An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()
- A、Hub
- B、Bridge
- C、Switch
- D、Router
相关考题:
An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router
An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?() A. Caching enginesB. QoSC. Traffic shapingD. Load balancing
You have a stand-alone server that runs Windows Server 2003 Service Pack 2 (SP2).You attempt to log on to the server by using the Administrator account and receive the following error message.You need to log on to the server by using the Administrator account.What should you do first? ()A. Restart the server in Safe mode.B. Restart the server by using the Last Known Good Configuration option.C. Log on to another stand-alone server as an Administrator.D. Log on to the server by using an account that is a member of the Power Users group.
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A. applicationB. presentationC. sessionD. transportE. internetF. data link
A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A、applicationB、presentationC、sessionD、transportE、internetF、data link
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A、applicationB、presentationC、sessionD、transportE、internetF、datalink
What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。A、VLAN supportB、compressionC、authenticationD、sliding windowsE、multilink supportF、quality of service
An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?()A、 The administrator improperly configured the virtual memory settings on the server.B、 The administrator is using incorrect patch switches for the install.C、 The administrator is trying to install security patches for software that is not installed.D、 The administrator is trying to install patches that require hard drive encryption on the server.
An administrator is required to maintain space for 750GB of user data. Which of the following is the BEST option available to the administrator?()A、Create a RAID 5 array using five 200GB disks.B、Create a JBOD using four 200GB disks.C、Create a RAID 1 array using six 200GB disks.D、Create a RAID 5 array using three 200GB disks.
An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing
An administrator has replaced a faulty drive in a server using software RAID. The drive needs to now be partitioned before being added back to the array. Which of the following tools should the administrator use to accomplish this?()A、chkdskB、mountC、fsckD、diskpart
Which of the following tasks can be performed by a Buyer Administrator using the Organization Administration console?()A、The Buyer Administrator can approve the shoppers within their organization.B、The Buyer Administrator can create a new seller organization.C、The Buyer Administrator can assign access levels to their members.D、The Buyer Administrator can make Request for Quotes (RFQ) to a seller organization.
An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A、/tmpB、/var/preserveC、/var/tmp/$USERD、$HOME/.vi
You are installing an application on a computer that runs Windows Server 2008 R2. During installation, the application will need to add new attributes and classes to the Active Directory database. You need to ensure that you can install the application. What should you do()A、Change the functional level of the forest to Windows Server 2008 R2.B、Log on by using an account that has Server Operator rights.C、Log on by using an account that has Schema Administrator rights and the appropriate rights to install the applicatioD、Log on by using an account that has the Enterprise Administrator rights and the appropriate rights to install the app
多选题Which of the following tasks can be performed by a Buyer Administrator using the Organization Administration console?()AThe Buyer Administrator can approve the shoppers within their organization.BThe Buyer Administrator can create a new seller organization.CThe Buyer Administrator can assign access levels to their members.DThe Buyer Administrator can make Request for Quotes (RFQ) to a seller organization.
多选题What can a network administrator utilize by using PPP Layer 2 encapsulation? (Choose three.)()AVLAN supportBcompressionCauthenticationDsliding windowsEmultilink supportFquality of service
单选题An administrator is required to maintain maximum redundancy for 1TB of accounting files. Which of the following is the BEST option available to the administrator?()ACreate a RAID 5 array using eight 300GB disks.BCreate a RAID 10 array using six 300GB disks.CCreate a RAID 5 array using ten 300GB disks.DCreate a RAID 10 array using eight 300GB disks.
单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A Enable audit object access and specify files and folders to monitor using Task Manager.B Enable audit policy change and specify files and folders to monitor using Windows Explorer.C Enable audit object access and specify files and folders to monitor using Windows Explorer.D Open Performance Monitor and monitor folder activity.
单选题A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()AapplicationBpresentationCsessionDtransportEinternetFdata link
单选题An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?()AThe administrator improperly configured the virtual memory settings on the server.BThe administrator is using incorrect patch switches for the install.CThe administrator is trying to install security patches for software that is not installed.DThe administrator is trying to install patches that require hard drive encryption on the server.
多选题An administrator account is granted the CREATE SESSION and SET CONTAINER system privileges. A multitenant container database (CDB) instant has the following parameter set: THREADED_EXECUTION = FALSE Which four statements are true about this administrator establishing connections to root in a CDB that has been opened in read only mode?()AYou can conned as a common user by using the connect statement.BYou can connect as a local user by using the connect statement.CYou can connect by using easy connect.DYou can connect by using OS authentication.EYou can connect by using a Net Service name.FYou can connect as a local user by using the SET CONTAINER statement.
单选题An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A/tmpB/var/preserveC/var/tmp/$USERD$HOME/.vi
单选题A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()AapplicationBpresentationCsessionDtransportEinternetFdatalink
多选题Several reports are logged stating that an application server is performing slowly. During the investigation, the administrator notices that the hard drives on the server appear to have a high level ofactivity. Which items should the administrator monitor using performance monitoring tools? ()APage FileBDisk UtilizationCSystem TemperatureDProcessor UtilizationENetwork Utilization
单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()ARun ipconfig /flushdns at the command prompt. BReset the password for the local administrator user account. CFrom the Internet Options in Internet Explorer, clear the AutoComplete history.DFrom the Internet Options in Internet Explorer, delete the Temporary Internet Files.