更多“单选题Which of the following options are valid choices for cluster communication security?()A rsh and sshB Standard and VPNC rhost and .shostsD Classic and Enhanced”相关问题
  • 第1题:

    Which three statements are valid SDM configuration wizards? ()

    • A、NAT
    • B、VPN
    • C、STP
    • D、Security Audit

    正确答案:A,B,D

  • 第2题:

    Which of the following tools would a technician use to map a drive to a user’s machine?()

    • A、SSH
    • B、NETUSE
    • C、NETSTAT
    • D、SSL

    正确答案:B

  • 第3题:

    Which of the following options is a valid host IP address?()

    • A、129.0.0.99
    • B、129.255.0.1
    • C、224.0.0.1
    • D、254.0.0.1

    正确答案:A

  • 第4题:

    The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()  

    • A、 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.
    • B、 Use C-SPOC to synchronize the password files between cluster nodes.
    • C、 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.
    • D、 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

    正确答案:A

  • 第5题:

    Which three statements are true when working with high-availability clusters? (Choose three.)()

    • A、The valid cluster-id range is between 0 and 255.
    • B、Junos OS security devices can belong to more than one cluster if cluster virtualization is enabled.
    • C、If the cluster-id value is set to 0 on a Junos security device, the device will not participate in the cluster.
    • D、A reboot is required if the cluster-id or node value is changed.
    • E、Junos OS security devices can belong to one cluster only.

    正确答案:C,D,E

  • 第6题:

    Which of the following are valid until command options when attempting point-in-time recovery in RMAN?()

    • A、 until time
    • B、 until change
    • C、 until sequence
    • D、 until SCN
    • E、 until commit

    正确答案:A,C,D

  • 第7题:

    单选题
    A network administrator provides an IP address of 128.135.0.142 and a subnet mask of 255.0.0.0.  Once a ping is attempted, it fails.  Which of the following options is the most probable cause of the failed ping?()
    A

    0 is not valid in an IP address

    B

    128 is a reserved network

    C

    The subnet mask should be 255.255.0.0. since it is a class B

    D

    A network problem has occurred since IP and subnet are valid


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    Your customer has converted from traditional servers to BladeCenter technology and has a requirement for an RSA adapter on a new BladeCenter server.  Which of the following options would you use? ()
    A

    Remote Supervisor Adapter II (RSA II Slimline)

    B

    Management Module, which comes standard on the BladeCenter

    C

    Acoustic Attenuation Module

    D

    Ethernet NICs


    正确答案: B
    解析: 暂无解析

  • 第9题:

    多选题
    Which three statements are true when working with high-availability clusters?()
    A

    The valid cluster-id range is between 0 and 255.

    B

    JUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.

    C

    If the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.

    D

    A reboot is required if the cluster-id or node value is changed.

    E

    JUNOS security devices can belong to one cluster only.


    正确答案: C,E
    解析: 暂无解析

  • 第10题:

    多选题
    The response times on a Samba server are gradually increasing, so it is decided to experiment with various socket options in smb.conf. Which of the following are valid values for this parameter?()
    A

    TCP_NODELAY

    B

    SO_NOBROADCAST

    C

    SO_TXBUF

    D

    IPTOS_LOWDELAY

    E

    SO_KEEPALIVE


    正确答案: C,A
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following options are valid choices for cluster communication security?()
    A

    rsh and ssh

    B

    Standard and VPN

    C

    rhost and .shosts

    D

    Classic and Enhanced


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following options should be used to obtain the latest security patches for AIX?()
    A

    FixDist

    B

    The Bonus Pack CD

    C

    OPS

    D

    The Security Maintenance CD


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

    • A、IDS
    • B、VPN
    • C、NIPS
    • D、HIDS

    正确答案:C

  • 第14题:

    Which of the following are benefits of the HCL? ()

    • A、 Enhanced stability
    • B、 Vendor supported
    • C、 Higher number of available component choices
    • D、 Lower cost
    • E、 Enhanced security

    正确答案:A,B

  • 第15题:

    Which of the following options should be used to obtain the latest security patches for AIX?()

    • A、FixDist
    • B、The Bonus Pack CD
    • C、OPS
    • D、The Security Maintenance CD

    正确答案:D

  • 第16题:

    Selling the total solution includes adding services and financing options which ensures your customer will remain satisfied with their purchase. Which of the following best describes the benefits of Selling options, storage, services, and financing to your clients?()

    • A、More face time with the executives
    • B、Enhanced credibility, higher profits, less competitive pressure
    • C、One source for elements, cleaner design, simpler support
    • D、Locks competitors out of account

    正确答案:C

  • 第17题:

    Which three statements are true when working with high-availability clusters?()

    • A、The valid cluster-id range is between 0 and 255.
    • B、JUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.
    • C、If the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.
    • D、A reboot is required if the cluster-id or node value is changed.
    • E、JUNOS security devices can belong to one cluster only.

    正确答案:C,D,E

  • 第18题:

    You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster. Allnodes have access to a SAN,and adequate storage is available. Which of the following options should youchoose for your quorum configuration?()

    • A、Node Majority
    • B、Node And Disk Majority
    • C、Node And File Share Majority
    • D、No Majority: Disk Only

    正确答案:B

  • 第19题:

    多选题
    Which of the following are valid until command options when attempting point-in-time recovery in RMAN?()
    A

    until time

    B

    until change

    C

    until sequence

    D

    until SCN

    E

    until commit


    正确答案: D,A
    解析: 暂无解析

  • 第20题:

    单选题
    You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster. Allnodes have access to a SAN,and adequate storage is available. Which of the following options should youchoose for your quorum configuration?()
    A

    Node Majority

    B

    Node And Disk Majority

    C

    Node And File Share Majority

    D

    No Majority: Disk Only


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following cannot be translated from Classic Notes to XPages?()
    A

    Embedded views

    B

    Section

    C

    Hide When Formula

    D

    Framesets


    正确答案: C
    解析: 暂无解析

  • 第22题:

    多选题
    Which three of the following are licensed Cisco CRS 4.0 software products?()
    A

    IPCC Express (Standard, Enhanced, or Premium)

    B

    IP IVR

    C

    Auto Attendant

    D

    IPCC Express Cisco Agent Desktop

    E

    IP Queue Manager

    F

    IP IVR Peripheral Gateway (PG)


    正确答案: C,D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following options is a valid host IP address?()
    A

    129.0.0.99

    B

    129.255.0.1

    C

    224.0.0.1

    D

    254.0.0.1


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()
    A

     On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.

    B

     Use C-SPOC to synchronize the password files between cluster nodes.

    C

     On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.

    D

     On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.


    正确答案: A
    解析: 暂无解析