A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()A、Edit the /etc/hosts file and add an alias to the correct entryB、Set up an alias in his .kshrc file to alias the hostname to the fully qualified hostnameC、Add an alias to /etc/aliasesD、Add mars.net to the search path of the resolv.conf file

A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()

  • A、Edit the /etc/hosts file and add an alias to the correct entry
  • B、Set up an alias in his .kshrc file to alias the hostname to the fully qualified hostname
  • C、Add an alias to /etc/aliases
  • D、Add mars.net to the search path of the resolv.conf file

相关考题:

You can successfully ping a Bridged 1483 customer‘s workstation from the local ERX. However, a remote ERX router in your network cannot ping that same device.What could be causing this problem?() A. incorrect DSL network redistributionB. incorrect static host route configurationC. incorrect static customer route configurationD. incorrect default static route configuration on the end user

Which two commands will successfully create ping traffic?() A. user@router# ping 10.10.10.1B. user@router# run ping 10.10.10.1C. user@router ping 10.10.10.1D. user@router request ping 10.10.10.1

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?() A. reflexiveB. extendedC. standardD. dynamic

What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

How do you ping from configuration mode?()A、[edit interfaces] user@router# run ping 1.1.1.1B、[edit interfaces] user@router# ping 1.1.1.1C、[edit interfaces] user@router# up ping 1.1.1.1D、[edit interfaces] user@router# exit ping 1.1.1.1

You can successfully ping a Bridged 1483 customer's workstation from the local ERX. However, a remote ERX router in your network cannot ping that same device. What could be causing this problem?()A、incorrect DSL network redistributionB、incorrect static host route configurationC、incorrect static customer route configurationD、incorrect default static route configuration on the end user

A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()A、Remotely connect to the user's laptop and review the network configuration settingsB、Ping the web server from inside the network to ensure it is still up and running.C、Check to make sure the company's website is accessible from the Internet.D、Ensure the Ethernet cable is securely plugged into the user's laptop

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()A、reflexiveB、extendedC、standardD、dynamic

In a TCP/IP network, which of the following protocols is involved when a user issues a ping command?()A、TCPB、UDPC、ICMPD、SMTP

Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sensors" "Sensor Event Policies" [rule name] to accomplish this?()A、IgnoreB、Replace users roleC、Terminate user sessionD、Disable user account

A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()A、Persistent sessionB、Dynamic evaluationC、Roaming sessionD、Browser request follow-through

Which two commands will successfully create ping traffic?()A、user@router# ping 10.10.10.1B、user@router# run ping 10.10.10.1C、user@router ping 10.10.10.1D、user@router request ping 10.10.10.1

You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )A、From System in Control Panel, select the Change Type option, and then select the Roaming profile option. B、From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. C、Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. D、Connect the portable computer to the network, and configure the user accounts for a roaming user profile.

Your network contains a server named Server1 that runs Windows Server 2008 R2. You have a user named User1. You need to ensure that User1 can schedule Data Collector Sets (DCSs) on Server1. The solution must minimize the number of rights assigned to User1. What should you do?()A、Add User1 to the Performance Log Users group.B、Add User1 to the Performance Monitor Users group.C、Assign the Profile single process user right to User1.D、Assign the Bypass traverse checking user right to User1.

You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? () A、Enable the Require domain controller to unlock policy.B、Set the Number of previous logons to cache policy to 0.  C、Remove all user and group accounts from the Log on locally user right. D、Remove all user and group accounts from the Access this computer from the network user right.

You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()A、The user permissions on the zone should be granted.B、The user permissions on the DNS zone should be granted.C、The user should be added to the DNSUpdateProxy Global security group.D、The user should be added to the DNSAdmins domain local security group.

A user named User1 uses a computer that runs Windows XP Professional. You need to enable User1 to create local user accounts. You must minimize the rights assigned to the User1 account.  Which group should you add User1 to?() A、AdministratorsB、Power UsersC、Users D、Network Configuration Operators

The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()A、No account. They can use the built-in guest account.B、No Account. They can use the built-in Administrator account.C、Local user accountD、Domain user account

You have a computer that runs Windows 7. The computer contains a folder named C:/data. You use Advanced Sharing to share C:/data by using the default share permissions. When a user tries to access theshare over the network, he gets an Access is Denied error message. You need to ensure that the user canaccess the share.  What should you do?()A、Allow file and printer sharing through Windows Firewall.B、Change the network location from a Public network to a Home or Work network.C、From the Security settings of the folder, assign the user the Read NTFS permission.D、From the Advanced Sharing settings of the folder, assign the user the Read share permission.

The user cannot access some Internet websites, but can connect to resources inside the local network. The technician successfully uses the ping command to test the user’s connectivity. Which of the following commands can the technician run NEXT to troubleshoot the issue?()A、net /?B、ipconfig /flushdnsC、netstat -rD、nbtstat -R

You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()A、Instruct the user to move the documents to the Shared Folders folder.B、Add the user's user account to the local Power Users group.C、Add the user's user account to the Network Configuration Operators group.D、Add the user's user account to the local Adminstrators group.

单选题You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )AFrom System in Control Panel, select the Change Type option, and then select the Roaming profile option. BFrom Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. CUse the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. DConnect the portable computer to the network, and configure the user accounts for a roaming user profile.

单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()ABPDUBPort securityCRSTPDSTPEVTPFBlocking mode

单选题A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()ARemotely connect to the user's laptop and review the network configuration settingsBPing the web server from inside the network to ensure it is still up and running.CCheck to make sure the company's website is accessible from the Internet.DEnsure the Ethernet cable is securely plugged into the user's laptop

单选题You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network. What should you do?()AOn Folder1, modify the share permissions.BOn Folder1, modify the NTFS permissions.CAdd all local user accounts to the Guests group. DAdd all local user accounts to the Network Configuration Operators group.

单选题How do you ping from configuration mode?()A[edit interfaces] user@router# run ping 1.1.1.1B[edit interfaces] user@router# ping 1.1.1.1C[edit interfaces] user@router# up ping 1.1.1.1D[edit interfaces] user@router# exit ping 1.1.1.1