单选题What must you type to enter operational mode from the root@% command prompt?()AexitBconfigureCeditDcli
单选题
What must you type to enter operational mode from the root@% command prompt?()
A
exit
B
configure
C
edit
D
cli
参考解析
解析:
暂无解析
相关考题:
You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration.What should you do next?()A. Use the transport security mode and specify None for transport client credential type.B. Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C. Use the message security mode and specify Basic for the transport client credential type.D. Use the transportWithMessageCredential security mode and specify None for the transport client credential type.
During a password recovery, what is the next step after configuring the system to boot into single- user mode?() A. Reset the root password.B. Press the space bar.C. Type recovery.D. Press the Enter key.
What must you type to enter operational mode from the root@% command prompt?() A. exitB. configureC. editD. cli
You want to log into the router and make a configuration change.After loggin in as the root user, what is the next command you must enter?() A. enableB. configureC. editD. cli
You are a senior network administrator at TestKing, and while performing thepassword recovery procedure on your 2500 series Cisco router, you type in thefollowing command:o/r 0x2142What is the purpose of this command?()A、It is used to restart the router.B、It is used to bypass the configuration in NVRAM.C、It is used to enter ROM Monitor mode.D、It is used to view the lost password.E、It is used to save the changes to the configuration.
You have configured a Cisco Catalyst switch to perform Layer 3 routing via an SVI and have assigned that interface to VLAN 20. To check the status of the SVI, you issue the show interfaces vlan 20 command at the CLI prompt. You see from the output display that the interface is in an "up/up" state. What must be true in an SVI configuration to bring the VLAN and line protocol up?()A、The port must be physically connected to another Layer 3 device.B、At least one port in VLAN 20 must be active.C、The Layer 3 routing protocol must be operational and receiving routing updates from neighboring peer devices.D、Because this is a virtual interface, the operational status will always be in an "up/up" state.
After logging into a router, you type in "enable" and then enter the correct password when prompted. What is the current router prompt symbol at this point?()A、B、#C、?D、*E、All of the aboveF、None of the above
Which statement is true regarding the password-recovery process?()A、You must have a console connectionB、You cannot set the console port to an insecure modeC、You must press the Enter key so that you can boot into single-user modeD、When prompted to enter the full pah name of the shell you must press the Enter key
You have a portable computer that runs Windows 7. You configure the computer to enter sleep mode after10 minutes of inactivity. You do not use the computer for 15 minutes and discover that the computer has notentered sleep mode. You need to identify what is preventing the computer from entering sleep mode. What should you do?()A、At a command prompt, run Powercfg energy.B、At a command prompt, run Systeminfo /s localhost.C、From Performance Monitor, review the System Summary.D、From Performance Information and Tools, review the detailed performance and system information.
During a password recovery, what is the next step after configuring the system to boot into single- user mode?()A、Reset the root password.B、Press the space bar.C、Type recovery.D、Press the "Enter" key.
Which statement is true regarding the password-recovery process?()A、You must have a console connection.B、You cannot set the console port to an insecure mode.C、You must press the Enter key so that you can boot into single-user mode.D、When prompted to enter the full pathname of the shell, you must press the Enter key.
Which CLI mode allows you to make configuration changes?()A、enable modeB、configuration modeC、operational modeD、active mode
You have just installed a new web server on the Testking network. You are required to ensure that the web server is accessible from the Internet. The network uses private addressing, so an IP-to-registered address mapping is required.To do this, you enter the following command:TestKing(config)# ip nat inside source static 192.168.2.1 198.18.1.254 You unsuccessfully try to ping the Internet from a PC host on the LAN. During the troubleshooting process, you enter the "show ip nat translations" command but the output is blank. What is the most likely cause of the problem?()A、The keyword overload is missing from the command.B、The NAT pool must be defined first.C、An access list must be defined to create static NAT translations.D、The interfaces must be configured for NAT.E、None of the above
During a password recovery, what is the next step after configuring the system to boot into single-user mode?()A、Reset the root passwordB、Press the space barC、Type recoveryD、Press the "Enter" key
You have a portable computer that runs Windows XP Professional. The computer supports Advanced Configuration and Power Interface (ACPI). You need to ensure that the computer enters Sleep Mode when you close the lid of the computer. What should you do?() A、From Control Panel, configure the Power Options. B、From the System properties, configure the Data Execution Prevention settings. C、From the Services console, set the Startup type for the Human Interface Devices service to Manual.D、From the Services console, set the Startup type for the Uninterruptable Power Supply service to Manual.
