单选题Which option is correct to configure the maximum transmit packet size of a Fast Ethernet interface?()Aset interfaces fe-0/0/0 unit 0 ethernet-options mtu 1200Bset interfaces fe-0/0/0 mtu 1200Cset interfaces fe-0/0/0 unit 0 mtu 1200Dset interfaces fe-0/0/0.0 mtu 1200

单选题
Which option is correct to configure the maximum transmit packet size of a Fast Ethernet interface?()
A

set interfaces fe-0/0/0 unit 0 ethernet-options mtu 1200

B

set interfaces fe-0/0/0 mtu 1200

C

set interfaces fe-0/0/0 unit 0 mtu 1200

D

set interfaces fe-0/0/0.0 mtu 1200


参考解析

解析: 暂无解析

相关考题:

● Your team has prepared a CPM schedule for your review. You notice that one node has six inputs (including two dummy activities) and four outputs (which include one dummy activity). Select the correct statement from the following:A This is a valid representation if the logic is correct.B This is invalid because a node can have a maximum of one dummy input representation if the logic is correct.C This is invalid because nodes cannot have both dummy inputs and dummy outputs.D This is a invalid because the number of outputs must equal the number of inputs.E This is invalid because a maximum of two inputs and two outputs are allowed using the critical path method.

Which two statements about the track configuration option are correct?() A. The track option monitors interfaces as defined by the user.B. The track option monitors all interfaces participating in VRRP.C. The track option allows for a reduction of the priority value if the monitored interface goes down.D. The track option causes syslog entries to be written in the messages log file, if the monitored interface goes down.

Which utility is used to restrict the number of addresses assigned to subscribers on a Bridged 1483 interface?() A. proxy DHCPB. RADIUS VSAC. DHCP option 82D. maximum sessions

Which of the following statements is mot correct about mirroring?() A.Mirroring, with the write-verify option turned on, can be used to increase performance.B.Mirroring is a better choice that disk-striping, for large sequential-access file system when one is looking for performance.C.Mirroring, with a parallel-scheduling policy, may improve I/O read-operation performance.D.Mirroring, with maximum inter-disk allocation policy, is used to enhance availability.

The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems (Choose two.)()。 A.Configure the gateway on Host A as 10.1.1.1B.Configure the gateway on Host B as 10.1.2.254C.Configure the IP address of Host A as 10.1.2.2D.Configure the IP address of Host B as 10.1.2.2E.Configure the masks on both hosts to be 255.255.255.224F.Configure the masks on both hosts to be 255.255.255.240

Which three flow-control port states lead to enabled link flow control? ()A、 Receive port: Enabled, Transmit port: EnabledB、 Receive port: Enabled, Transmit port: DesiredC、 Receive port: Enabled, Transmit port: DisabledD、 Receive port: Disabled, Transmit port: DesiredE、 Receive port: Desired, Transmit port: Desired

Which option correctly identifies the four main menus of a Cisco Wireless Control System (WCS)? ()A、 Home, Configure, Location, and MonitorB、 Home, Configure, Monitor, and RefreshC、 Home, Monitor, Refresh, and AdministrationD、 Monitor, Configure, Location, and AdministrationE、 Monitor, Configure, Refresh, and AdministrationF、 Monitor, Location, Refresh, and Administration

As the network technician at Company, you need to configure DHCP snooping on a new switch.   Which three steps are required? ()A、 Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.B、 Configure DHCP snooping globally.C、 Configure the switch as a DHCP server.D、 Configure DHCP snooping on an interface.E、 Configure all interfaces as DHCP snooping trusted interfaces.F、 Configure DHCP snooping on a VLAN or range of VLANs.

A client is configuring an x3650 M3. Once the system is in production, they need to able to remotely view and make changes to the UEFI interface. Which of the following is the correct way to configure this?()A、Configure the RSA with an IP addressB、Configure the BMC with an IP addressC、Configure the AMM with an IP addressD、Configure the IMM with an IP address

Which utility is used to restrict the number of addresses assigned to subscribers on a Bridged 1483 interface?()A、proxy DHCPB、RADIUS VSAC、DHCP option 82D、maximum sessions

Which of the following statements is correct regarding a hybridcrypto system?()A、 uses symmetric crypto for keys distributionB、 uses symmetric crypto for proof of originC、 uses symmetric crypto for fast encrypted/decryptionD、 uses asymmetric crypto for message confidentialityE、 uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session

When surveying for VoWLAN, which power level should you base the access point coverage designon?()A、40mW maximum transmit powerB、average power level of the VoWLAN clientsC、100mW transmit powerD、lowest power level of the VoWLAN clients

What is the correct fastpath to configure or add a TTY Terminal (directly from the screen), which connects to a serial port?()A、smitty ttyB、smitty devicesC、smitty ptyD、smitty dev

Which of the following statements is mot correct about mirroring?()A、Mirroring, with the write-verify option turned on, can be used to increase performance.B、Mirroring is a better choice that disk-striping, for large sequential-access file system when one is looking for performance.C、Mirroring, with a parallel-scheduling policy, may improve I/O read-operation performance.D、Mirroring, with maximum inter-disk allocation policy, is used to enhance availability.

