多选题Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()AEnsuring compliance with legal regulations and corporate policiesBTroubleshooting problem reportsCPlanning for network expansionDProviding support to sales and marketingEGiving presentations to managementFMonitoring and tuning network performance

多选题
Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()
A

Ensuring compliance with legal regulations and corporate policies

B

Troubleshooting problem reports

C

Planning for network expansion

D

Providing support to sales and marketing

E

Giving presentations to management

F

Monitoring and tuning network performance


参考解析

解析: 暂无解析

相关考题:

The LAN needs are expanding at the Ezonexam corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the Ezonexam network.Which of the following are layer 1 devices that you can use? (Choose all that apply.)A.A switchB.A routerC.A network adapter cardD.A hubE.A repeater

Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? () A.MeshB.BusC.RingD.Star

Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()A、Building schematicB、IGP community elementsC、Listing of interconnectionsD、Physical topology diagramE、Logical topology diagramF、Inventory of network equipment

Which of the following pieces of information will the command show interface provide?(Choose allthat apply.)()A、Layer 1 statusB、Output queue dropsC、Interface CPU utilizationD、Cable type connected to interfaceE、Layer 2 statusF、Input queue drops

Which two of the following options are categories of Network Maintenance tasks?()A、FirefightingB、Interrupt-drivenC、Policy-basedD、StructuredE、Foundational

Which of the following is not a typical maintenance task within a network maintenance model?()A、Providing technical customer supportB、Changing configurationsC、Updating softwareD、Monitoring network performanceE、Replacing hardwareF、Scheduling backups

Which of the following troubleshooting targets is considered to be a Layer 2 issue?(Choose allthat apply.)()A、Spanning Tree ProtocolB、CablingC、Frame forwardingD、Packet forwardingE、EtherChannelF、Routing protocols

Which of the following are considered subcomponents of the problem diagnosis step of thetroubleshooting flow?(Choose all that apply.)()A、Eliminate potential causesB、Collect informationC、Document causesD、Hypothesize underlying causesE、Verif/ hypothesisF、Examine collected information

Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()A、MeshB、BusC、RingD、Star

You are designing a Windows Server 2008 R2 Hyper-V Virtualization environment. Your host servers must have the following elements: - A dedicated management network adapter. - A dedicated virtual network for child iSCSI network traffic. - A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()A、Two network adapters that support 802.1p, and one iSCSI host bus adapterB、Two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyC、Two network adapters that support 802.lq, and one network adapter that supports Jumbo framesD、Three network adapters that support 802. 1p

Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()A、Ensuring compliance with legal regulations and corporate policiesB、Troubleshooting problem reportsC、Planning for network expansionD、Providing support to sales and marketingE、Giving presentations to managementF、Monitoring and tuning network performance

Which of the following are valid modes of accessing the data plane? (Choose all that apply.)()A、Serial connectionB、Secure ShellC、RADIUSD、Simple Network Management ProtocolE、HTTPF、Telnet

Which of the following are byproducts of a structured maintenance plan?(Choose all that apply.)()A、Predictable security vulnerabilitiesB、Economies of scaleC、Improved expenditure forecastsD、Increased downtimeE、Predictable equipment obsolescenceF、Consumption of fewer resources

Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic

Which tasks are run automatically as part of the Automated Maintenance Task by default? ()(Choose all that apply.)A、Segment AdvisorB、SQL Access AdvisorC、Optimizer statistics gatheringD、Automatic SQL Tuning AdvisorE、Automatic Database Diagnostics Monitor

You are designing a Windows Server 2008 R2 Hyper-V virtualization environment. Your host servers must have the following elements:  A dedicated management network adapter.A dedicated virtual network for child iSCSI network traffic.A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing.  Which adapters should you choose?()A、three network adapters that support 802.1pB、two network adapters that support 802.1q, and one iSCSI host bus adapterC、two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyD、two network adapters that support 802.1q, and one network adapter that supports Jumbo frames

多选题Which of the following pieces of information will the command show interface provide?(Choose allthat apply.)()ALayer 1 statusBOutput queue dropsCInterface CPU utilizationDCable type connected to interfaceELayer 2 statusFInput queue drops

多选题Which of the following are not fundamental tasks of the Support Workbench?()AView long-running SQL workloadsBView problem detailsCGather additional diagnostic informationDCreate a Service RequestEClean up incident data after upload to Oracle Support

多选题Which of the following are considered subcomponents of the problem diagnosis step of thetroubleshooting flow?(Choose all that apply.)()AEliminate potential causesBCollect informationCDocument causesDHypothesize underlying causesEVerif/ hypothesisFExamine collected information

单选题Which of the following is not a typical maintenance task within a network maintenance model?()AProviding technical customer supportBChanging configurationsCUpdating softwareDMonitoring network performanceEReplacing hardwareFScheduling backups

多选题Which of the following are byproducts of a structured maintenance plan?(Choose all that apply.)()APredictable security vulnerabilitiesBEconomies of scaleCImproved expenditure forecastsDIncreased downtimeEPredictable equipment obsolescenceFConsumption of fewer resources

多选题Which of the following are valid modes of accessing the data plane? (Choose all that apply.)()ASerial connectionBSecure ShellCRADIUSDSimple Network Management ProtocolEHTTPFTelnet

多选题Which tasks are run automatically as part of the Automated Maintenance Task by default? ()(Choose all that apply.)ASegment AdvisorBSQL Access AdvisorCOptimizer statistics gatheringDAutomatic SQL Tuning AdvisorEAutomatic Database Diagnostics Monitor

多选题Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()AEnsuring compliance with legal regulations and corporate policiesBTroubleshooting problem reportsCPlanning for network expansionDProviding support to sales and marketingEGiving presentations to managementFMonitoring and tuning network performance

多选题Which two of the following options are categories of Network Maintenance tasks?()AFirefightingBInterrupt-drivenCPolicy-basedDStructuredEFoundational

多选题You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()AJunos PulseBJava AgentCOdyssey Access ClientDNative 802.1X supplicant

多选题Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()ABuilding schematicBIGP community elementsCListing of interconnectionsDPhysical topology diagramELogical topology diagramFInventory of network equipment

多选题Which of the following troubleshooting targets is considered to be a Layer 2 issue?(Choose allthat apply.)()ASpanning Tree ProtocolBCablingCFrame forwardingDPacket forwardingEEtherChannelFRouting protocols