You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()
A. The switch name must match the workgroup name of the local network.
B. The switch must be configured with an IP address and default gateway.
C. The remote workstations must have access to the management VLAN of the switch.
D. CDP must be enabled on the switch so that it can be located by other devices on the network.
第1题:
You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()
A. Fast Forward
B. Store and forward
C. Frag-free
D. None of the above
第2题:
You are at a client site. It is a medium-sized business and needs a Cisco Catalyst switch that offers high availability and security. What type of Catalyst switches would you recommend?()
第3题:
Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()
第4题:
What will happen if you issue the redundancy force-switchover command on a Catalyst 6500Series Switch with redundant supervisor modules?()
第5题:
In which scenario will you use the Flashback Version Query feature?()
第6题:
You work as a network administrator, and your responsibilities include managing server storage. You havebeen asked to purchase a new disk subsystem for your company’s storage-area network (SAN). You arein the process of testing hardware solutions before making purchases, and you attach a new disksubsystem to the network. You want to provision the new disks and create new logical unit numbers (LUNs)to assign to a server named Server1. You open Storage Manager for SANs, but you can’t see the newhardware. However, you can connect to the new hardware by using the software provided by the vendor.You want to be able to manage the new disk subsystem you purchase by using Storage Manager for SANs. What should you do?()
第7题:
Switch(config)# switchport trunk encapsulation isl
Switch(config)# switchport trunk encapsulation ietf
Switch(config-if)# switchport trunk encapsulation isl
Switch(config-if)# switchport trunk encapsulation ietf
Switch(config-if)# switchport trunk encapsulation dot1q
第8题:
The switch name must match the workgroup name of the local network.
The switch must be configured with an IP address and default gateway.
The remote workstations must have access to the management VLAN of the switch.
CDP must be enabled on the switch so that it can be located by other devices on the network.
第9题:
mount the new disk group in the ASM instance
restart the ASM instance and the production database instance
register the new disk groups in the production database instance
restart the ASM instance without restarting the production database instance
include the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance
第10题:
Automatic switchover from active to standby on primary supervisor failure
Reset of the primary supervisor.
Manual switchover from active to standby supervisor
Manual switchover from standby to active supervisor
第11题:
An error is returned.
You are prompted to enter a new value.
A report is produced that matches the first report produced.
You are asked whether you want a new value or if you want to run the report based on the previous value.
第12题:
Use the introspect () command in WLST to gather the configuration information from the original domain.
Use pack/unpack to transfer the domain from one machine to another.
Create a domain template from the original domain using the Domain Template Builder and use the Configuration Wizard to create a new domain from the template.
Use the Admin Console of the original domain to create a domain template from the original domain and use the Configuration Wizard to create a new domain from the template.
第13题:
You are bringing up a new Cisco Catalyst switch, and wish to connect it via a trunk to another switch from a different vendor, which uses the IEEE standard for the trunking method.When setting the encapsulation type on the trunk, what should you configure on the Cisco switch?()
A. Switch(config)# switchport trunk encapsulation isl
B. Switch(config)# switchport trunk encapsulation ietf
C. Switch(config-if)# switchport trunk encapsulation isl
D. Switch(config-if)# switchport trunk encapsulation ietf
E. Switch(config-if)# switchport trunk encapsulation dot1q
第14题:
You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()
第15题:
You are bringing up a new Cisco Catalyst switch, and wish to connect it via a trunk to another switch from a different vendor, which uses the IEEE standard for the trunking method. When setting the encapsulation type on the trunk, what should you configure on the Cisco switch?()
第16题:
You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()
第17题:
You have a computer that runs Windows XP Professional. You connect one local print device and install a printer. You share the printer. You need to give a user the ability to manage all new print jobs submitted to the printer. Your solution must prevent the user from installing additional local printers. What should you do?()
第18题:
when you want to restore a table that has been dropped from the Recycle Bin
when you want to identify the transaction ID of the transaction that deleted some important records from a table
when you want to recover the schema of a dropped user
when you want to restore a dropped tablespace
第19题:
When you want all unauthenticated traffic to be redirected
When you want all clear text traffic to be redirected.
When you want all authenticated traffic to be redirected.
When you want all encrypted traffic to be redirected.
第20题:
using only the RMAN SWITCH command to set the new location for the data file
placing the database in the MOUNT state for the restore and recovery operations
using an RMAN RUN block with the SET NEWNAME and then the SWITCH command
configuring two channels: one for the restore operation and the other for the recovery operation
第21题:
Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account.
Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account.
Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account.
Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account.
第22题:
In Disk Management, chooses the Rescan Disks option.
Choose a disk subsystem from a vendor that has a Virtual Disk Service hardware provider.
On Server1, configures iSCSI Initiator to specify the new hardware as a favorite target.
Use Storage Explorer to configure Server1 as an iSNS server.
第23题:
Catalyst 2960 Series
Catalyst 3750 Series
Catalyst 4900 Series
Catalyst 6500 Series
第24题:
zones on which an attack might arrive
zones you want to protect from attack
interfaces on which an attack might arrive
interfaces you want to protect from attack