SNTP
SMTP
HTTP
SNMP
第1题:
A.WEP
B.PEAP
C.WPA
D.TKIP
第2题:
A.NTP
B.FTP
C.RTP
D.IGMP
第3题:
Which of the following protocols is used to encrypt data between web servers and web browsers?()
第4题:
Which of the following protocols can be used to retrieve system and network performance information from a router?()
第5题:
Which of the following protocols is commonly used for VoIP technology?()
第6题:
Which of the following protocols should be used to monitor network performance?()
第7题:
Which of the following would be used to monitor unauthorized access to data files?()
第8题:
Which of the following WLM commands should be used to monitor performance on a system running wlm?()
第9题:
istat
topas
vmstat
filemon
第10题:
LDAP
IMAP
TFTP
SNMP
第11题:
WEP
PEAP
WPA
TKIP
第12题:
lsattr
pstat
netstat
ifconfig
第13题:
A.SNTP
B.SMTP
C.HTTP
D.SNMP
第14题:
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
第15题:
Which of the following commands should be used to monitor disk utilization during the time a system is experiencing a disk I/O performance problem?()
第16题:
A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?()
第17题:
A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?()
第18题:
Which of the following protocols would be used in order to log into a router to configure a VLAN?()
第19题:
Which of the following network protocols is used to ensure consistent time across network devices on the domain?()
第20题:
Which of the following commands should be used to report statistics on network protocols used by the system?()
第21题:
IPv6
RIP
IGRP
RIPv2
第22题:
SNTP
SMTP
HTTP
SNMP
第23题:
wlmcntrl
wlmstat
wlmcheck
wlmassign
第24题:
NTP
FTP
RTP
IGMP