单选题An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classfuladdress. Which of the following is the address that can be used in this scenario?()A10.178.1.5/1B10.178.1.5/8C10.178.1.5/16D10.178.15/30
单选题
An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classfuladdress. Which of the following is the address that can be used in this scenario?()
A
10.178.1.5/1
B
10.178.1.5/8
C
10.178.1.5/16
D
10.178.15/30
参考解析
解析:
暂无解析
相关考题:
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A.tracerouteB.tracertC.ifconfigD.ipconfig
An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classfuladdress. Which of the following is the address that can be used in this scenario?() A.10.178.1.5/1B.10.178.1.5/8C.10.178.1.5/16D.10.178.15/30
The administrator wants to verify the current state of the OSPF database loading process. Which show command should the administrator use?() A. show ip ospf [process - id] interfaceB. show ip ospf neighborC. show ip ospf [process - id]D. show ip ospf [process - id area - id] database
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255D.access-list 10 permit ip 192.168.146.0 0.0.1.255E.access-list 10 permit ip 192.168.148.0 0.0.1.255F.access-list 10 permit ip 192.168.146.0 255.255.255.0
Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()A、assigning a private IP address to the APB、changing the default SSID valueC、configuring a new administrator passwordD、changing the mixed mode setting to single modeE、configuring traffic filtering
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255D、access-list 10 permit ip 192.168.146.0 0.0.1.255E、access-list 10 permit ip 192.168.148.0 0.0.1.255F、access-list 10 permit ip 192.168.146.0 255.255.255.0
What will improve the battery life of a Cisco Unified Wireless IP Phone 7921G?()A、configuring phone to auto select networkB、configuring beacon period to 80 msC、configuring DTIM period to 2D、enabling RRM
An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()A、WMIB、RISC、DNSD、SNMPE、SMTP
When configuring a DHCP server, which of the following can the administrator define for DHCPusers?()A、 Database serverB、 NTP serverC、 DHCP serverD、 SQL serverE、 DNS serverF、 Domain name
Which action increases server availability?()A、 configuring a second network card with a different IP addressB、 replacing the existing 100 Mbps NIC with a gigabit Ethernet NICC、 using adapter teaming and configuring the second network card with the same IP address as the first network cardD、 installing a dual-port network card that can handle the future growth and setting one NIC to 10 Mbps and one NIC to 100 Mbps
An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A、tracerouteB、tracertC、ifconfigD、ipconfig
An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classfuladdress. Which of the following is the address that can be used in this scenario?()A、10.178.1.5/1B、10.178.1.5/8C、10.178.1.5/16D、10.178.15/30
A system administrator needs to specify a set of FQDN to IP address mappings for a legacyserver; the administrator does not want the legacy server to be referenced by other servers. Which of the following should the administrator use to set this?()A、DHCP serverB、DNS serverC、Host fileD、Route statements
The Cluster Administrator wants to use disk heartbeats as a non-IP network. What Volume Group consideration must be accounted for prior to configuring disk heartbeats?() A、 The Volume Group major number must be the same on all nodes.B、 The Shared Volume Group must be created with the Big VG format.C、 The Volume Group must be created as Enhanced Concurrent Capable.D、 The "t factor" must be doubled to create the reserved area for disk hearbeats.
An administrator wants to use the online planning worksheets as an aid to configuring a PowerHA cluster.Which PowerHA fileset would the administrator need to install in order to obtain this tool?()A、cluster.es.hawB、cluster.es.worksheetsC、cluster.es.tools.worksheetsD、cluster.es.server.worksheets
Which of the following is a requirement for configuring a service IP address using IPAT via Replacement?()A、The service IP must be in the same logical subnet as all boot IP addressesB、The service IP must be in a different logical subnet to all boot IP addressesC、The service IP must be in the same logical subnet as the persistent IP addressesD、The service IP must be in the same logical subnet as one of the boot IP addresses
单选题Which of the following is a requirement for configuring a service IP address using IPAT via Replacement?()AThe service IP must be in the same logical subnet as all boot IP addressesBThe service IP must be in a different logical subnet to all boot IP addressesCThe service IP must be in the same logical subnet as the persistent IP addressesDThe service IP must be in the same logical subnet as one of the boot IP addresses
多选题When configuring a DHCP server, which of the following can the administrator define for DHCPusers?()ADatabase serverBNTP serverCDHCP serverDSQL serverEDNS serverFDomain name
单选题The administrator wants to verify the current state of the OSPF database loading process. Which show command should the administrator use?()Ashow ip ospf [process - id] interfaceBshow ip ospf neighborCshow ip ospf [process - id]Dshow ip ospf [process - id area - id] database
多选题An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()AWMIBRISCDNSDSNMPESMTP
单选题A company has several legacy servers that upper management would like to move into a virtual environment. Which of the following is the FIRST step an administrator should take to evaluating whether the servers can be moved into the virtual environment?()A Compare the costs of maintenance between the physical and virtual servers.B Run SYSPREP on each legacy server.C Check the HCL on each legacy server.D Verify that all the latest OS service packs are installed on each server.
单选题You are the network administrator for The network consists of a single Active Directory domain named A Windows Server 2003 computer named TestKing3 is configured as a member server in your domain. You install Terminal Services on TestKing3. You also install several legacy applications on TestKing3. Users report that they cannot run many of the legacy applications on TestKing3 through their Terminal Services sessions. You establish a Terminal Services session by using the Administrator account, and you verify that you can run the legacy applications. You need to ensure that users can run the legacy applications on TestKing3 while they are connected through Terminal Services. What should you do?()AAdd all Terminal Services users to the domain Server Operators group.BShare the C:/Program Files folders on TestKing2. Assign the Domain Users group the Allow - Full Control share permissions.CInstall Terminal Server Licensing Server on TestKing3.DUse Terminal Services Configuration to change the Permissions Compatibility setting.
多选题A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()Aaccess-list 10 permit ip 192.168.147.0 0.0.0.255.255Baccess-list 10 permit ip 192.168.149.0 0.0.0.255.255Caccess-list 10 permit ip 192.168.146.0 0.0.0.0.255Daccess-list 10 permit ip 192.168.146.0 0.0.0.1.255Eaccess-list 10 permit ip 192.168.148.0 0.0.0.1.255Faccess-list 10 permit ip 192.168.146.0 255.255.255.0
单选题Which action increases server availability?()A configuring a second network card with a different IP addressB replacing the existing 100 Mbps NIC with a gigabit Ethernet NICC using adapter teaming and configuring the second network card with the same IP address as the first network cardD installing a dual-port network card that can handle the future growth and setting one NIC to 10 Mbps and one NIC to 100 Mbps
单选题A client is configuring an x3650 M3. Once the system is in production, they need to able to remotely view and make changes to the UEFI interface. Which of the following is the correct way to configure this?()AConfigure the RSA with an IP addressBConfigure the BMC with an IP addressCConfigure the AMM with an IP addressDConfigure the IMM with an IP address
单选题An administrator wants to use the online planning worksheets as an aid to configuring a PowerHA cluster.Which PowerHA fileset would the administrator need to install in order to obtain this tool?()Acluster.es.hawBcluster.es.worksheetsCcluster.es.tools.worksheetsDcluster.es.server.worksheets