As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you in what might happen if he issues the logging trap information command. Which of the following statement will answer his quest|on?()
第1题:
As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)
A. It provides reliable input for verifying network consistency.
B. It requires a network audit to support some upgrade decisions.
C. It requires a network audit to support any network restructuring.
D. It begins with gathering organizational input that may be inaccurate.
第2题:
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()
A.19dbm
B.10dbm
C.67dbm
D.86dbm
第3题:
As an experienced technician, you are responsible forT echnical Support in your company. One of the trainee implement RIP routing contests in MPLS VPN. How to respond?()
第4题:
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
第5题:
As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you which Cisco VPN Acceleration Module for Cisco 7200 Series routers and the Cisco 7301 provides high-performance encryption/compression and supports the latest encryption standard. Which of the following will answer his question?()
第6题:
As an experienced technician, you are responsible for infrastructure design and globalconfiguration changes. You are asked to deploy a Voice over Wireless LAN for your company. Ifthe cells have the same channel, the separation between them should be()
第7题:
You are a database administrator for your company. You are responsible for a SQL Server 2005 database that has several indexes. You need to write a stored procedure that checks the indexes for fragmentation. Which Transact-SQL statement should you use?()
第8题:
You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as the database administrator for your company. You find a problem that there are three reports which are running slowly. And through detailed analysis, you conclude that no error messages are generated from these reports. Not only the indexing strategy but also the status of the current indexes is tested by you. You confirm that the slow performance of the financial reports is not caused by it. Since you are the technical support, you are required to find out which statement is causing the slow performance. Which action should be performed first?()
第9题:
This out-of-band approach supports scaling
SLB· is not inline.
Mode is not as common as bridge or routed mode.
Return traffic requires PB·R, server default gateway pointing to SLB·, or client source NAT·
第10题:
inline with a firewall
in a DMZ outside the firewall
parallel with a firewall
in a DMZ behind the firewall
第11题:
inline with a firewall
in a DMZ outside the firewall
parallel with a firewall
in a DMZ behind the firewall
第12题:
19dbm
10dbm
67dbm
86dbm
第13题:
A. This out-of-band approach supports scaling
B. SLB is not inline.
C. Mode is not as common as bridge or routed mode.
D. Return traffic requires PBR, server default gateway pointing to SLB, or client source NAT.
第14题:
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
A. inline with a firewall
B. in a DMZ outside the firewall
C. parallel with a firewall
D. in a DMZ behind the firewall
第15题:
As an experienced technician, you are responsible for Technical Support. Which of the followingdescriptions is correct about the characteristic of SLB one arm mode?()
第16题:
As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()
第17题:
As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you how to create separate networks on one Storage Area Network so as to provide enhanced availability, security, etc. Which of the following solution will enable that?()
第18题:
As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
第19题:
You are the desktop administrator for your company. You are responsible for automating the deployment of Windows XP Professional to new computers in your company. You are preparing a Windows XP Professional computer, which you will use to test disk imaging. You install Windows XP Professional on the test computer and run the Sysprep utility. You use a third-party software package to create a disk image. You apply the disk image to a new computer and then restart the computer. Instead of completing the Windows XP Professional installation, the computer starts the Windows Welcome program, requiring you to enter additional setup information. Because you will be deploying a large number of computers, you want to ensure that the disk image can be applied without additional user interaction. What should you do?()
第20题:
It provides reliable input for verifying network consistency.
It requires a network audit to support some upgrade decisions.
It requires a network audit to support any network restructuring.
It begins with gathering organizational input that may be inaccurate.
第21题:
第22题:
第23题:
Informational and debug messages are logged to the syslog server.
All messages are sent to the logging host, where selections are made.
An information trap is sent to the SNMP server.
All messages from emergencies to informational are sent to the logging host.