Packet analysis
QoS
Traffic shaping
Fault tolerance
第1题:
A.NTP
B.FTP
C.RTP
D.IGMP
第2题:
Which of the following IP hosts would be valid for PC users, assuming that a /27 network mask was used for all of the networks?()
第3题:
A technician is called for a computer that is not connecting to the network. Which of the following would be the MOST common tool used to identify the issue? ()
第4题:
Which of the following features would BEST be used to optimize real-time voice and video chat?()(Select TWO)
第5题:
Which of the following utilities would a technician use to determine network utilization? ()
第6题:
Which of the following would restrict traffic from a specific host to a network?()
第7题:
Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()
第8题:
Which of the following network protocols is used to ensure consistent time across network devices on the domain?()
第9题:
Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()
第10题:
An AIX system, which is running a database, is having performance issues with I/O writing. The DBA has provided numbers for the HIGH and LOW watermarks for pending file writes, which will optimize the system for best performance. To set these numbers, which of the following commands would be used?()
第11题:
netpmon
netstat
nfsstat
vmstat
第12题:
lsattr
pstat
netstat
ifconfig
第13题:
A.15.234.118.63
B.83.121.178.93
C.134.178.18.56
D.192.168.19.37
E.201.45.116.159
F.217.63.12.192
第14题:
Which of the following would be used to optimize network performance and increase bandwidth availability?()
第15题:
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
第16题:
Which of the following would BEST optimize a computer that is heavily used? ()
第17题:
Which of the following protocols should be used to monitor network performance?()
第18题:
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()
第19题:
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
第20题:
On which of the following network devices would an administrator configure an ACL?()
第21题:
Which of the following commands should be used to report statistics on network protocols used by the system?()
第22题:
Load balancing
Caching engines
Qos
Fault tolerance systems
Traffic shaping
第23题:
perfmon -h 30 -l 25
chdev
no -o
smit chgsys
第24题:
15.234.118.63
83.121.178.93
134.178.18.56
192.168.19.37
201.45.116.159
217.63.12.192