Which of the following answers can be verified as true based on the following command output from Router R1?()R1show ip ospf virtual - linksVirtual Link OSPF_VL0 to router 4.4.4.4 is upRun as demand circuitDoNotAge LSA alloweD.Transit area 1, via interfac

题目

Which of the following answers can be verified as true based on the following command output from Router R1?()R1show ip ospf virtual - linksVirtual Link OSPF_VL0 to router 4.4.4.4 is upRun as demand circuitDoNotAge LSA alloweD.Transit area 1, via interface FastEthernet0/1, Cost of using 3

A. R1 is configured with an area 0 virtual - link 4.4.4.4 cost 3 command.

B. The ping 4.4.4.4 command on R1 must currently be successful.

C. R1‘s Fa0/0 OSPF cost is 3.

D. 4.4.4.4 is known to R1 based on a Type 1 LSA in area 1.


相似考题
更多“Which of the following answers can be verified as true based on the following command outp ”相关问题
  • 第1题:

    Which of the following can NOT be regarded as a feature of successful English teacher?

    A.Thinking of learners' needs.
    B.Having a good command of English.
    C.Facilitating communicative activities.
    D.Following the course book only.

    答案:D
    解析:
    考查英语教师需具备的特征。题目问“下面哪一项不能被看作是一个成功的英语老师所具备的特征”。A项“考虑学习者的需求”,B项“具备良好的英语技能”,C项“促进交际活动”,D项“只按照课本走”。很显然,D项是错误的表述,故选D。

  • 第2题:

    The following configuration command was issued on router TK1:ip route 172.16.3.0 255.255.255.0 192.168.2.1.Which of the following statements are true regarding this command?()

    • A、The command is used to establish a static route.
    • B、The default administrative distance is used.
    • C、The command is used to configure the default route.
    • D、The subnet mask for the source address is 255.255.255.0
    • E、The command is used to establish a stub network

    正确答案:A,B

  • 第3题:

    Which of the following is TRUE about a caching name server?()

    • A、They must have a trusted SSL certificate
    • B、They can be authoritative
    • C、They cannot be load-balanced
    • D、They can be recursive
    • E、They require DHCP

    正确答案:B,D

  • 第4题:

    Which of the following command line utilities can Karen, a technician, use to check for open ports?()

    • A、nbtstat
    • B、ipconfig
    • C、nslookup
    • D、netstat

    正确答案:D

  • 第5题:

    Which of the following answers lists either a protocol or function that can be used by a host to dynamically learn its own IPv6 address?()

    • A、Stateful DHCP
    • B、Stateless DHCP
    • C、Stateless autoconfiguration
    • D、Neighbor Discovery Protocol

    正确答案:A,C

  • 第6题:

    The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?()

    • A、The default administrative distance is used.
    • B、The command is used to establish a static route.
    • C、The command is used to configure the router interfaces.
    • D、The command is used to establish a stub network.
    • E、The subnet mask for the source address is 255.255.255.0

    正确答案:A,B

  • 第7题:

    Which of the following tools can be used to schedule a backup operation that is to be run every Sunday evening?()

    • A、Journal
    • B、Task Center
    • C、Activity Monitor
    • D、Command Line Processor

    正确答案:B

  • 第8题:

    For which of the following can you use Segment Shrink?()

    • A、 Heap tables
    • B、 Tables with function-based indexes
    • C、 Indexes
    • D、 Partitions and subpartitions
    • E、 None of the above

    正确答案:A,C,D

  • 第9题:

    单选题
    You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()
    A

    The command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabled

    B

    Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed up

    C

    Backup optimization is permanently disabled

    D

    Backup optimization is temporarily disabled because a redundancy-based retention policy is specified


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    A system administrator ran the iostat command because of system performance problems. The following iostat output is provided: Based on the output, which of the following is insufficient?()
    A

    CPU

    B

    Memory

    C

    Paging space

    D

    Disk capacityX


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following answers can be verified as true based on the following command output from Router R1?() R1#show ip ospf virtual - links Virtual Link OSPF_VL0 to router 4.4.4.4 is up Run as demand circuit DoNotAge LSA alloweD. Transit area 1, via interface FastEthernet0/1, Cost of using 3
    A

    R1 is configured with  an area 0 virtual - link 4.4.4.4 cost 3 command.

    B

    The ping 4.4.4.4 command on R1 must currently be successful.

    C

    R1's Fa0/0 OSPF cost is 3.

    D

    4.4.4.4 is known to R1 based on a Type 1 LSA in area 1.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    A layer 3 switch can move packets between subnets based on which of the following criteria?()
    A

    802.1q tag

    B

    Port

    C

    Application

    D

    IP address


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which of the following is Not True?

