单选题A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do 

题目
单选题
A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()
A

Edit the /etc/hosts file and add an alias to the correct entry

B

Set up an alias in his .kshrc file to alias the hostname to the fully qualified hostname

C

Add an alias to /etc/aliases

D

Add mars.net to the search path of the resolv.conf file


相似考题
更多“单选题A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do ”相关问题
  • 第1题:

    How do you ping from configuration mode?()

    • A、[edit interfaces]   user@router# run ping 1.1.1.1
    • B、[edit interfaces]   user@router# ping 1.1.1.1
    • C、[edit interfaces]   user@router# up ping 1.1.1.1
    • D、[edit interfaces]   user@router# exit ping 1.1.1.1

    正确答案:A

  • 第2题:

    A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()

    • A、Remotely connect to the user's laptop and review the network configuration settings
    • B、Ping the web server from inside the network to ensure it is still up and running.
    • C、Check to make sure the company's website is accessible from the Internet.
    • D、Ensure the Ethernet cable is securely plugged into the user's laptop

    正确答案:C

  • 第3题:

    A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

    • A、reflexive
    • B、extended
    • C、standard
    • D、dynamic

    正确答案:D

  • 第4题:

    Which two commands will successfully create ping traffic?()

    • A、user@router# ping 10.10.10.1
    • B、user@router# run ping 10.10.10.1
    • C、user@router> ping 10.10.10.1
    • D、user@router> request ping 10.10.10.1

    正确答案:B,C

  • 第5题:

    The user cannot access some Internet websites, but can connect to resources inside the local network. The technician successfully uses the ping command to test the user’s connectivity. Which of the following commands can the technician run NEXT to troubleshoot the issue?()

    • A、net /?
    • B、ipconfig /flushdns
    • C、netstat -r
    • D、nbtstat -R

    正确答案:B

  • 第6题:

    单选题
    In a TCP/IP network, which of the following protocols is involved when a user issues a ping command?()
    A

    TCP

    B

    UDP

    C

    ICMP

    D

    SMTP


    正确答案: D
    解析: 暂无解析

  • 第7题:

    单选题
    A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()
    A

    reflexive

    B

    extended

    C

    standard

    D

    dynamic


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )
    A

    From System in Control Panel, select the Change Type option, and then select the Roaming profile option. 

    B

    From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. 

    C

    Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. 

    D

    Connect the portable computer to the network, and configure the user accounts for a roaming user profile.


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    You can successfully ping a Bridged 1483 customer's workstation from the local ERX. However, a remote ERX router in your network cannot ping that same device. What could be causing this problem?()
    A

    incorrect DSL network redistribution

    B

    incorrect static host route configuration

    C

    incorrect static customer route configuration

    D

    incorrect default static route configuration on the end user


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()
    A

    Ignore

    B

    Replace users role

    C

    Terminate user session

    D

    Disable user account


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network. What should you do?()
    A

    On Folder1, modify the share permissions.

    B

    On Folder1, modify the NTFS permissions.

    C

    Add all local user accounts to the Guests group. 

    D

    Add all local user accounts to the Network Configuration Operators group.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    How do you ping from configuration mode?()
    A

    [edit interfaces]   user@router# run ping 1.1.1.1

    B

    [edit interfaces]   user@router# ping 1.1.1.1

    C

    [edit interfaces]   user@router# up ping 1.1.1.1

    D

    [edit interfaces]   user@router# exit ping 1.1.1.1


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You can successfully ping a Bridged 1483 customer's workstation from the local ERX. However, a remote ERX router in your network cannot ping that same device. What could be causing this problem?()

    • A、incorrect DSL network redistribution
    • B、incorrect static host route configuration
    • C、incorrect static customer route configuration
    • D、incorrect default static route configuration on the end user

    正确答案:A

  • 第14题:

    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

    • A、BPDU
    • B、Port security
    • C、RSTP
    • D、STP
    • E、VTP
    • F、Blocking mode

    正确答案:B

  • 第15题:

    In a TCP/IP network, which of the following protocols is involved when a user issues a ping command?()

    • A、TCP
    • B、UDP
    • C、ICMP
    • D、SMTP

    正确答案:C

  • 第16题:

    You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )

    • A、From System in Control Panel, select the Change Type option, and then select the Roaming profile option. 
    • B、From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. 
    • C、Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. 
    • D、Connect the portable computer to the network, and configure the user accounts for a roaming user profile.

    正确答案:D

  • 第17题:

    You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()

    • A、Instruct the user to move the documents to the Shared Folders folder.
    • B、Add the user's user account to the local Power Users group.
    • C、Add the user's user account to the Network Configuration Operators group.
    • D、Add the user's user account to the local Adminstrators group.

    正确答案:B

  • 第18题:

    单选题
    You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()
    A

    Enable the Require domain controller to unlock policy.

    B

    Set the Number of previous logons to cache policy to 0.  

    C

    Remove all user and group accounts from the Log on locally user right. 

    D

    Remove all user and group accounts from the Access this computer from the network user right. 


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()
    A

    Edit the /etc/hosts file and add an alias to the correct entry

    B

    Set up an alias in his .kshrc file to alias the hostname to the fully qualified hostname

    C

    Add an alias to /etc/aliases

    D

    Add mars.net to the search path of the resolv.conf file


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
    A

    BPDU

    B

    Port security

    C

    RSTP

    D

    STP

    E

    VTP

    F

    Blocking mode


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()
    A

    Persistent session

    B

    Dynamic evaluation

    C

    Roaming session

    D

    Browser request follow-through


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()
    A

    Remotely connect to the user's laptop and review the network configuration settings

    B

    Ping the web server from inside the network to ensure it is still up and running.

    C

    Check to make sure the company's website is accessible from the Internet.

    D

    Ensure the Ethernet cable is securely plugged into the user's laptop


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    The user cannot access some Internet websites, but can connect to resources inside the local network. The technician successfully uses the ping command to test the user’s connectivity. Which of the following commands can the technician run NEXT to troubleshoot the issue?()
    A

    net /?

    B

    ipconfig /flushdns

    C

    netstat -r

    D

    nbtstat -R


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()
    A

    Instruct the user to move the documents to the Shared Folders folder.

    B

    Add the user's user account to the local Power Users group.

    C

    Add the user's user account to the Network Configuration Operators group.

    D

    Add the user's user account to the local Adminstrators group.


    正确答案: D
    解析: 暂无解析