A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()A、 tracertB、 msconfigC、 routeD、 net use
A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()
- A、 tracert
- B、 msconfig
- C、 route
- D、 net use
相关考题:
Which clause should you use to exclude group results? () A. WHEREB. HAVINGC. RESTRICTD. GROUP BYE. ORDER BY
You are administering a database stored in Automatic Storage Management (ASM). You use RMAN to back up the database and the MD_BACKUP command to back up the ASM metadata regularly. You lost an ASM disk group DG1 due to hardware failure.In which three ways can you re-create the lost disk group and restore the data?()A. Use the MD_RESTORE command to restore metadata for an existing disk group by passing the existing disk group name as an input parameter and use RMAN to restore the data.B. Use the MKDG command to restore the disk group with the same configuration as the backed-up disk group and data on the disk group.C. Use the MD_RESTORE command to restore the disk group with the changed disk group specification, failure group specification, name, and other attributes and use RMAN to restore the data.D. Use the MKDG command to restore the disk group with the same configuration as the backed-up disk group name and same set of disks and failure group configuration, and use RMAN to restore the data.E. Use the MD_RESTORE command to restore both the metadata and data for the failed disk group.F. Use the MKDG command to add a new disk group DG1 with the same or different specifications for failure group and other attributes and use RMAN to restore the data.
What are two commands that can be used to configure MBGP for multicast?() A. Under the BGP group, configure family inet any.B. Use the set protocol MBGP command to enable MBGP.C. Under the BGP group, configure family inet multicast.D. Use the set rib-group command to copy the multicast routes into inet.1.
A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?() A. tracertB. msconfigC. routeD. net use
What are two commands that can be used to configure MBGP for multicast?()A、Under the BGP group, configure family inet anyB、Use the set protocol MBGP command to enable MBGPC、Under the BGP group, configure family inet multicastD、Use the set rib-group command to copy the multicast routes into inet.1
What is true of using group functions on columns that contain NULL values?()A、Group functions on columns ignore NULL values.B、Group functions on columns returning dates include NULL values.C、Group functions on columns returning numbers include NULL values.D、Group functions on columns cannot be accurately used on columns that contain NULL values.E、Group functions on columns include NULL values in calculations if you use the keyword INC_NULLS.
You create a Web Form with several UI elements on it. During a code review, you realize that some of the UI elements can be grouped into user controls. You need to create a Web control to group the UI elements that do not require server-side processing. Doing so will enable you to programmatically add or remove the UI elements from the page. You want to maintain the UI elements' style properties. What should you do? ()A、Use System.Web.UI.TemplateControl to group the UI elements.B、Use System.Web.UI.HtmlControls.HtmlControl to group the UI elements.C、Use System.Web.UI.LiteralControl to group the UI elements.D、Use System.Web.UI.WebControls.Literal to group the UI elements.
What are two commands that can be used to configure MBGP for multicast?()A、Under the BGP group, configure family inet any.B、Use the set protocol MBGP command to enable MBGP.C、Under the BGP group, configure family inet multicast.D、Use the set rib-group command to copy the multicast routes into inet.1.
Which clause should you use to exclude group results?()A、WHEREB、HAVINGC、RESTRICTD、GROUP BYE、ORDER BY
Which report style would you use to create a report listing each department and including a listing of employees beneath their respective department?()A、Group left. B、Form like. C、Matrix W/group. D、Group above. E、Mailing label. F、Form letter.
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht use a wireless connection to access the network. What should you do?()A、 Configure all access points to use 802.1X authenticationB、 Configure all protable computers to use MS-CHAP v2 authenticationC、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.
You have a single Active Directory directory service domain. All servers run Windows Server 2003. You create several new Group Policies. You need to determine the end result of these Group Policies before applying the settings. What should you do?()A、 Use Resultant Set of Policy (RSoP) in Planning mode.B、 Use Resultant Set of Policy (RSoP) in Logging mode.C、 Use Event Viewer to view the system log.D、 Use Event Viewer to view the application log.
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A、Configure all access points to use 802.1X authentication.B、Configure all portable computers to use MS-CHAP v2 authentication.C、Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.D、Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.
