参考答案和解析
正确答案: C
解析: 暂无解析
更多“单选题Which of the following protocols should be used to monitor network performance?()A SNTPB SMTPC HTTPD SNMP”相关问题
  • 第1题:

    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()

    A.WEP

    B.PEAP

    C.WPA

    D.TKIP


    参考答案:A

  • 第2题:

    Which of the following network protocols is used to ensure consistent time across network devices on the domain?()

    A.NTP

    B.FTP

    C.RTP

    D.IGMP


    参考答案:A

  • 第3题:

    Which of the following protocols is used to encrypt data between web servers and web browsers?()

    • A、SMTP
    • B、SIP
    • C、HTTP
    • D、SSL

    正确答案:D

  • 第4题:

    Which of the following protocols can be used to retrieve system and network performance information from a router?()

    • A、LDAP
    • B、IMAP
    • C、TFTP
    • D、SNMP

    正确答案:D

  • 第5题:

    Which of the following protocols is commonly used for VoIP technology?()

    • A、Telnet
    • B、SMTP
    • C、SIP
    • D、SNMP

    正确答案:C

  • 第6题:

    Which of the following protocols should be used to monitor network performance?()

    • A、SNTP
    • B、SMTP
    • C、HTTP
    • D、SNMP

    正确答案:D

  • 第7题:

    Which of the following would be used to monitor unauthorized access to data files?()

    • A、Performance Log and Alerts
    • B、Event Viewer
    • C、Security Configuration and Analysis
    • D、IP Security Monitor

    正确答案:B

  • 第8题:

    Which of the following WLM commands should be used to monitor performance on a system running wlm?()

    • A、 wlmcntrl
    • B、 wlmstat
    • C、 wlmcheck
    • D、 wlmassign

    正确答案:B

  • 第9题:

    单选题
    Which of the following commands should be used to monitor disk utilization during the time a system is experiencing a disk I/O performance problem?()
    A

     istat

    B

     topas

    C

     vmstat

    D

     filemon


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following protocols can be used to retrieve system and network performance information from a router?()
    A

    LDAP

    B

    IMAP

    C

    TFTP

    D

    SNMP


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
    A

    WEP

    B

    PEAP

    C

    WPA

    D

    TKIP


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following commands should be used to report statistics on network protocols used by the system?()
    A

     lsattr

    B

     pstat

    C

     netstat

    D

     ifconfig


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which of the following protocols should be used to monitor network performance?()

    A.SNTP

    B.SMTP

    C.HTTP

    D.SNMP


    参考答案:D

  • 第14题:

    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()

    • A、WEP
    • B、PEAP
    • C、WPA
    • D、TKIP

    正确答案:A

  • 第15题:

    Which of the following commands should be used to monitor disk utilization during the time a system is experiencing a disk I/O performance problem?()

    • A、 istat
    • B、 topas
    • C、 vmstat
    • D、 filemon

    正确答案:B

  • 第16题:

    A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?()

    • A、FTP
    • B、SMTP
    • C、POP
    • D、SNMP

    正确答案:B

  • 第17题:

    A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?()

    • A、IPv6
    • B、RIP
    • C、IGRP
    • D、RIPv2

    正确答案:D

  • 第18题:

    Which of the following protocols would be used in order to log into a router to configure a VLAN?()

    • A、RDP
    • B、SMTP
    • C、TELNET
    • D、FTP

    正确答案:C

  • 第19题:

    Which of the following network protocols is used to ensure consistent time across network devices on the domain?()

    • A、NTP
    • B、FTP
    • C、RTP
    • D、IGMP

    正确答案:A

  • 第20题:

    Which of the following commands should be used to report statistics on network protocols used by the system?()

    • A、 lsattr
    • B、 pstat
    • C、 netstat
    • D、 ifconfig

    正确答案:C

  • 第21题:

    单选题
    A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?()
    A

    IPv6

    B

    RIP

    C

    IGRP

    D

    RIPv2


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following protocols should be used to monitor network performance?()
    A

    SNTP

    B

    SMTP

    C

    HTTP

    D

    SNMP


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following WLM commands should be used to monitor performance on a system running wlm?()
    A

     wlmcntrl

    B

     wlmstat

    C

     wlmcheck

    D

     wlmassign


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following network protocols is used to ensure consistent time across network devices on the domain?()
    A

    NTP

    B

    FTP

    C

    RTP

    D

    IGMP


    正确答案: B
    解析: 暂无解析