网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()
A
Intrusion detection
B
Virtualization
C
Kiting
D
Cloning
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A Intrusion detectionB VirtualizationC KitingD Cloning” 相关考题
考题
Which of the following command line tools can be used to display the default gateway, IP address,and DNS servers currently being used by a host?()
A.TRACERTB.IPCONFIG/ALLC.NSLOOKUPD.PING-T
考题
Which of the following technologies can detect and fix single bit memory errors?()
A. RAIDB. Registered memoryC. SDRAMD. ECC
考题
Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()
A. Spanning Tree ProtocolB. Shortest path first treeC. Link-state advertisements (LSA)D. Hold-down timersE. Split horizonF. VRRP
考题
Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()A、MPLS TE FRB、MPLS VPNC、BFDD、RSVPE、VPLSF、SNMP
考题
A WORM drive can be equated to which of the following common technologies?()A、 CDRWB、 CDRC、 Flash MediaD、 DVDRW
考题
Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN
考题
Which of the following utilities can be used to list the routing table?()A、ipconficjB、nslookupC、netstatD、dig
考题
Which of the following are storage technologies that can be hot swappable?()A、SCSIB、SASC、ATAD、IDEE、CMOS
考题
Which of the following Windows Server 2003 technologies can help with making backups of open files?()A、Differential backupB、SnapshotC、VSSD、Incremental backup
考题
Which of the following tools can be used to identify the location of a network outage?()A、tracerouteB、netstatC、nslookupD、ping
考题
Which of the following virtualization technologies can save time during provisioning?()A、CloningB、SnapshotsC、ClusteringD、Virtual memory
考题
Which of the following technologies is used on the backbone of an ISDN?()A、VDSLB、SDSLC、OC3D、ATM
考题
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning
考题
Which of the following command line tools can be used to display the default gateway, IP address,and DNS servers currently being used by a host?()A、TRACERTB、IPCONFIG/ALLC、NSLOOKUPD、PING-T
考题
Which of the following technologies can detect and fix single bit memory errors?()A、RAIDB、Registered memoryC、SDRAMD、ECC
考题
which one of the following accurately describes field names?()A、they must be unique in a database B、they can only be used once in a view C、they can only used once on each form D、they can be used mulriple times on a form
考题
A system administrator is deploying a new POWER5 server. The application requires AIX 5L V5.2. Which of the following virtualization technologies can be used?()A、DLPARB、Micro-PartitioningC、Virtual StorageD、Virtual Ethernet
考题
单选题Which of the following Windows Server 2003 technologies can help with making backups of open files?()A
Differential backupB
SnapshotC
VSSD
Incremental backup
考题
多选题Which of the following technologies can be used to remotely gain access to a server console?()APS/2 KVMBLDAPCVNCDRemote desktopEVPN
考题
单选题Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()A
MPLS TE FRB
MPLS VPNC
BFDD
RSVPE
VPLSF
SNMP
考题
单选题Which of the following technologies can save server space and cooling requirements?()A
Energy star ratingsB
Active solar panelsC
Network storage arrayD
Blade servers
考题
单选题which one of the following accurately describes field names?()A
they must be unique in a database B
they can only be used once in a view C
they can only used once on each form D
they can be used mulriple times on a form
考题
单选题A WORM drive can be equated to which of the following common technologies?()A
CDRWB
CDRC
Flash MediaD
DVDRW
考题
多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP
考题
多选题Which of the following are storage technologies that can be hot swappable?()ASCSIBSASCATADIDEECMOS
考题
单选题Which of the following adjectives can't be used to describe Chekhov?A
Sensitive.B
Cool.C
Quick-minded.D
Warm-hearted.
热门标签
最新试卷