hostname
loopback address
default gateway
domain name
SSH peer address
第1题:
You need to store elements in a collection that guarantees that no duplicates are stored. Which two interfaces provide that capability?()
第2题:
Your company has a Microsoft Hyper-V Server 2008 R2 environment. You need to manually back up a child partition while it is turned off. Which two elements should you back up?()
第3题:
Which two of these elements need to be configured prior to enabling SSH?()
第4题:
You need to configure port security on switch R1. Which two statements are true about this technology? ()
第5题:
EJB Archive
Deployment Descriptor
META-INF sub directory
Resource Adapter archive
Java library
第6题:
Java.util.Map
Java.util.Set
Java.util.List
Java.util.StoredSet
Java.util.StoredMap
Java.util.Collection
第7题:
ListBox
DockPanel
WrapPanel
StackPanel
第8题:
when row directories need more row entries
when there is row migration in the data block
when there is an increase in the PCTFREE value for the data block
when more transaction slots are required than are initially configured
第9题:
Port security can be configured for ports supporting VoIP.
With port security configured, four MAC addresses are allowed by default.
The network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.
Withsecurity configured, only one MAC addresses is allowed by default.
Port security cannot be configured for ports supporting VoIP.
第10题:
mode
IKE gateway
security proposal
Perfect Forward Secrecy
第11题:
<realm-name>
<url-pattern>
<description>
<web-resource-name>
<transport-guarantee>
第12题:
Software
Courseware
Operatingsystem
I/Odevices
第13题:
Which two are correct steps in taking a binary backup of MyISAM tables?()
第14题:
Which two attributes need to match for two switches to become members of the same MST region? ()
第15题:
In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()
第16题:
Shared single interface
IP Address
TCP-based hello packets
MAC address
第17题:
PPPoE with the 827 configured as a bridge
PPPoE with the 827 configured as the PPPoE client
PPPoA
RFC 1483 Bridged with the 827 configured as the PPPoE client
RFC 1482 Bridged with the 827 configured as a bridge
第18题:
A
B
C
D
第19题:
hostname
loopback address
default gateway
domain name
SSH peer address
第20题:
Always stop the server prior to the backup
Stop the server or lock the tables prior to the backup
Stop the server or lock the databases prior to the backup
Make a copy of the .frm, .myd, and the .myi files
Make a copy of the binary log and tablespace files
第21题:
private VLANs
port security
BPDU guard
dynamic ARP inspection
DHCP snooping
第22题:
mode
IKE gateway
security proposal
Perfect Forward Secrecy
第23题:
the system state
the InitialStore.xml file
the child .vhd files
the child .xml configuration file
第24题:
the table of 4096 elements that map the respective VLAN to STP instance number
VTP version
configuration revision number
native VLAN ID