多选题Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()AEnsuring compliance with legal regulations and corporate policiesBTroubleshooting problem reportsCPlanning for network expansionDProviding support to sales and marketingEGiving presentations to managementFMonitoring and tuning network performance
多选题
Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()
A
Ensuring compliance with legal regulations and corporate policies
B
Troubleshooting problem reports
C
Planning for network expansion
D
Providing support to sales and marketing
E
Giving presentations to management
F
Monitoring and tuning network performance
参考解析
解析:
暂无解析
相关考题:
The LAN needs are expanding at the Ezonexam corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the Ezonexam network.Which of the following are layer 1 devices that you can use? (Choose all that apply.)A.A switchB.A routerC.A network adapter cardD.A hubE.A repeater
Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? () A.MeshB.BusC.RingD.Star
Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()A、Building schematicB、IGP community elementsC、Listing of interconnectionsD、Physical topology diagramE、Logical topology diagramF、Inventory of network equipment
Which of the following pieces of information will the command show interface provide?(Choose allthat apply.)()A、Layer 1 statusB、Output queue dropsC、Interface CPU utilizationD、Cable type connected to interfaceE、Layer 2 statusF、Input queue drops
Which two of the following options are categories of Network Maintenance tasks?()A、FirefightingB、Interrupt-drivenC、Policy-basedD、StructuredE、Foundational
Which of the following is not a typical maintenance task within a network maintenance model?()A、Providing technical customer supportB、Changing configurationsC、Updating softwareD、Monitoring network performanceE、Replacing hardwareF、Scheduling backups
Which of the following troubleshooting targets is considered to be a Layer 2 issue?(Choose allthat apply.)()A、Spanning Tree ProtocolB、CablingC、Frame forwardingD、Packet forwardingE、EtherChannelF、Routing protocols
Which of the following are considered subcomponents of the problem diagnosis step of thetroubleshooting flow?(Choose all that apply.)()A、Eliminate potential causesB、Collect informationC、Document causesD、Hypothesize underlying causesE、Verif/ hypothesisF、Examine collected information
Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()A、MeshB、BusC、RingD、Star
You are designing a Windows Server 2008 R2 Hyper-V Virtualization environment. Your host servers must have the following elements: - A dedicated management network adapter. - A dedicated virtual network for child iSCSI network traffic. - A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()A、Two network adapters that support 802.1p, and one iSCSI host bus adapterB、Two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyC、Two network adapters that support 802.lq, and one network adapter that supports Jumbo framesD、Three network adapters that support 802. 1p
Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()A、Ensuring compliance with legal regulations and corporate policiesB、Troubleshooting problem reportsC、Planning for network expansionD、Providing support to sales and marketingE、Giving presentations to managementF、Monitoring and tuning network performance
Which of the following are valid modes of accessing the data plane? (Choose all that apply.)()A、Serial connectionB、Secure ShellC、RADIUSD、Simple Network Management ProtocolE、HTTPF、Telnet
Which of the following are byproducts of a structured maintenance plan?(Choose all that apply.)()A、Predictable security vulnerabilitiesB、Economies of scaleC、Improved expenditure forecastsD、Increased downtimeE、Predictable equipment obsolescenceF、Consumption of fewer resources
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic
Which tasks are run automatically as part of the Automated Maintenance Task by default? ()(Choose all that apply.)A、Segment AdvisorB、SQL Access AdvisorC、Optimizer statistics gatheringD、Automatic SQL Tuning AdvisorE、Automatic Database Diagnostics Monitor
You are designing a Windows Server 2008 R2 Hyper-V virtualization environment. Your host servers must have the following elements: A dedicated management network adapter.A dedicated virtual network for child iSCSI network traffic.A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()A、three network adapters that support 802.1pB、two network adapters that support 802.1q, and one iSCSI host bus adapterC、two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyD、two network adapters that support 802.1q, and one network adapter that supports Jumbo frames
多选题Which of the following pieces of information will the command show interface provide?(Choose allthat apply.)()ALayer 1 statusBOutput queue dropsCInterface CPU utilizationDCable type connected to interfaceELayer 2 statusFInput queue drops
多选题Which of the following are not fundamental tasks of the Support Workbench?()AView long-running SQL workloadsBView problem detailsCGather additional diagnostic informationDCreate a Service RequestEClean up incident data after upload to Oracle Support
多选题Which of the following are considered subcomponents of the problem diagnosis step of thetroubleshooting flow?(Choose all that apply.)()AEliminate potential causesBCollect informationCDocument causesDHypothesize underlying causesEVerif/ hypothesisFExamine collected information
单选题Which of the following is not a typical maintenance task within a network maintenance model?()AProviding technical customer supportBChanging configurationsCUpdating softwareDMonitoring network performanceEReplacing hardwareFScheduling backups
多选题Which of the following are byproducts of a structured maintenance plan?(Choose all that apply.)()APredictable security vulnerabilitiesBEconomies of scaleCImproved expenditure forecastsDIncreased downtimeEPredictable equipment obsolescenceFConsumption of fewer resources
多选题Which of the following are valid modes of accessing the data plane? (Choose all that apply.)()ASerial connectionBSecure ShellCRADIUSDSimple Network Management ProtocolEHTTPFTelnet
多选题Which tasks are run automatically as part of the Automated Maintenance Task by default? ()(Choose all that apply.)ASegment AdvisorBSQL Access AdvisorCOptimizer statistics gatheringDAutomatic SQL Tuning AdvisorEAutomatic Database Diagnostics Monitor
多选题Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()AEnsuring compliance with legal regulations and corporate policiesBTroubleshooting problem reportsCPlanning for network expansionDProviding support to sales and marketingEGiving presentations to managementFMonitoring and tuning network performance
多选题Which two of the following options are categories of Network Maintenance tasks?()AFirefightingBInterrupt-drivenCPolicy-basedDStructuredEFoundational
多选题You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()AJunos PulseBJava AgentCOdyssey Access ClientDNative 802.1X supplicant
多选题Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()ABuilding schematicBIGP community elementsCListing of interconnectionsDPhysical topology diagramELogical topology diagramFInventory of network equipment
多选题Which of the following troubleshooting targets is considered to be a Layer 2 issue?(Choose allthat apply.)()ASpanning Tree ProtocolBCablingCFrame forwardingDPacket forwardingEEtherChannelFRouting protocols