单选题Telneting from any machine on the network is taking 75 seconds.  Which of the following procedures should be checked to correct the error?()A Check  /etc/hosts. B Check  /etc/resolv.conf. C Check for packet errors. D Check to see if the master server is up.

单选题
Telneting from any machine on the network is taking 75 seconds.  Which of the following procedures should be checked to correct the error?()
A

 Check  /etc/hosts. 

B

 Check  /etc/resolv.conf. 

C

 Check for packet errors. 

D

 Check to see if the master server is up.


参考解析

解析: 暂无解析

相关考题:

Leave a few hours between eating and () any sporting activity. A、participating inB、taking inC、participating intoD、taking into

This machine consists_____ many parts.If any part refuses to work ,the machine will fail. A. forB. onC. ofD. in

Look, the little boy() a big dictionary from the shelf. A. is taking downB. is taking outC. is taking upD. is taking back

The three players repeatedly denied _taking_ (take) any drug.

The Turing machine is an abstract(71)of computer execution and storage introduced in 1936 by Alan Turing to give a mathematically precise definition of(72). or 'mechanical procedure'. As such it is still widely used in theoretical computer science, especially in(73)theory and the theory of computation. The thesis that states that Turing machines indeed capture the informal notion of effective or mechanical method in logic and mathematics is known as Turing's thesis.Every Turing machine computes a certain(74)partial function over the strings over its alphabet. In that sense it behaves like a computer with a fixed program. However, as Alan luring already described, we can encode the action table of every Turing machine in a string. Thus we might try to construct a Turing machine that expects on its tape a string describing an action table followed by a string describing the input tape, and then computes the tape that the encoded Turing machine would have computed. As Turing showed, such a luring machine is indeed possible and since it is able to simulate any other Turing machine it is called a(75)Turing machine.A universal Turing machine is Turing complete. It can calculate any recursive function, decide any recursive language, and accept any recursively enumerable language. According to the Church-Turing thesis, the problems solvable by a universal Turing machine are exactly those problems solvable by an algorithm or an effective method of computation, for any reasonable definition of those terms.A.implementB.patternC.toolD.model

An internet is a combination of networks connected by (71) .When a datagram goes from a source to a (72) ,it will probably pass many (73) until it reaches the router attached to the destination network.A router receives a (74) from a network and passes it to another network.A router is usually attached to several networks.When it receives a packet,to which network should it pass the packet? The decision is based on optimization: Which of the available (75) is the optimum pathway?A.modemsB.routersC.switchesD.computers

You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? () A. user nameB. password lengthC. certificateD. Host Checker

Refer to the exhibit. R1 and R2 have been configured to share routing information via EIGRP. What will be the result of the configuration section shown for R2? () A. Any routes learned by R2 from the interface tied to the 172.16.0.0 network will not be advertised to neighbors on the 192.168.2.0 network.B. Only routes learned by R2 from the interface tied to the 172.16.0.0 network will be advertised to neighbors on the 192.168.2.0 network.C. Only the 172.16.0.0 network will be advertised to neighbors on the 192.168.2.0 network.D. All networks, except the 172.16.0.0 network will be advertised to neighbors on the 192.168.2.0 network .

In view of ______ bilge water from any vessel,an application shall be made to Harbor Authorities for approval.A.dischargingB.recirclingC.loadingD.taking in

You have water washed your cargo tanks using the fixed machines.What should you do before using portable machines to clean areas screened from the wash of the fixed machine by structural members ________.A.Ventilate the tank to eliminate any electrostatically charged mistB.Attach the water supply hose to the portable machine after the cleaning head is positioned inside the tankC.Insure that the tanks are not stripped until the final wash is startedD.Ground the fixed machines to eliminate any electrostatic buildup on the cleaning head

For the purpose of ______ tank or hold washings from any vessel,an application shall be made to Harbor Authorities for approval.A.DischargingB.RecirclingC.LoadingD.Taking in

Together with the network layer,the transport layer is the heart of the protocol ( 请作答此空).The network layer provides end-to-end () delivery using datagrams or virtual circuits.The transport layer builds on the network layer to provide data transport from a process on a () machine to a process on a destination machine with a desired level of reliability that is independent of the physical () currently in use.It provides the abstractions that applications nedd to use the network..Without the () layer,the whole concept of layered protocols would make little sense.A.transportB.networkC.hierarchyD.service

A user cannot ping any other hostnames from an AIX machine. The error received is "host name earth NOT FOUND". Which of the following files is most likely configured incorrectly?()A、/etc/resolv.confB、/etc/rc.tcpipC、/etc/aliasesD、/etc/hosts.equiv

Which of the following cable types can cause interference on the network when disconnecting any one machine?()A、CoaxialB、Cat 1 UTPC、Cat 3 UTPD、Cat 5 UTP

A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()A、The RADIUS serverB、The EAPoL serverC、The workstation's network adapterD、The Ethernet switch

Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()A、prefixes received from any other BGP peer and prefixes locally originated via network statements or redistributedB、all prefixes in its routing tableC、prefixes received from EBGP peers and prefixes locally originated via network statements or redistributedD、prefixes received from EBGP peers and prefixes received from route reflectorsE、prefixes received from other IBGP peers, prefixes received from EBGP peers,and prefixes redistributedto BGPF、prefixes received from other IBGP peers and prefixes received from route reflectors

Telneting from any machine on the network is taking 75 seconds.  Which of the following procedures should be checked to correct the error?()A、 Check  /etc/hosts. B、 Check  /etc/resolv.conf. C、 Check for packet errors. D、 Check to see if the master server is up.