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution. What actions must you take to stop a user named Mia Hamm from removing information from her mailbox?()A、You must use log transactions.B、You must use a legal hold.C、You must use Outlook Protection Rules.D、You must use the Set-Mailbox Mia Hamm -LitigationHoldEnabled $true.
You install Windows 2000 Professional on a new APM compliant computer. You notice problems whenever you attempt to shut down the computer or enter or resume from a standby or a hibernate mode. What tool can you use to determine APM problems? ()A、Setup32.exe/apm B、The power options in control panel C、System event logD、Apmstat -v command E、Apmbios/show_all command F、Display Properties
单选题You are a senior network administrator at TestKing, and while performing thepassword recovery procedure on your 2500 series Cisco router, you type in thefollowing command:o/r 0x2142What is the purpose of this command?()AIt is used to restart the router.BIt is used to bypass the configuration in NVRAM.CIt is used to enter ROM Monitor mode.DIt is used to view the lost password.EIt is used to save the changes to the configuration.
单选题You have configured a Cisco Catalyst switch to perform Layer 3 routing via an SVI and have assigned that interface to VLAN 20. To check the status of the SVI, you issue the show interfaces vlan 20 command at the CLI prompt. You see from the output display that the interface is in an "up/up" state. What must be true in an SVI configuration to bring the VLAN and line protocol up?()AThe port must be physically connected to another Layer 3 device.BAt least one port in VLAN 20 must be active.CThe Layer 3 routing protocol must be operational and receiving routing updates from neighboring peer devices.DBecause this is a virtual interface, the operational status will always be in an up/up state.
单选题You want to log in to the router and make a configuration change. After logging in as the root user, what is the next command you must enter?()AenableBconfigureCeditDcli
多选题The EMP table exists in your schema. You want to execute the following query: SELECT ename, sal FROM emp AS OF TIMESTAMP (SYSTIMESTAMP - INTERVAL ’6’ MINUTE) WHERE ename = ’ALLEN’; What are the minimum requirements for the statement to execute successfully?()AARCHIVELOG mode must be enabledBRow Movement must be enabled for the tableCFLASHBACK must be set to ON for the databaseDThe UNDO_MANAGEMENT parameter must be set to AUTOEThe UNDO_RETENTION parameter must be set appropriately
单选题Which statement is true regarding the password-recovery process?()AYou must have a console connection.BYou cannot set the console port to an insecure mode.CYou must press the Enter key so that you can boot into single-user mode.DWhen prompted to enter the full pathname of the shell, you must press the Enter key.
多选题You install Windows 2000 Professional on a new APM compliant computer. You notice problems whenever you attempt to shut down the computer or enter or resume from a standby or a hibernate mode. What tool can you use to determine APM problems? ()ASetup32.exe/apmBThe power options in control panelCSystem event logDApmstat -v commandEApmbios/show_all commandFDisplay Properties
单选题You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()AUse the transport security mode and specify None for transport client credential type.BUse the transportWithMessageCredential security mode and specify Basic for the transport client credential type.CUse the message security mode and specify Basic for the transport client credential type.DUse the transportWithMessageCredential security mode and specify None for the transport client credential type.
单选题You are advised to enter the traffic route at about 1730 hours,because a vessel is scheduled to enter at the time when you intended to enter.What can you understand from this seaspeak?().AIt's a warning of navigation for my vesselBIt's an advice from Port Control to order my vessel not enter the traffic route of the harborCIt's an advice to change my estimated time of entering the traffic routeDIt's an order from the VTS to indicate my vessel to follow the traffic route
单选题You have a portable computer that runs Windows 7. You configure the computer to enter sleep mode after10 minutes of inactivity. You do not use the computer for 15 minutes and discover that the computer has notentered sleep mode. You need to identify what is preventing the computer from entering sleep mode. What should you do?()AAt a command prompt, run Powercfg energy.BAt a command prompt, run Systeminfo /s localhost.CFrom Performance Monitor, review the System Summary.DFrom Performance Information and Tools, review the detailed performance and system information.
单选题In configuration mode you see the following prompt: [edit interfaces fe-1/1/1] user@router# Which command will take you to operational mode?()AendBexitCquitDexit configuration-mode