单选题Which of the following should be included in the network diagram?()AServer room access logBServer typesCOEM contact informationDTemperature reading

单选题
Which of the following should be included in the network diagram?()
A

Server room access log

B

Server types

C

OEM contact information

D

Temperature reading


参考解析

解析: 暂无解析

相关考题:

White box testing of software testing is a test for software structurE.Which of the following item should not be included in the content of white box?A.boundary value analysisB.statement testingC.branch testingD.path testing

20 IAS 2 Inventories defines the extent to which overheads are included in the cost of inventories of finished goods.Which of the following statements about the IAS 2 requirements in this area are correct?1 Finished goods inventories may be valued on the basis of labour and materials cost only, without including overheads.2 Carriage inwards, but not carriage outwards, should be included in overheads when valuing inventories of finished goods.3 Factory management costs should be included in fixed overheads allocated to inventories of finished goods.A All three statements are correctB 1 and 2 onlyC 1 and 3 onlyD 2 and 3 only

White box testing of software testing is a test for software structure. Which of the following item should not be included in the content of white box?(75).A.boundary value analysisB.statement testingC.branch testingD.path testing

Which of the following should be used to restrict access to a wireless network?() A. Port forwardingB. Enable SSID broadcastC. Wireless encryptionD. Enable DMZ

Which of the following protocols is the LEAST secure and should be avoided on a wireless network?() A.WEPB.PEAPC.WPAD.TKIP

Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?() A. Network diagramB. Performance baselineC. Network security procedureD. Company policy

An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()A.NATB.DynamicC.SubnettingD.Static

Which of the following statements is true about the 80/20 rule (Select all that apply)?()A、20 percent of the traffic on a network segment should be local.B、no more than 20 percent of the network traffic should be able to move across a backbone.C、no more than 80 percent of the network traffic should be able to move across a backbone.D、80 percent of the traffic on a network segment should be local.

A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()A、Circuit switchingB、Network address translationC、Power over EthernetD、Virtual servers

A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()A、Frequency settings should be changedB、Additional WAPs should be installedC、Channels should be changedD、VLANs should be added

A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()A、SSIDB、WPA PassphraseC、WEP KeyD、Network Path

Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A、Network diagramB、Performance baselineC、Network security procedureD、Company policy

Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP

The warranty expiration date of each server should be recorded in which of the following documents?()A、Asset managementB、Network diagramC、Server baselineD、List of vendors

When creating a list of vendors, which of the following information should be included?()A、Vendor customer satisfaction ratingsB、OEM contact informationC、Time vendor has been in businessD、Annual spending budget with the vendor

An administrator only has one public IP address that must be shared among five employees. Which of the following network schemes should be used?() A、SNATB、SNAPC、NACD、MPLS

A user reports that they are unable to print to a remote printer. Which of the following should the technician check FIRST?()A、Printer driverB、Protocol stackC、Network connectivityD、Correct patch application

Which of the following options best justifies why a DNS server should be run in a large network system?()A、To use ftp and telnetB、To perform NFS mountsC、To make /etc/hosts files unnecessaryD、To reduce network traffic and save bandwidth

Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A、 netpmonB、 netstatC、 nfsstatD、 vmstat

Which of the following commands should be used to set network attributes on a currently running kernel?()A、 noB、 chdevC、 vmtuneD、 schedtune

单选题Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A netpmonB netstatC nfsstatD vmstat

单选题Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()AWEPBPEAPCWPADTKIP

多选题When delivering the results of a Solutions Recommendation, which two of the following components should be included in the solutions presentation?()Aadditional partner servicesBthe Value AssessmentCthe Discovery GuideDthe benefits of your solutionEemployee concerns

单选题Which of the following should an administrator do after running a command from the console onthe perimeter router?()AUpdate the configuration logsBUpdate the network wiring schematicsCUpdate the network configuration proceduresDCompare the configuration with the baseline

单选题Which of the following should be used to restrict access to a wireless network?()APort forwardingBEnable SSID broadcastCWireless encryptionDEnable DMZ

多选题Which of the following statements is true about the 80/20 rule (Select all that apply)?()A20 percent of the traffic on a network segment should be local.Bno more than 20 percent of the network traffic should be able to move across a backbone.Cno more than 80 percent of the network traffic should be able to move across a backbone.D80 percent of the traffic on a network segment should be local.

单选题Which of the following commands should be used to view and change the network filesystem tuning parameters available on the system?()A noB nfsoC vmtuneD exportfs