true when using the configure exclusive CLI command?()A、Multiple users can enter configuration mode and have their own private configuration.B、When a user commits, only the user's changes are committed.C、A message indicates which other users are in configuration mode and what portion of the configuration they are editing.D、Only a single user can edit the configuration.

Which three statements are true regarding the candidate configuration?()A、The candidate configuration is a temporary configuration that might become the active configuration.B、A candidate configuration is initially populated with the configuration currently active on the system.C、Changes to the candidate configuration take effect immediately.D、The candidate configuration becomes the active configuration after a system reboot.E、The configure private command allows concurrent editing of a candidate configuration by multiple users.

Which configuration command allows the router to utilize a RADIUS server to auth enticate in coming Telnet users?()A、aaa new-modelB、aaa telnet loginC、telnet authentication loginD、authentication telnet login

Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configuration.B、All users have their own private candidate configuration.C、When a user commits, all nonconflicting changes made by all users are committed.D、When a user commits, only the user's own changes are committed.

Which CLI mode allows you to make configuration changes?()A、enable modeB、configuration modeC、operational modeD、active mode

Which configuration command allows the router to utilize a RADIUS server to authenticate incoming Telnet users?()A、aaa new-modelB、aaa telnet loginC、telnet authentication loginD、authentication telnet login

Which two statements apply when a user has entered private configuration mode by typing configure private? ()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all nonconflicting changes made by all users are commitedD、When a user commits, only the user's own changes are commited

Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all non conflicting changes made by all users are commitedD、When a users commits, only the user's own changes are commited

Which two statements are true about the configure exclusive command?()A、It allows users to retain all uncommitted changes when exiting exclusive configuration mode.B、It allows multiple users to edit private copies of the configuration concurrently.C、It causes the loss of all uncommitted changes when exiting exclusive configuration mode.D、It excludes other users from editing the configuration.

You Execute the Following command to create a password file in the database server: $ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’ Which two statements are true about the password file?()A、It records the usernames and passwords of users when granted the DBA role.B、It contains the usernames and passwords of users for whom auditing is enabled.C、Is used by Oracle to authenticate users for remote database administration.D、It records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.E、It supports the SYSBACKUP, SYSDG, and SYSKM system privileges.

You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A、Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B、Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C、Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D、Configure the IP properties of the portable computers so that they have an alternate configuration.

多选题Which two statements are true about the configure exclusive command?()AIt allows users to retain all uncommitted changes when exiting exclusive configuration mode.BIt allows multiple users to edit private copies of the configuration concurrently.CIt causes the loss of all uncommitted changes when exiting exclusive configuration mode.DIt excludes other users from editing the configuration.

多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configuration.BAll users have their own private candidate configuration.CWhen a user commits, all nonconflicting changes made by all users are committed.DWhen a user commits, only the user's own changes are committed.

多选题You Execute the Following command to create a password file in the database server: $ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’ Which two statements are true about the password file?()AIt records the usernames and passwords of users when granted the DBA role.BIt contains the usernames and passwords of users for whom auditing is enabled.CIs used by Oracle to authenticate users for remote database administration.DIt records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.EIt supports the SYSBACKUP, SYSDG, and SYSKM system privileges.

多选题Which two statements are true about pool-based destination NAT?()AIt also supports PAT.BPAT is not supported.CIt allows the use of an address pool.DIt requires you to configure an address in the junos-global zone.

多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configurationBAll users have their own private candidate configurationCWhen a user commits, all non conflicting changes made by all users are commitedDWhen a users commits, only the user's own changes are commited

多选题Which two statements are true about the rescue configuration file?()AIt must include a root passwordBIt is roll back file number 50, and you can recover it by issuing rollback 50CIt is created by issuing request system configuration rescue saveDIt is updated automatically when you commit

多选题Which two statements are true when using the configure exclusive CLI command?()AMultiple users can enter configuration mode and have their own private configuration.BWhen a user commits, only the user's changes are committed.CA message indicates which other users are in configuration mode and what portion of the configuration they are editing.DOnly a single user can edit the configuration.

多选题Which two statements apply when a user has entered private configuration mode by typing configure private? ()AAll users have their own active configurationBAll users have their own private candidate configurationCWhen a user commits, all nonconflicting changes made by all users are commitedDWhen a user commits, only the user's own changes are commited

多选题Which two statements are true about the rescue configuration file?()AIt gets updated automatically when you commit.BYou need to create it by issuing request system configuration rescue save.CIt is rollback file number 50 and you can recover it by issuing rollback 50.DYou can load it by entering rollback rescue.

多选题Which two statements are true regarding rescue configurations?()AOnce saved, a rescue configuration is loaded using the rollback 0 command.BThe rescue configuration must contain the minimal elements necessary to restore network connectivity.CA minimal rescue configuration is defined by default.DA rescue configuration must include a root password.

多选题Which two statements are true about bandwidth guarantee?()AWhen congestion is present,the priority command doesn’t allow exceeding the allocated rateBWhen congestion isn’t present,the priority command doesn’t allow exceeding the allocated rateCWhen congestion is present,the priority command allows exceeding the allocated rateDWhen congestion isn’t present,the priority command allows exceeding the allocated rate

多选题Which three statements are true regarding the candidate configuration?()AThe candidate configuration is a temporary configuration that might become the active configuration.BA candidate configuration is initially populated with the configuration currently active on the system.CChanges to the candidate configuration take effect immediately.DThe candidate configuration becomes the active configuration after a system reboot.EThe configure private command allows concurrent editing of a candidate configuration by multiple users.

多选题Which two statements are true about the rescue configuration file?()AIt must include a root password.BIt is rollback file number 50, and you can recover it by issuing rollback 50.CIt is created by issuing request system configuration rescue save.DIt is updated automatically when you commit.