    A. Advertisement makes contribution to our pockets and we may know everything
    B. We can buy what we want
    C. Products of good quality don't need to be advertised
    D. Advertisement makes our life colorful
    19. Which of the following is Not True?

    答案:C
    解析:
    A、B、D项均可在文中找到依据;C项说法错误,优质产品也可能需要广告的宣传。

  • 第14题:

    Based on the following items, which two types of interfaces are found on all network-based IPS sensors?()

    • A、Loopback interface
    • B、Command and control interface
    • C、Monitoring interface
    • D、Management interface

    正确答案:B,C

  • 第15题:

    Which of the following is TRUE about the ping  -f command?()

    • A、 It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the "f" in the command line. 
    • B、 It is useful for flooding from slow character based terminals since it only displays a dot "." for each packet sent in fast mode. 
    • C、 It is useful for flooding from slow character based terminals since it only displays a dot "."       for each packet sent and a backspace on returned in fast mode. 
    • D、 The command can only be run by root.

    正确答案:D

  • 第16题:

    Examine the following excerpt from the show ip eigrp topology 10.2.2.0/24 command on router R1.Which answer can be verified as definitely true based on this output?() External data: Originating router is 10.1.1.1 AS number of route is 1 External protocol is OSPF, external metric is 64 Administrator tag is 0 (0x00000000)

    • A、R1 is the router that redistributed the route
    • B、R1's metric to reach subnet 10.2.2.0/24 is 64
    • C、The route was redistributed on a router that has a router ospf 1 command configured
    • D、R1 is redistributing a route to prefix 1 0.2.2.0/24 into OSPF

    正确答案:C

  • 第17题:

    The following line of output was gathered on Enterprise Router Ent1 using the command show ip route. Which of the following answers is most likely to be true, based on thi s output?() B 128.107.0.0 [20/10] via 11.11.11.11, 00:02:18

    • A、This router has set the Weight of this route to 10.
    • B、This router's BGP table lists this route as an iBGP route.
    • C、This router's MED has been set to 10.
    • D、This router's BGP table lists an AS_Path length of 10 for this route.

    正确答案:C

  • 第18题:

    Which of the following devices can be installed on individual computers throughout the network?()

    • A、NIPS
    • B、Network-based firewall
    • C、VPN concentrator
    • D、Host-based firewall

    正确答案:D

  • 第19题:

    The man page for command shows the following syntax: The man page for command shows the following syntax: command [ -a | -b ] Which of the following statements is true regarding this entry?()

    • A、Either the -a or flag -b may be used, but not both.
    • B、If the flag -a is used then the flag -b also must be used.
    • C、One of the -a or -b flags must be used, but not both at the same time.
    • D、Both the flags may be used together, but neither are mandatory.

    正确答案:D

  • 第20题:

    which one of the following best describes the use of hidden column formula?()

    • A、views can be hidden based on a formula 
    • B、hidden columns are not a supported feature 
    • C、table columns can be hidden based on a formula  
    • D、view columns can be displayed or hidden based on a formula 

    正确答案:D

  • 第21题:

    单选题
    You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy:   CONFIGURE RETENTION POLICY TO REDUNDANCY 3;   Which statement is true?()
    A

     The command fails because you cannot configure a redundancy-based retention policy when backup  optimization is enabled

    B

     Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed up

    C

     Backup optimization is permanently disabled

    D

     Backup optimization is temporarily disabled because a redundancy-based retention policy is specified


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    The following line of output was gathered on Enterprise Router Ent1 using the command show ip route. Which of the following answers is most likely to be true, based on thi s output?() B 128.107.0.0 [20/10] via 11.11.11.11, 00:02:18
    A

    This router has set the Weight of this route to 10.

    B

    This router's BGP table lists this route as an iBGP route.

    C

    This router's MED has been set to 10.

    D

    This router's BGP table lists an AS_Path length of 10 for this route.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following is TRUE about the ping  -f command?()
    A

     It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the f in the command line. 

    B

     It is useful for flooding from slow character based terminals since it only displays a dot . for each packet sent in fast mode. 

    C

     It is useful for flooding from slow character based terminals since it only displays a dot .       for each packet sent and a backspace on returned in fast mode. 

    D

     The command can only be run by root.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    多选题
    For which of the following can you use Segment Shrink?()
    A

    Heap tables

    B

    Tables with function-based indexes

    C

    Indexes

    D

    Partitions and subpartitions

    E

    None of the above


    正确答案: A,E
    解析: 暂无解析