You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A. The switch name must match the workgroup name of the local network.B. The switch must be configured with an IP address and default gateway.C. The remote workstations must have access to the management VLAN of the switch.D. CDP must be enabled on the switch so that it can be located by other devices on the network.

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()

A. The switch name must match the workgroup name of the local network.

B. The switch must be configured with an IP address and default gateway.

C. The remote workstations must have access to the management VLAN of the switch.

D. CDP must be enabled on the switch so that it can be located by other devices on the network.


相关考题:

Examine this statement: SELECT student_id, gpa FROM student_grades WHERE gpa > You run the statement once, and when prompted you enter a value of 2.0. A report is produced. What happens when you run the statement a second time?()A. An error is returned.B. You are prompted to enter a new value.C. A report is produced that matches the first report produced.D. You are asked whether you want a new value or if you want to run the report based on the previous value.

In which case would you use a FULL OUTER JOIN? () A. Both tables have NULL values.B. You want all unmatched data from one table.C. You want all matched data from both tables.D. You want all unmatched data from both tables.E. One of the tables has more data than the other.F. You want all matched and unmatched data from only one table.

You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?() A. When you want all unauthenticated traffic to be redirectedB. When you want all clear text traffic to be redirected.C. When you want all authenticated traffic to be redirected.D. When you want all encrypted traffic to be redirected.

The CPU does not have to look(66)all of RAM to find the spot it needs. But RAM only(67)the data temporarily. As soon as you switch the computer(68), all that information disappears from the RAM. When you switch the computer on again, the RAM is(69), and ready(70)a new program and new data.A.onB.throughC.forD.down upon

You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()A. Fast ForwardB. Store and forwardC. Frag-freeD. None of the above

You are bringing up a new Cisco Catalyst switch, and wish to connect it via a trunk to another switch from a different vendor, which uses the IEEE standard for the trunking method.When setting the encapsulation type on the trunk, what should you configure on the Cisco switch?()A. Switch(config)# switchport trunk encapsulation islB. Switch(config)# switchport trunk encapsulation ietfC. Switch(config-if)# switchport trunk encapsulation islD. Switch(config-if)# switchport trunk encapsulation ietfE. Switch(config-if)# switchport trunk encapsulation dot1q

You are at a client site. It is a medium-sized business and needs a Cisco Catalyst switch that offers high availability and security. What type of Catalyst switches would you recommend?()A、 Catalyst 2960 SeriesB、 Catalyst 3750 SeriesC、 Catalyst 4900 SeriesD、 Catalyst 6500 Series

You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()A、Fast ForwardB、Store and forwardC、Frag-freeD、None of the above

Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()A、You may use Cisco Network Assistant to set up the initial configurationB、You must use CLI for initial configurationC、You may use either CLI or CAN for configurationD、You may make a direct connection to the PC from any point on the switchE、You may only make a direct connection from the port with the flashing green LED to the PC

You are bringing up a new Cisco Catalyst switch, and wish to connect it via a trunk to another switch from a different vendor, which uses the IEEE standard for the trunking method. When setting the encapsulation type on the trunk, what should you configure on the Cisco switch?()A、Switch(config)# switchport trunk encapsulation islB、Switch(config)# switchport trunk encapsulation ietfC、Switch(config-if)# switchport trunk encapsulation islD、Switch(config-if)# switchport trunk encapsulation ietfE、Switch(config-if)# switchport trunk encapsulation dot1q

What will happen if you issue the redundancy force-switchover command on a Catalyst 6500Series Switch with redundant supervisor modules?()A、reset of the primary supervisorB、manual switchover from standby to active supervisorC、manual switchover from active to standby supervisorD、automatic switchover from active to standby on primary supervisor failure

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A、The switch name must match the workgroup name of the local network.B、The switch must be configured with an IP address and default gateway.C、The remote workstations must have access to the management VLAN of the switch.D、CDP must be enabled on the switch so that it can be located by other devices on the network.

In which scenario will you use the Flashback Version Query feature?()A、 when you want to restore a table that has been dropped from the Recycle BinB、 when you want to identify the transaction ID of the transaction that deleted some important records from a tableC、 when you want to recover the schema of a dropped userD、when you want to restore a dropped tablespace

You have a computer that runs Windows XP Professional. You connect one local print device and install a printer. You share the printer. You need to give a user the ability to manage all new print jobs submitted to the printer. Your solution must prevent the user from installing additional local printers. What should you do?()A、In the printer properties, assign the Manage Printers permission to the user.B、In the printer properties, assign the Manage Documents permission to the user.C、From the Local Users and Groups snap-in, add the user to the Power Users group.D、From the Local Users and Groups snap-in, add the user to the Replicators group.

