单选题As an experienced technician, you are required to configure and verify SRM with SSO redundancy. In such a situation, you have to issue several commands in proper orders. Which of the following is correct?()Ashow redundancy states, redundancy, mode ssoBshow redundancy states, mode sso, redundancyCredundancy, mode sso, show redundancy statesDmode sso, redundancy, show redundancy states

单选题
As an experienced technician, you are required to configure and verify SRM with SSO redundancy. In such a situation, you have to issue several commands in proper orders. Which of the following is correct?()
A

show redundancy states, redundancy, mode sso

B

show redundancy states, mode sso, redundancy

C

redundancy, mode sso, show redundancy states

D

mode sso, redundancy, show redundancy states


参考解析

解析: 暂无解析

相关考题:

A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A. service Authentication ManagerB. service AuthorizationC. service CredentialsD. service Security Audit

As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you which Cisco VPN Acceleration Module for Cisco 7200 Series routers and the Cisco 7301 provides high-performance encryption/compression and supports the latest encryption standard.Which of the following will answer his question?()A. AESB. Cisco IPSC. Cisco Network AssistantD. Cisco VAM2+

As an experienced technician, you are required to configure and verify SRM with SSO redundancy. In such a situation, you have to issue several commands in proper orders. Which of the following is correct?()A. show redundancy states, redundancy, mode ssoB. show redundancy states, mode sso, redundancyC. redundancy, mode sso, show redundancy statesD. mode sso, redundancy, show redundancy states

HSRP. Known as Hot Stanclby Router Protocol, is a Cisco proprietarv redundancy protocol . As an experienced network administrator, you are required to configure HSRP on a XYZ network.Which TWO of the following wii be available and shared between the routers configured with HSRP? ()(Choose two.)A. a shared single interfaceB. the ability to track serial interfacesC. UDP-based hello packetsD. the impact of flapping links if timers are too low

As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()A.19dbmB.10dbmC.67dbmD.86dbm

You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()A、 Only use fiber in pairs.B、 Configure root guard on your switches.C、 Do not use fiber but use copper.D、 Configure UDLD to prevent one-way link conditions.

HSRP. Known as Hot Stanclby Router Protocol, is a Cisco proprietarv redundancy protocol . As an experienced network administrator, you are required to configure HSRP on a XYZ network. Which TWO of the following wii be available and shared between the routers configured with HSRP? ()(Choose two.)A、a shared single interfaceB、the ability to track serial interfacesC、UDP-based hello packetsD、the impact of flapping links if timers are too low

As the network technician at Company, you need to configure DHCP snooping on a new switch.   Which three steps are required? ()A、 Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.B、 Configure DHCP snooping globally.C、 Configure the switch as a DHCP server.D、 Configure DHCP snooping on an interface.E、 Configure all interfaces as DHCP snooping trusted interfaces.F、 Configure DHCP snooping on a VLAN or range of VLANs.

An application accesses a small lookup table frequently. You notice that the required data blocks are getting aged out of the default buffer cache. How would you guarantee that the blocks for the table never age out?()A、Configure the KEEP buffer pool and alter the table with the corresponding storage clause.B、Increase the database buffer cache size.C、Configure the RECYCLE buffer pool and alter the table with the corresponding storage clause.D、Configure Automata Shared Memory Management.E、Configure Automatic Memory Management

As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()A、Perform a network audit.B、Form an impression about the network.C、Use traffic analysis to augment organizational input.D、Prepare and add to the network description.

As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you how to create separate networks on one Storage Area Network so as to provide enhanced availability, security, etc. Which of the following solution will enable that?()A、Cisco Direct Attached StorageB、Cisco Virtual Attached Storage NetworkC、Cisco Virtual Storage Area NetworkD、Cisco Direct Storage Area Network

As an experienced technician, you are responsible for infrastructure design and globalconfiguration changes. You are asked to deploy a Voice over Wireless LAN for your company. Ifthe cells have the same channel, the separation between them should be()A、 19dbmB、 10dbmC、 67dbmD、 86dbm

As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A、 inline with a firewallB、 in a DMZ outside the firewallC、 parallel with a firewallD、 in a DMZ behind the firewall

You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B、 CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;

You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()A、Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsB、On all computers in the domain, configure the Local Security Policy7 with the required account policy settingsC、Configure the Default Domain Policy GPO with the required account policy settingsD、Configure the Default Domain Controllers Policy GPO with the required account policy settings

You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets thefollowing requirements. Sends an e-mail notification when an application error is logged in the event log  Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 Minimizes the administrative effort required to monitor applications. What should you do?()A、On all the computers, configure a custom view. Configure a custom task for the application error events.B、On a computer, configure a custom view to display the application errors. Configure a custom task forthe application error events.C、On a central computer, configure an event subscription. On all of the computers, configure a customtask in the Forwarded Events log.D、On all the computers, configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.

A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A、service Authentication ManagerB、service AuthorizationC、service CredentialsD、service Security Audit

单选题You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;

单选题You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()ACreate a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsBOn all computers in the domain, configure the Local Security Policy7 with the required account policy settingsCConfigure the Default Domain Policy GPO with the required account policy settingsDConfigure the Default Domain Controllers Policy GPO with the required account policy settings

单选题As an experienced technician, you are responsible for infrastructure design and globalconfiguration changes. You are asked to deploy a Voice over Wireless LAN for your company. Ifthe cells have the same channel, the separation between them should be()A 19dbmB 10dbmC 67dbmD 86dbm

单选题You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()A Only use fiber in pairs.B Configure root guard on your switches.C Do not use fiber but use copper.D Configure UDLD to prevent one-way link conditions.

单选题As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()Ainline with a firewallBin a DMZ outside the firewallCparallel with a firewallDin a DMZ behind the firewall

单选题After a technician installs a video card, which of the following should the technician configure NEXT?()AResolutionBColorsCDots per inchDRefresh rate

多选题As the network technician at Company, you need to configure DHCP snooping on a new switch.   Which three steps are required? ()AConfigure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.BConfigure DHCP snooping globally.CConfigure the switch as a DHCP server.DConfigure DHCP snooping on an interface.EConfigure all interfaces as DHCP snooping trusted interfaces.FConfigure DHCP snooping on a VLAN or range of VLANs.

多选题HSRP. Known as Hot Stanclby Router Protocol, is a Cisco proprietarv redundancy protocol . As an experienced network administrator, you are required to configure HSRP on a XYZ network. Which TWO of the following wii be available and shared between the routers configured with HSRP? ()(Choose two.)Aa shared single interfaceBthe ability to track serial interfacesCUDP-based hello packetsDthe impact of flapping links if timers are too low

单选题As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A inline with a firewallB in a DMZ outside the firewallC parallel with a firewallD in a DMZ behind the firewall

多选题You are maintaining a database that is in ARCHIVELOG mode. You have configured the flash recovery area in your database. The database is in MOUNT EXCLUSIVE mode, and you want to configure the Flashback Database feature. Which two options are NOT required to configure the Flashback Database feature? ()AOpen the database in read-only mode.BSet the retention target with the DB_FLASHBACK_RETENTION_TARGET initialization parameter.CEnable the block change tracking feature.DExecute the ALTER DATABASE FLASHBACK ON statement.