Which of the following commands should be used to delete an entry from the /etc/inittab?() A.xitabB.rmitabC.chitabD.delitab
After applying a new ACL on a device, its CPU utilization rose significantly and many messages startingwith "%SEC-6-IPACCESSLOG" appeared on the Syslog server.What can be done to resolve this situation?()A、Increase memory allocation for ACLs.B、Remove all entries from the ACL and use a single permit ip any any statement.C、Remove the log keyword from each ACL entry.D、Reboot the device after the ACL has been applied.
Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()A、PhysicalB、LogicalC、SoftwareD、Authentication
As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you in what might happen if he issues the logging trap information command. Which of the following statement will answer his quest|on?()A、Informational and debug messages are logged to the syslog server.B、All messages are sent to the logging host, where selections are made.C、An information trap is sent to the SNMP server.D、All messages from emergencies to informational are sent to the logging host.
Which of the following are shared distribution tree characteristics? (Choose all that apply.)()A、Memory requirements are higher for shared distribution tree than for source distribution treeB、Creates a tree from a central RP to all last-hop routersC、Uses a rendezvous pointD、An optimal path is created between each source router and each last-hop routerE、Place (S,G) entry in each router’s multicast routing tableF、Place (*,G) entry in a router’s multicast routing to table
DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()A、 validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP serversB、 intercepts all ARP requests and responses on untrusted portsC、 builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addressesD、 uses the DHCP snooping binding database to validate subsequent requests from untrusted hostsE、 limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry
A blade server has been configured to boot from SAN. After an HBA firmware upgrade the blade was rebooted and cannot find the operating system. Which of the following should the administrator do NEXT to troubleshoot the issue?()A、Verify all HBA settings.B、Upgrade the blade firmware.C、Upgrade the OS level HBA drivers.D、Set the system to boot from the local disk.
At system install, the /etc/syslog.conf file specifies that messages be logged for which facilities?()A、communicationsB、kernelC、securityD、none
How can a directory be excluded from a mksysb backup of the following?()A、Put an entry in the /etc/exclude.rootvg fileB、Put an entry in the /etc/mksysb.exclude fileC、Remove the directory’s entry from the mksysb /image.data fileD、Remove the directory’s entry from the /var/adm/ras/bosinst.data file
Which of the following commands should be used to delete an entry from the /etc/inittab?()A、xitabB、rmitabC、chitabD、delitab
Which procedure should be used to configure the system to prevent all users from using the ’at’ command()? A、Create a /var/adm/cron/at.allow file with no entriesB、Create a /var/adm/cron/at.deny file with ’*’ as the only entryC、Create a /var/adm/at/at.deny file with ’ALL’ as the only entryD、Create a /var/adm/at/at.allow file with ’NONE’ as the only entry
The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin Which of the following will result from this entry?()A、 All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. B、 All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. C、 All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. D、 All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.
Your PROD database has been started using the server parameter file. In your PROD database you are using RMAN for backup and recovery operations. You issue the following commands from the RMAN prompt: RMAN CONFIGURE CONTROLFILE AUTOBACKUP OFF; RMAN BACKUP DATABASE; Which files from the database will be backed up as a result of this BACKUP command?()A、 control fileB、 all datafilesC、 password fileD、 online redo log fileE、 archive redo log fileF、 server parameter fileG、 only the SYSTEM datafile
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The organization contains five Hub Transport servers.All of the Hub Transport servers are listed as source servers for a Send connector to the Internet. You need to prevent a Hub Transport server named Hubl from sending and receiving e-mail messages from the Internet.The solution must meet the following requirements: (1)Ensure that Mailbox servers can deliver e-mail messages to Hub1. (2)Ensure that all other Hub Transport servers can deliver e-mail messages to the Internet. What should you do on Hub1?()A、Suspend all message queues.B、Stop the Microsoft Exchange Transport service.C、Disable all Receive connectors and Send connectors.D、Stop the Microsoft Exchange Mail Submission Service.