You have two hosts that run VMware ESX. You need to recommend a management solution for the virtual machines (VMs) on the VMware hosts. The solution must support the ability to move the VMs from one VMware host to the other VMware host by using VMware vMotion technology. What should implement on the network?()A、a failover cluster between the VMsB、Second-Level Address Translation (SLAT)C、Windows System Resource Manager (WSRM)D、quick migrationE、a Fibre Channel Storage Area Network (SAN)F、an iSCSI Storage Area Network (SAN)G、Virtual Machine ChimneyH、Cluster Shared Volumes (CSV)I、a failover cluster for the Hyper-V hostsJ、virtual machine queue (VMQ)K、Network Load Balancing (NLB) for the Hyper-V hostsL、Microsoft System Center Operations Manager with Performance and Resource Optimization (PRO)M、Microsoft System Center Virtual Machine Manager 2008 R2N、Network Attached Storage (NAS)

单选题You are an enterprise administrator for Cer-tech .com. All the servers on the network run Windows Server2008. The network consists of a Server that has the Windows Server virtualization role service installed.You create a new virtual machine, installed Windows Server 2008 on it, and configure it to use the physicalnetwork card of the host server. After this installation and configuration the virtual machine, you wereunable to access network resources from the virtual machine. Which of the following options would youchoose to ensure that the virtual host can connect to the physical network?()AInstall the MS Loopback adapter on the virtual machine.BEnable the Multipath I/O feature on the host server.CInstall Windows Server virtualization Guest Integration Components on the virtual machine.DInstall the MS Loopback adapter on the host server.ENone of the above

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Hyper-V server role installed. You create a new virtual machine and perform an installation of WindowsServer 2003 on the virtual machine. You have the virtual machine configured to use the physical networkcard of the host server. You find that you are unable to access network resources from the virtual machine.You have to make sure that the virtual host can connect to the physical network. What action should youperfrom?()AIn order to make sure that the virtual host can connect to the physical network, the Multipath I/O feature should be enabled on the host server.BIn order to make sure that the virtual host can connect to the physical network, you should perform the installation of the Microsoft Loopback adapter on the virtual machine.CIn order to make sure that the virtual host can connect to the physical network, you should perform the installation of Microsoft Hyper-V Integration Components on the virtual machine.DIn order to make sure that the virtual host can connect to the physical network, you should perform the installation of the Microsoft Loopback adapter on the host server.

单选题Which of these best identifies the types of prefixes a router running BGP will advertise to an EBGP peer?()Aprefixes received from any other BGP peer and prefixes locally originated via network statements or redistributed to BGPBall prefixes in its IP routing tableConly prefixes received from EBGP peers and prefixes locally originated via network statements or redistributedDonly prefixes received from EBGP peers and prefixes received from route reflectorsEall prefixes in its routing table except the prefixes received from other EBGP peersFall prefixes in its routing table except the prefixes received from other IBGP peers

单选题Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()Aprefixes received from any other BGP peer and prefixes locally originated via network statements or redistributedBall prefixes in its routing tableCprefixes received from EBGP peers and prefixes locally originated via network statements or redistributedDprefixes received from EBGP peers and prefixes received from route reflectorsEprefixes received from other IBGP peers, prefixes received from EBGP peers,and prefixes redistributedto BGPFprefixes received from other IBGP peers and prefixes received from route reflectors

多选题You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()Auser nameBpassword lengthCcertificateDHost Checker

单选题A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()AThe RADIUS serverBThe EAPoL serverCThe workstation's network adapterDThe Ethernet switch

单选题You have a server that runs Windows Server 2008. The server has the Windows Server virtualization role service installed.  You create a new virtual machine and perform an installation of Windows Server 2008 on the virtual machine. You configure the virtual machine to use the physical network card of the host server. You notice that you are unable to access network resources from the virtual machine. You need to ensure that the virtual host can connect to the physical network. What should you do?()AOn the host server, install the MS Loopback adapter.BOn the host server, enable the Multipath I/O feature.COn the virtual machine, install the MS Loopback adapter.DOn the virtual machine, install Windows Server virtualization Guest Integration Components.

单选题You are the network administrator at TestKing. You apply the following access list on the E0 outbound interface connected to the 192.168.1.8/29 LAN: access-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 20 any access-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 21 any What will the effect of this access list be?()AAll traffic will be allowed to out of E0 except FTP traffic.BFTP traffic from 192.168.1.22 to any host will be blocked.CFTP traffic from 192.168.1.9 to any host will be blocked.DAll traffic will be prevented from leaving E0.EAll FTP traffic to network 192.168.1.9/29 from any host will be blocked.

单选题Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is not configured as a route reflector? ()A prefixes received from any other BGP peer and prefixes locally originated via network statements or redistributedB all prefixes in its routing tableC prefixes received from EBGP peers and prefixes locally originated via network statements or redistributedD prefixes received from EBGP peers and prefixes received from route reflectorsE prefixes received from other IBGP peers, prefixes received from EBGP peers, and prefixes redistributed to BGPF prefixes received from other IBGP peers and prefixes received from route reflectors