Which two statements about the track configuration option are correct?()A、The track option monitors interfaces as defined by the user.B、The track option monitors all interfaces participating in VRRP.C、The track option allows for a reduction of the priority value if the monitored interface goes down.D、The track option causes syslog entries to be written in the messages log file, if the monitored interface goes down.

Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A、the log option for the particular SCREEN optionB、the permit option for the particular SCREEN optionC、the SCREEN option, because it does not drop traffic by defaultD、the alarm-without-drop option for the particular SCREEN option

You deploy mobile devices that run Microsoft Windows Mobile 5.0 Pocket PC Phone Edition.   You need to prevent the device screen from turning dark when users view documents.   Which two actions should you perform?()A、Configure the backlight brightness setting to maximum.B、Display the soft input panel (SIP) when users read documents.C、Increase the value of the Turn off device if not used for option.D、Increase the value of the Turn off backlight if device is not used for option.

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.  Which two actions should you perform?()A、Right-click and click the Diagnose option in the Connect to a network window.B、Set the security type value to No authentication in the wireless network properties dialog box.C、Click the Manually connect to a wireless network option in the Set up a connection or network window.D、In the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.E、Configure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.

Terminal Services application runs on the server. Users report that the application stops responding. You monitor the memory usage on the server for a week. You discover that the application has a memory leak. A patch is not currently available.  You create a new resource-allocation policy in Microsoft Windows Server Resource Manager. You configure a Process Matching Criteria named TrackShip and select the application.  You need to terminate the application when the application consumes more than half of the available memory on the server. What should you do?()A、Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Profiling Policy.B、Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Managing Policy.C、Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Profiling Policy.D、Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Managing Policy.

多选题Which two statements about the track configuration option are correct?()AThe track option monitors interfaces as defined by the user.BThe track option monitors all interfaces participating in VRRP.CThe track option allows for a reduction of the priority value if the monitored interface goes down.DThe track option causes syslog entries to be written in the messages log file, if the monitored interface goes down.

单选题When surveying for VoWLAN, which power level should you base the access point coverage designon?()A40mW maximum transmit powerBaverage power level of the VoWLAN clientsC100mW transmit powerDlowest power level of the VoWLAN clients

单选题Which option correctly identifies the four main menus of a Cisco Wireless Control System (WCS)? ()A Home, Configure, Location, and MonitorB Home, Configure, Monitor, and RefreshC Home, Monitor, Refresh, and AdministrationD Monitor, Configure, Location, and AdministrationE Monitor, Configure, Refresh, and AdministrationF Monitor, Location, Refresh, and Administration

单选题Which of the following statements is correct regarding a hybridcrypto system?()A uses symmetric crypto for keys distributionB uses symmetric crypto for proof of originC uses symmetric crypto for fast encrypted/decryptionD uses asymmetric crypto for message confidentialityE uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session

单选题What is the correct procedure for adding an access point in WCS?()AChoose Configure Access_Point, then enter the AP MAC addressBChoose Configure Access_Point, then enter the IP address of the APCWait until the WLC downloads its code from the WCS and choose the access point from the list under the WLC option of the Configure menuDWait until the AP downloads its code from the WCS and choose the access point from the list under the Access_Point option of the Configure menu

单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()Athe log option for the particular SCREEN optionBthe permit option for the particular SCREEN optionCthe SCREEN option, because it does not drop traffic by defaultDthe alarm-without-drop option for the particular SCREEN option

多选题Which three flow-control port states lead to enabled link flow control? ()AReceive port: Enabled, Transmit port: EnabledBReceive port: Enabled, Transmit port: DesiredCReceive port: Enabled, Transmit port: DisabledDReceive port: Disabled, Transmit port: DesiredEReceive port: Desired, Transmit port: Desired

单选题You must configure a SCREEN option that would protect your device from a session table flood.Which configuration meets this requirement?()A AB BC CD D