You use Group Policy to standardize Internet Explorer settings on Windows 7 client computers. Users occasionally change the Internet Explorer settings on individual client computers. The company wants to maintain a standard Internet Explorer configuration on all client computers. You need to ensure that the standard Internet Explorer configuration is in place each time users log on to client computers. What should you do?()A、Enable User Group Policy loopback processing mode.B、Use the Group Policy Update utility to refresh Group Policy.C、Enable Internet Explorer Maintenance Policy Processing in Group Policy.D、Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box.
You are designing an application that will use Windows Azure Table storage to store millions of data points each day. The application must retain each day’s data for only one week. You need to recommend an approach for minimizing storage transactions. What should you recommend?()A、 Use a separate table for each date. Delete eachtable when it is one week old.B、 Use a separate table for each week. Delete each table when it is one week old.C、 Use a single table, partitioned by date. Use Entity Group Transactions to delete data when it is one week old.D、 Use a single table, partitioned by week. Use Entity Group Transactions to delete data when it is one week old.
多选题Your application requires that you programmatically manipulate a nonquery record group. Which three built-ins can you use?()ACREATE_GROUPBADD_GROUP_NOWCPOPULATE_GROUPDADD_GROUP_COLUMNECREATE_GROUP_FROM_QUERY
多选题You are administering a database stored in Automatic Storage Management (ASM). You use RMAN to back up the database and the MD_BACKUP command to back up the ASM metadata regularly. You lost an ASM disk group DG1 due to hardware failure. In which three ways can you re-create the lost disk group and restore the data?()AUse the MD_RESTORE command to restore metadata for an existing disk group by passing the existing disk group name as an input parameter and use RMAN to restore the data.BUse the MKDG command to restore the disk group with the same configuration as the backed-up disk group and data on the disk group.CUse the MD_RESTORE command to restore the disk group with the changed disk group specification, failure group specification, name, and other attributes and use RMAN to restore the data.DUse the MKDG command to restore the disk group with the same configuration as the backed-up disk group name and same set of disks and failure group configuration, and use RMAN to restore the data.EUse the MD_RESTORE command to restore both the metadata and data for the failed disk group.FUse the MKDG command to add a new disk group DG1 with the same or different specifications for failure group and other attributes and use RMAN to restore the data.
单选题Your network contains a server named Server1. Server1 has DirectAccess deployed. A group named Group1 is enabled for DirectAccess. Users report that when they log on to their computers, the computers are not configured to use DirectAccess. You need to ensure that the users computers are configured to use DirectAccess. What should you do first?()AOn each client computer, add Group1 to the Distributed COM Users group.BOn each client computer, add Group1 to the Network Configuration Operators group.CFrom Active Directory Users and Computers, add the users user accounts to Group1.DFrom Active Directory Users and Computers, add the users computer accounts to Group1.
单选题Which clause should you use to exclude group results?()AWHEREBHAVINGCRESTRICTDGROUP BYEORDER BY
单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()AConfigure all access points to use 802.1x authentication.BConfigure all protable computers to use MS-CHAP v2 authentication.CUse the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.DUse the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.
单选题A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()A tracertB msconfigC routeD net use
单选题Examine the following command: ALTER DISKGROUP data MOUNT FORCE; In which scenario can you use the above command to mount the disk group?()A when ASM disk goes offlineB when one or more ASM files are droppedC when some disks in a disk group are offlineD when some disks in a failure group for a disk group are rebalancing
单选题Examine the following command: ALTER DISKGROUP data MOUNT FORCE; In which scenario can you use the above command to mount the disk group? ()Awhen ASM disk goes offlineBwhen one or more ASM files are droppedCwhen some disks in a disk group are offlineDwhen some disks in a failure group for a disk group are rebalancing
单选题The record group in the EMP form is populated using a SELECT statement that is constructed programmatically at runtime. Five employee records are displayed at one time, and a user chooses item two from the record group. Which built-in would you use to determine which rows were flagged in the record group?()AGET_GROUP_ROW_COUNT BGET_GROUP_SELECTION_COUNT CGET_GROUP_SELECTION DFIND_GROUP EFIND_COLUMN FADD_GROUP_ROW
单选题You have a single Active Directory directory service domain. All servers run Windows Server 2003. You create several new Group Policies. You need to determine the end result of these Group Policies before applying the settings. What should you do?()A Use Resultant Set of Policy (RSoP) in Planning mode.B Use Resultant Set of Policy (RSoP) in Logging mode.C Use Event Viewer to view the system log.D Use Event Viewer to view the application log.