单选题How can a directory be excluded from a mksysb backup of the following?()APut an entry in the /etc/exclude.rootvg fileBPut an entry in the /etc/mksysb.exclude fileCRemove the directory’s entry from the mksysb /image.data fileDRemove the directory’s entry from the /var/adm/ras/bosinst.data file
单选题A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()AMulticastingBProxy serverCNATDSubnetting
单选题A blade server has been configured to boot from SAN. After an HBA firmware upgrade the blade was rebooted and cannot find the operating system. Which of the following should the administrator do NEXT to troubleshoot the issue?()AVerify all HBA settings.BUpgrade the blade firmware.CUpgrade the OS level HBA drivers.DSet the system to boot from the local disk.
多选题For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).ADisable all 802.11 trafficBDisable the SSID from broadcastingCDisable WPADEnable Bluetooth only communicationEChange the default admin passwordFDisable WEP
单选题You are an administrator in a company that has a Main Office and 5 branch offices.In every branch office exist a Hub Transport server, and only in Main Office exists an Edge server.You add a disclaimer to all internal and external e-mail messages sent by users in the company. You discover that e-mail messages sent from one of Branch Offices do not include the disclaimer.You need to ensure that all e-mail messages include disclaimer.What should you do?()ARestart Microsoft Exchange System AttendantBModify cache settings of Branch Offices Hub Transport ServerCForce Active Directory replication on the Branch Office Domain ControllerDExport all transport rules from the Hub Transport Server in Main Office import the transport rules in the branch office Hub Transport Server
单选题Which procedure should be used to configure the system to prevent all users from using the ’at’ command()?ACreate a /var/adm/cron/at.allow file with no entriesBCreate a /var/adm/cron/at.deny file with ’*’ as the only entryCCreate a /var/adm/at/at.deny file with ’ALL’ as the only entryDCreate a /var/adm/at/at.allow file with ’NONE’ as the only entry
单选题Which of the following commands should be used to delete an entry from the /etc/inittab?()AxitabBrmitabCchitabDdelitab
单选题You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The organization contains five Hub Transport servers.All of the Hub Transport servers are listed as source servers for a Send connector to the Internet. You need to prevent a Hub Transport server named Hubl from sending and receiving e-mail messages from the Internet.The solution must meet the following requirements: (1)Ensure that Mailbox servers can deliver e-mail messages to Hub1. (2)Ensure that all other Hub Transport servers can deliver e-mail messages to the Internet. What should you do on Hub1?()ASuspend all message queues.BStop the Microsoft Exchange Transport service.CDisable all Receive connectors and Send connectors.DStop the Microsoft Exchange Mail Submission Service.
单选题After applying a new ACL on a device, its CPU utilization rose significantly and many messages starting with "%SEC-6-IPACCESSLOG" appeared on the Syslog server. What can be done to resolve this situation?()AIncrease memory allocation for ACLs.BRemove all entries from the ACL and use a single permit ip any any statement.CRemove the log keyword from each ACL entry.DReboot the device after the ACL has been applied.
单选题The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin Which of the following will result from this entry?()A All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. B All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. C All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. D All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.
单选题A system has a TCPIP issue that is a known problem. The newest code from the support website has been downloaded to resolve the issue. Which of the following commands should be used to install the new code?()Asmitty install_commitBinstallp -ugVCinstallp -aXDinstfix -all
单选题Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()AREVOKE ALL PRIVILEGES FROM USER tomBREVOKE ALL ON EMPLOYEE FROM USER tomCREVOKE EXECUTE ON EMPLOYEE FROM USER tomDREVOKE PRIVILEGES ON EMPLOYEE FROM USER tom
单选题Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()APhysicalBLogicalCSoftwareDAuthentication
单选题At system install, the /etc/syslog.conf file specifies that messages be logged for which facilities?()AcommunicationsBkernelCsecurityDnone