You work as a network administrator, and your responsibilities include managing server storage. You havebeen asked to purchase a new disk subsystem for your company’s storage-area network (SAN). You arein the process of testing hardware solutions before making purchases, and you attach a new disksubsystem to the network. You want to provision the new disks and create new logical unit numbers (LUNs)to assign to a server named Server1. You open Storage Manager for SANs, but you can’t see the newhardware. However, you can connect to the new hardware by using the software provided by the vendor.You want to be able to manage the new disk subsystem you purchase by using Storage Manager for SANs. What should you do?()A、In Disk Management, chooses the Rescan Disks option.B、Choose a disk subsystem from a vendor that has a Virtual Disk Service hardware provider.C、On Server1, configures iSCSI Initiator to specify the new hardware as a favorite target.D、Use Storage Explorer to configure Server1 as an iSNS server.

单选题In which scenario will you use the Flashback Version Query feature?()A when you want to restore a table that has been dropped from the Recycle BinB when you want to identify the transaction ID of the transaction that deleted some important records from a tableC when you want to recover the schema of a dropped userDwhen you want to restore a dropped tablespace

单选题You are bringing up a new Cisco Catalyst switch, and wish to connect it via a trunk to another switch from a different vendor, which uses the IEEE standard for the trunking method. When setting the encapsulation type on the trunk, what should you configure on the Cisco switch?()ASwitch(config)# switchport trunk encapsulation islBSwitch(config)# switchport trunk encapsulation ietfCSwitch(config-if)# switchport trunk encapsulation islDSwitch(config-if)# switchport trunk encapsulation ietfESwitch(config-if)# switchport trunk encapsulation dot1q

单选题You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()AWhen you want all unauthenticated traffic to be redirectedBWhen you want all clear text traffic to be redirected.CWhen you want all authenticated traffic to be redirected.DWhen you want all encrypted traffic to be redirected.

多选题You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()AThe switch name must match the workgroup name of the local network.BThe switch must be configured with an IP address and default gateway.CThe remote workstations must have access to the management VLAN of the switch.DCDP must be enabled on the switch so that it can be located by other devices on the network.

单选题In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the data file in a different location while resto ing the file.  Which option must you consider for this task?()A using only the RMAN SWITCH command to set the new location for the data fileB placing the database in the MOUNT state for the restore and recovery operationsC using an RMAN RUN block with the SET NEWNAME and then the SWITCH commandD configuring two channels: one for the restore operation and the other for the recovery operation

单选题You work as a database administrator at Certkiller .com. Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()A mount the new disk group in the ASM instanceB restart the ASM instance and the production database instanceC register the new disk groups in the production database instanceD restart the ASM instance without restarting the production database instanceE include the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance

单选题You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?()AGrant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. BGrant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. CGrant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. DGrant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account.

单选题As a network administrator, you have configured a Catalyst 6500 Series Switch with redundant supervisor engine in a CIS network. What is the result of issuing the redundancy force-switchover command on that switch?()AAutomatic switchover from active to standby on primary supervisor failureBReset of the primary supervisor.CManual switchover from active to standby supervisorDManual switchover from standby to active supervisor

单选题You work as a network administrator, and your responsibilities include managing server storage. You havebeen asked to purchase a new disk subsystem for your company’s storage-area network (SAN). You arein the process of testing hardware solutions before making purchases, and you attach a new disksubsystem to the network. You want to provision the new disks and create new logical unit numbers (LUNs)to assign to a server named Server1. You open Storage Manager for SANs, but you can’t see the newhardware. However, you can connect to the new hardware by using the software provided by the vendor.You want to be able to manage the new disk subsystem you purchase by using Storage Manager for SANs. What should you do?()AIn Disk Management, chooses the Rescan Disks option.BChoose a disk subsystem from a vendor that has a Virtual Disk Service hardware provider.COn Server1, configures iSCSI Initiator to specify the new hardware as a favorite target.DUse Storage Explorer to configure Server1 as an iSNS server.

单选题Examine this statement: SELECT student_id, gpa FROM student_grades WHERE gpa value; You run the statement once, and when prompted you enter a value of 2.0. A report is produced. What happens when you run the statement a second time?()AAn error is returned.BYou are prompted to enter a new value.CA report is produced that matches the first report produced.DYou are asked whether you want a new value or if you want to run the report based on the previous value.

单选题You are at a client site. It is a medium-sized business and needs a Cisco Catalyst switch that offers high availability and security. What type of Catalyst switches would you recommend?()A Catalyst 2960 SeriesB Catalyst 3750 SeriesC Catalyst 4900 SeriesD Catalyst 6500 Series

单选题You completed the development of a new application and want to create a new domain in a new environment for functional testing. You want to have the same settings for your new domain as your old domain, with the option of changing the configuration in the new target environment. Which two actions should you execute?()AUse the introspect () command in WLST to gather the configuration information from the  original domain.BUse pack/unpack to transfer the domain from one machine to another.CCreate a domain template from the original domain using the Domain Template Builder and use  the Configuration Wizard to create a new domain from the template.DUse the Admin Console of the original domain to create a domain template from the original  domain and use the Configuration Wizard to create a new domain from the template.

单选题Where do you configure SCREEN options?()Azones on which an attack might arriveBzones you want to protect from attackCinterfaces on which an attack might arriveDinterfaces you want to protect from attack