多选题Which two of these elements need to be configured prior to enabling SSH?()AhostnameBloopback addressCdefault gatewayDdomain nameESSH peer address

题目
多选题
Which two of these elements need to be configured prior to enabling SSH?()
A

hostname

B

loopback address

C

default gateway

D

domain name

E

SSH peer address


相似考题
更多“Which two of these elements need to be configured prior to e”相关问题
  • 第1题:

    You need to store elements in a collection that guarantees that no duplicates are stored. Which two interfaces provide that capability?()

    • A、 Java.util.Map
    • B、 Java.util.Set
    • C、 Java.util.List
    • D、 Java.util.StoredSet
    • E、 Java.util.StoredMap
    • F、 Java.util.Collection

    正确答案:B,D

  • 第2题:

    Your company has a Microsoft Hyper-V Server 2008 R2 environment. You need to manually back up a child partition while it is turned off. Which two elements should you back up?()

    • A、the system state
    • B、the InitialStore.xml file
    • C、the child .vhd files
    • D、the child .xml configuration file

    正确答案:C,D

  • 第3题:

    Which two of these elements need to be configured prior to enabling SSH?()

    • A、hostname
    • B、loopback address
    • C、default gateway
    • D、domain name
    • E、SSH peer address

    正确答案:A,D

  • 第4题:

    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()

    • A、 Port security can be configured for ports supporting VoIP.
    • B、 With port security configured, four MAC addresses are allowed by default.
    • C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.
    • D、  Withsecurity configured, only one MAC addresses is allowed by default.  
    • E、 Port security cannot be configured for ports supporting VoIP.

    正确答案:A,D

  • 第5题:

    多选题
    Which two elements of the Java Enterprise Application Archive are required?()
    A

    EJB Archive

    B

    Deployment Descriptor

    C

    META-INF sub directory

    D

    Resource Adapter archive

    E

    Java library


    正确答案: A,C
    解析: 暂无解析

  • 第6题:

    多选题
    You need to store elements in a collection that guarantees that no duplicates are stored. Which two interfaces provide that capability?()
    A

    Java.util.Map

    B

    Java.util.Set

    C

    Java.util.List

    D

    Java.util.StoredSet

    E

    Java.util.StoredMap

    F

    Java.util.Collection


    正确答案: A,E
    解析: 暂无解析

  • 第7题:

    单选题
    You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application that allows users to arrange images. You need to ensure that users can arrange child elements in a panel without affecting the size of the elements. You also need to ensure that child elements are oriented horizontally. Which control should you use?()
    A

     ListBox

    B

     DockPanel

    C

     WrapPanel

    D

     StackPanel


    正确答案: C
    解析: 暂无解析

  • 第8题:

    多选题
    Identify two situations in which the block header grows in a data block. ()
    A

    when row directories need more row entries

    B

    when there is row migration in the data block

    C

    when there is an increase in the PCTFREE value for the data block

    D

    when more transaction slots are required than are initially configured


    正确答案: C,A
    解析: 暂无解析

  • 第9题:

    多选题
    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()
    A

    Port security can be configured for ports supporting VoIP.

    B

    With port security configured, four MAC addresses are allowed by default.

    C

    The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.

    D

      Withsecurity configured, only one MAC addresses is allowed by default.

    E

    Port security cannot be configured for ports supporting VoIP.


    正确答案: A,E
    解析: 暂无解析

  • 第10题:

    多选题
    Which two parameters are configured in IPsec policy? ()(Choose two.)
    A

    mode

    B

    IKE gateway

    C

    security proposal

    D

    Perfect Forward Secrecy


    正确答案: C,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two are required elements for the  element of a web applicationdeployment descriptor?()
    A

    <realm-name>

    B

    <url-pattern>

    C

    <description>

    D

    <web-resource-name>

    E

    <transport-guarantee>


    正确答案: C,D
    解析: 暂无解析

  • 第12题:

    单选题
    Computer systems consist of two very different types of elements:Hardware,which includes all the physical things that can be touched and(),which tells thehardware how to do.
    A

    Software

    B

    Courseware

    C

    Operatingsystem

    D

    I/Odevices


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which two are correct steps in taking a binary backup of MyISAM tables?()

    • A、Always stop the server prior to the backup
    • B、Stop the server or lock the tables prior to the backup
    • C、Stop the server or lock the databases prior to the backup
    • D、Make a copy of the .frm, .myd, and the .myi files
    • E、Make a copy of the binary log and tablespace files

    正确答案:B,D

  • 第14题:

    Which two attributes need to match for two switches to become members of the same MST region?  ()

    • A、the table of 4096 elements that map the respective VLAN to STP instance number
    • B、VTP version
    • C、configuration revision number
    • D、native VLAN ID

    正确答案:A,C

  • 第15题:

    In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()

    • A、private VLANs
    • B、port security
    • C、BPDU guard
    • D、dynamic ARP inspection
    • E、DHCP snooping

    正确答案:A

  • 第16题:

    多选题
    When HSRP is configured on a network, which two of these items are provided, which are shared between the routers that run HSRP ?() (choose two)
    A

    Shared single interface

    B

    IP Address

    C

    TCP-based hello packets

    D

    MAC address


    正确答案: A,D
    解析: 暂无解析

  • 第17题:

    多选题
    Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()
    A

    PPPoE with the 827 configured as a bridge

    B

    PPPoE with the 827 configured as the PPPoE client

    C

    PPPoA

    D

    RFC 1483 Bridged with the 827 configured as the PPPoE client

    E

    RFC 1482 Bridged with the 827 configured as a bridge


    正确答案: B,D
    解析: 暂无解析

  • 第18题:

    多选题
    Which two code fragments correctly create and initialize a static array of int elements?()
    A

    A

    B

    B

    C

    C

    D

    D


    正确答案: A,C
    解析: 暂无解析

  • 第19题:

    多选题
    Which two of these elements need to be configured prior to enabling SSH? ()
    A

    hostname

    B

    loopback address

    C

    default gateway

    D

    domain name

    E

    SSH peer address


    正确答案: A,C
    解析: 暂无解析

  • 第20题:

    多选题
    Which two are correct steps in taking a binary backup of MyISAM tables?()
    A

    Always stop the server prior to the backup

    B

    Stop the server or lock the tables prior to the backup

    C

    Stop the server or lock the databases prior to the backup

    D

    Make a copy of the .frm, .myd, and the .myi files

    E

    Make a copy of the binary log and tablespace files


    正确答案: B,A
    解析: 暂无解析

  • 第21题:

    单选题
    In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()
    A

    private VLANs

    B

    port security

    C

    BPDU guard

    D

    dynamic ARP inspection

    E

    DHCP snooping


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two parameters are configured in IPsec policy?()
    A

    mode

    B

    IKE gateway

    C

    security proposal

    D

    Perfect Forward Secrecy


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    Your company has a Microsoft Hyper-V Server 2008 R2 environment. You need to manually back up a child partition while it is turned off. Which two elements should you back up?()
    A

    the system state

    B

    the InitialStore.xml file

    C

    the child .vhd files

    D

    the child .xml configuration file


    正确答案: D,C
    解析: 暂无解析

  • 第24题:

    多选题
    Which two attributes need to match for two switches to become members of the same MST region?()
    A

    the table of 4096 elements that map the respective VLAN to STP instance number

    B

    VTP version

    C

    configuration revision number

    D

    native VLAN ID


    正确答案: A,C
    解析: 暂无解析