网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two of these elements need to be configured prior to enabling SSH? ()
A

hostname

B

loopback address

C

default gateway

D

domain name

E

SSH peer address


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two of these elements need to be configured prior to enabling SSH? ()AhostnameBloopback addressCdefault gatewayDdomain nameESSH peer address” 相关考题
考题 Which two are correct steps in taking a binary backup of MyISAM tables?() A.Always stop the server prior to the backupB.Stop the server or lock the tables prior to the backupC.Stop the server or lock the databases prior to the backupD.Make a copy of the .frm, .myd, and the .myi filesE.Make a copy of the binary log and tablespace files

考题 Which two parameters are configured in IPsec policy? ()(Choose two.) A. modeB. IKE gatewayC. security proposalD. Perfect Forward Secrecy

考题 Which two statements about voice VLANs are correct?()A、Voice VLANs eliminate the need for QoS configurationB、Voice VLANs are used on trunk links to eliminate the need for QoS CoS markingsC、Voice VLANs are mainly used to reduce the number of access switch ports that are used in the networkD、Voice VLANs can be configured to forward existing CoS priorities or override themE、Voice VLANs are mainly used between access layer switches and distribution layer switchesF、Voice VLANs can be configured on Layer 2 ports only

考题 Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()A、PPPoE with the 827 configured as a bridgeB、PPPoE with the 827 configured as the PPPoE clientC、PPPoAD、RFC 1483 Bridged with the 827 configured as the PPPoE clientE、RFC 1482 Bridged with the 827 configured as a bridge

考题 You need to store elements in a collection that guarantees that no duplicates are stored. Which two interfaces provide that capability?()A、 Java.util.MapB、 Java.util.SetC、 Java.util.ListD、 Java.util.StoredSetE、 Java.util.StoredMapF、 Java.util.Collection

考题 Which two are correct steps in taking a binary backup of MyISAM tables?()A、Always stop the server prior to the backupB、Stop the server or lock the tables prior to the backupC、Stop the server or lock the databases prior to the backupD、Make a copy of the .frm, .myd, and the .myi filesE、Make a copy of the binary log and tablespace files

考题 Your company has a Microsoft Hyper-V Server 2008 R2 environment. You need to manually back up a child partition while it is turned off. Which two elements should you back up?()A、the system stateB、the InitialStore.xml fileC、the child .vhd filesD、the child .xml configuration file

考题 Which two attributes need to match for two switches to become members of the same MST region?  ()A、the table of 4096 elements that map the respective VLAN to STP instance numberB、VTP versionC、configuration revision numberD、native VLAN ID

考题 Which two of these elements need to be configured prior to enabling SSH?()A、hostnameB、loopback addressC、default gatewayD、domain nameE、SSH peer address

考题 In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()A、private VLANsB、port securityC、BPDU guardD、dynamic ARP inspectionE、DHCP snooping

考题 You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

考题 多选题When HSRP is configured on a network, which two of these items are provided, which are shared between the routers that run HSRP ?() (choose two)AShared single interfaceBIP AddressCTCP-based hello packetsDMAC address

考题 多选题Which two elements of the Java Enterprise Application Archive are required?()AEJB ArchiveBDeployment DescriptorCMETA-INF sub directoryDResource Adapter archiveEJava library

考题 多选题Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()APPPoE with the 827 configured as a bridgeBPPPoE with the 827 configured as the PPPoE clientCPPPoADRFC 1483 Bridged with the 827 configured as the PPPoE clientERFC 1482 Bridged with the 827 configured as a bridge

考题 多选题You need to store elements in a collection that guarantees that no duplicates are stored. Which two interfaces provide that capability?()AJava.util.MapBJava.util.SetCJava.util.ListDJava.util.StoredSetEJava.util.StoredMapFJava.util.Collection

考题 多选题Which two code fragments correctly create and initialize a static array of int elements?()AABBCCDD

考题 单选题You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application that allows users to arrange images. You need to ensure that users can arrange child elements in a panel without affecting the size of the elements. You also need to ensure that child elements are oriented horizontally. Which control should you use?()A ListBoxB DockPanelC WrapPanelD StackPanel

考题 多选题Which two of these elements need to be configured prior to enabling SSH? ()AhostnameBloopback addressCdefault gatewayDdomain nameESSH peer address

考题 多选题Identify two situations in which the block header grows in a data block. ()Awhen row directories need more row entriesBwhen there is row migration in the data blockCwhen there is an increase in the PCTFREE value for the data blockDwhen more transaction slots are required than are initially configured

考题 多选题Which two are correct steps in taking a binary backup of MyISAM tables?()AAlways stop the server prior to the backupBStop the server or lock the tables prior to the backupCStop the server or lock the databases prior to the backupDMake a copy of the .frm, .myd, and the .myi filesEMake a copy of the binary log and tablespace files

考题 多选题You need to configure port security on switch R1.  Which two statements are true about this  technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.

考题 单选题In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()A private VLANsB port securityC BPDU guardD dynamic ARP inspectionE DHCP snooping

考题 多选题Which two parameters are configured in IPsec policy? ()(Choose two.)AmodeBIKE gatewayCsecurity proposalDPerfect Forward Secrecy

考题 多选题Which two parameters are configured in IPsec policy?()AmodeBIKE gatewayCsecurity proposalDPerfect Forward Secrecy

考题 多选题Which two are required elements for the  element of a web applicationdeployment descriptor?()Arealm-nameBurl-patternCdescriptionDweb-resource-nameEtransport-guarantee

考题 多选题Your company has a Microsoft Hyper-V Server 2008 R2 environment. You need to manually back up a child partition while it is turned off. Which two elements should you back up?()Athe system stateBthe InitialStore.xml fileCthe child .vhd filesDthe child .xml configuration file

考题 单选题Computer systems consist of two very different types of elements:Hardware,which includes all the physical things that can be touched and(),which tells thehardware how to do.A SoftwareB CoursewareC OperatingsystemD I/Odevices

考题 多选题Which two attributes need to match for two switches to become members of the same MST region?()Athe table of 4096 elements that map the respective VLAN to STP instance numberBVTP versionCconfiguration revision numberDnative VLAN ID