单选题Which mode is used to allow only a single person to edit a configuration?()Aconfigure batchBconfigure privateCconfigure exclusiveDconfigure dynamic

单选题
Which mode is used to allow only a single person to edit a configuration?()
A

configure batch

B

configure private

C

configure exclusive

D

configure dynamic


参考解析

解析: 暂无解析

相关考题:

Which configuration command dynamically detects and configures a PPPoA interface?() A.auto-configure ipB.auto-configure pppC.auto-configure pppoeD.auto-configure bridgedethernet

Which two steps are needed when configuring multiple RPs using MSDP within a single PIM domain? () A. Configure a non-unique address on the loopback interface for use by the PIM RP.B. Configure MSDP with the unique address (router ID) as the local address of the peer.C. Configure MSDP with the non-unique address (router ID) as the local address of the peer.D. Configure a unique address on the loopback interface, used as the PIM RP.

Which configuration command dynamically detects and configures a Bridged 1483 interface?() A.auto-configure ipB.auto-configure pppC.auto-configure pppoeD.auto-configure bridgedethernet

Which mode is used to allow only a single person to edit a configuration?() A. configure batchB. configure privateC. configure exclusiveD. configure dynamic

You have been asked to configure a login class which will permit its users to view and edit the configuration. The class should only allow the configuration of the interfaces and firewall heirarchies. Which configuration correctly accomplishes this?()A.AB.BC.CD.D

Refer to the network of Layer 3 switches in the exhibit. The RPI Multi cast Server only multicasts to hosts connected to multilayer switches 5 and 6. The CMU Multicast Server multicasts to hosts on multilayer switches 1 - 6. Given the number of configuration steps involved, what is the most efficient way to configure the net work while meeting the requirements for multicast data flow? ()A. Configure each switch with PIM sparse mode and a separate instance of PIM dense mode.Specify switch 1 as the root for the RPI Multicast Server. Specify switch 2 as the root for the CMU Multicast Server.B. Configure each switch with PIM sparse mode and a separate instance of PIM dense mode. Leave each multicast server as the root of its own multicast tree.C. Configure each switch with PIM sparse - dense mode. Configure switch 3 as a ren dezvous point for the RPI multicast stream.D. Configure each switch with PIM sparse mode and a separate instance of PIM dense mode.Allow the switches to elect their own root for each multicast tree.E. Configure each switch with PIM sparse mode.F. Configure each switch with PIM dense mode.

Assuming the default switch configuration,which approach should you use to configure the extended vlan range(1006 through 4094) on a cisco catalyst 3750 series switch?() A. Configure the switch to be in VTP client mode.B. Configure the switch to be in VTP domaint mode.C. Configure the switch to be in VTP transparent mode.D. Configure the switch to be in VTPv2.

Which interface is used to configure debug parameters for log files?()A、Datastore Control Center  B、Alarm and Trace Configuration  C、Custom File Configuration  D、Control Center

Assuming the default switch configuration,which approach should you use to configure the extended vlan range(1006 through 4094) on a cisco catalyst 3750 series switch?()A、Configure the switch to be in VTP client mode.B、Configure the switch to be in VTP domaint mode.C、Configure the switch to be in VTP transparent mode.D、Configure the switch to be in VTPv2.

When configuring private VLANs, which configuration task must you do first?()A、Configure the private VLAN port parameters.B、Configure and map the secondary VLAN to the primary VLAN.C、Disable IGMP snooping.D、Set the VTP mode to transparent.

Which two statements are true when using the configure exclusive CLI command?()A、Multiple users can enter configuration mode and have their own private configuration.B、When a user commits, only the user's changes are committed.C、A message indicates which other users are in configuration mode and what portion of the configuration they are editing.D、Only a single user can edit the configuration.

You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()A、Configure a DNS suffix.B、Configure a subnet mask.C、Configure an LMHOSTS file.D、Configure an Interface metric.E、Configure at least one DNS address.

Which two steps are needed when configuring multiple RPs using MSDP within a single PIM domain? ()A、Configure a non-unique address on the loopback interface for use by the PIM RP.B、Configure MSDP with the unique address (router ID) as the local address of the peer.C、Configure MSDP with the non-unique address (router ID) as the local address of the peer.D、Configure a unique address on the loopback interface, used as the PIM RP.

Which mode is used to allow only a single person to edit a configuration?()A、configure batchB、configure privateC、configure exclusiveD、configure dynamic

Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()A、Configure a dynamic routing protocol.B、Configure SVI interfaces with IP addresses and subnet masks.C、Configure switch ports with network addresses.D、Configure switch ports with the autostate exclude command.E、Document the MAC addresses of the switch ports.

Which of the following commands will restore a previously archived configuration by replacing therunning configuration with the archived configuration?()A、configure archive running-configB、configure replaceC、copy archive running configD、copy startup-config running-configE、copy tftp running-configF、configure tftp running-config

Which two statements are true about the configure exclusive command?()A、It allows users to retain all uncommitted changes when exiting exclusive configuration mode.B、It allows multiple users to edit private copies of the configuration concurrently.C、It causes the loss of all uncommitted changes when exiting exclusive configuration mode.D、It excludes other users from editing the configuration.

In which mode are users allowed to configure the device, including interfaces, protocols, user access, and system hardware properties?()A、priviledged modeB、configuration modeC、monitoring modeD、operational mode

You are managing an Oracle Database 11g database. You want to ensure the recovery of the database to thepoint of failure. Which configuration will you do to accomplish the task()A、Multiplex all database files.B、Configure the Flash Recovery Area.C、Configure the database instance for ARCHIVELOG mode.D、Configure the FAST_START_MTTR_TARGET initialization parameter

You are managing an Oracle Database 11g database. You want to ensure the recovery of thedatabase to the point of failure.  Which configuration will you do to accomplish the task()A、Multiplex all database filesB、Configure the Flash Recovery Area.C、Configure the database instance for ARCHIVELOG mode.D、Configure the FAST_START_MTTR_TARGET initialization parameter.

You are designing a name resolution strategy for the retail outlets to ensure that the existing bandwidth is used efficiently.  Which three actions should you perform?()A、 Configure the DNS server service on the terminal servers as caching-only servers.B、 Configure multiple sites to have site links and set up a specific replication schedule.C、 Configure the default site to have the subnets of Atlanta and the branch offices.D、 Create a new DNS zone and configure zone transfers to name servers only.E、 Create an application partition to be used for DNSF、 Specify the scope of replication to be used for DNS

单选题Which set of commands allows PPPoE dynamic interfaces to use a profile called config-info?()Aprofile config-info auto-configure pppBprofile config-info auto-configure anyCprofile ppp config-info auto-configure pppoeDprofile pppoe config-info auto-configure pppoe

单选题Which interface is used to configure debug parameters for log files?()ADatastore Control Center  BAlarm and Trace Configuration  CCustom File Configuration  DControl Center

单选题Which tool or interface is used to configure debug parameters for log files?()Alicense informationBAlarm and Trace Configuration CCRS Installer DControl Center

单选题Which configuration command dynamically detects and configures a PPPoA interface?()Aauto-configure ipBauto-configure pppCauto-configure pppoeDauto-configure bridgedethernet

多选题Which two statements are true when using the configure exclusive CLI command?()AMultiple users can enter configuration mode and have their own private configuration.BWhen a user commits, only the user's changes are committed.CA message indicates which other users are in configuration mode and what portion of the configuration they are editing.DOnly a single user can edit the configuration.

单选题Which configuration command dynamically detects and configures a Bridged 1483 interface?()Aauto-configure ipBauto-configure pppCauto-configure pppoeDauto-configure bridgedethernet