网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What is required to enable the use of metrics larger then 63 for traffic engineering in IS-IS?()
A

No action required, wide metrics are used by default in IS-IS.

B

Enable wide-metrics-only under protocols IS-IS.

C

Enable traffic-engineering under protocols IS-IS.

D

Disable TLVs 2 and 128 which carry the 6-bit metrics (0-63).


参考答案

参考解析
解析: 暂无解析
更多 “单选题What is required to enable the use of metrics larger then 63 for traffic engineering in IS-IS?()A No action required, wide metrics are used by default in IS-IS.B Enable wide-metrics-only under protocols IS-IS.C Enable traffic-engineering under protocols IS-IS.D Disable TLVs 2 and 128 which carry the 6-bit metrics (0-63).” 相关考题
考题 You are required to launch the App.exe process, and specify sample.txt as the input file.App.exe will then use the contents of sample.txt to establish the environment‘s current settings.You need to ensure that the code you use meets these requirements.What should you do?()A.B.C.D.

考题 What is required to enable the use of metrics larger then 63 for traffic engineering in IS-IS?() A. No action required, wide metrics are used by default in IS-IS.B. Enable wide-metrics-only under protocols IS-IS.C. Enable traffic-engineering under protocols IS-IS.D. Disable TLVs 2 and 128 which carry the 6-bit metrics (0-63).

考题 The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A、The enable password is present for backward compatibility.B、Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C、The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D、The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

考题 What are two commands that can be used to configure MBGP for multicast?()A、Under the BGP group, configure family inet anyB、Use the set protocol MBGP command to enable MBGPC、Under the BGP group, configure family inet multicastD、Use the set rib-group command to copy the multicast routes into inet.1

考题 You use a shared Windows 2000 Professional Computer. You notice, that some of your Microsoft Word documents that were on the local hard drive have been deleted. You restore the documents from a recent backup. Now, you want to be able to track all users who access your Word documents in the future. What should you do? ()A、Enable the local Group Policy for auditing object access events that are successful.B、Enable the local Group Policy for auditing object access events that are unsuccessful.C、Enable the local Group Policy for auditing process tracking events that are successful.D、Enable the local Group Policy for auditing process tracking events that are unsuccessful. E、Use Windows 2000 Explorer, to enable auditing for your files.F、Run the diskperf - y command. Use System Monitor to examine the logical I/O counter.  Restart the Computer.

考题 A mechanical contractor is deploying a custom application written to take advantage of multithreading features and run in a Windows environment. The customer has read about iDataPlex, BladeCenter, and System x servers. The customer wants to know which processor family will run the application most efficiently. Which of the following questions will provide the required information?()A、Can the application use Hot Swap Processor, Memory, and PCI-X technology? B、Will the application benefit from larger disk cache and swap space? C、Will the application run faster with Microsoft OLTP technology? D、What is the application's maximum processor scaling capability?

考题 Your company’s client computers run Windows 7.   Your company’s network has a wireless access point (WAP). A user reports that he regularly loses connectivity to the WAP.    You need to display information about client connectivity to the WAP.   What should you do?()A、Use Event Viewer to view events from a source of WlanConn.B、Use Event Viewer to view events from a source of WLAN AutoConfig.C、Use auditpol.exe to enable failed attempts in the Object Access category.D、Use auditpol.exe to enable successful attempts in the Object Access category.

考题 As a network technician, do you know what is a recommended practice for secure configurationmanagement?()A、Disable post scanB、Use SSH or SSLC、Enable trust levelsD、Deny echo replies on all edge routers

考题 What is a key new feature in Tivoli Storage Manager Version 6 that allows for a larger sizeddatabase?()A、 DB2 is the underlying database manager B、 Data is compressed without any change to the database C、 SSD drives are now required allowing for faster database access D、 Deduplication within the database shrinks the size of the current database

考题 During Company.com planning session, the network administrator discusses the requirements of having a persistent MAC address associated with the IP Service address.  How can this be accomplished using HACMP?()  A、 Enable routed to handle dynamic route creation.B、 Use IPAT via IP aliasing and define the required MAC address.C、 Add the Service IP Label to the /etc/cluster/ping_client_list.D、 Use IPAT via IP replacement and define the required MAC address.

考题 A DNS server for a large network is experiencing performance problems.  Which of the following options is the best solution to fix the problem?()A、Enable NISB、Purchase a larger serverC、Use /etc/hosts on all of the systemsD、Create secondary name servers throughout the network

考题 A manufacturer is deploying a custom application to serve their customers.  The application is written to take advantage of multithreading features and run in a Windows environment.  To determine the processor family that will run the application most efficiently, which TWO questions will provide the required information?()A、What is the application’s maximum processor scaling capability?B、Will the application run faster with Microsoft OLTP technology?C、Will the application benefit from larger disk cache and swap space?D、Can the application use Hot Swap Processor, Memory, and PCI-X technology?E、Is the application able to run in a 32 bit, 64 bit, or mixed environment?

考题 To enhance the availability of an application running under HACMP, a decision was made to use  The application monitoring facility. The application consists of several components and can take several minutes to initialize. The components use socket communication and can be initialized in any order as long as it is a serial order. The customer’s concern is that if the application stop and start scripts are used during application monitoring recovery,it may take an extraordinary length of time to reset all of the application components.  What can be done to ensure the best recover time?()   A、 Use a process monitor that restarts the named processes in the original start order.B、 Use the defined application start and stop scripts to control the application if there is a failure.C、 Use multiple application monitors for this resource group to enable the monitoring of the specific components of the resource group.D、 Use application cleanup and restart scripts designed to determine the state of the various components of the application and start only the parts required.

考题 What is the default function of a secondary path in MPLS?()A、to act as an equal-cost path to the primary pathB、to enable another LSP for load balancingC、to act as a diverse backup path to the primary pathD、to allow the use of explicit path selection via EROs

考题 What is required to enable the use of metrics larger than 63 for traffic engineering in IS-IS?()A、Nothing, wide metrics are used by default in IS-ISB、Enable wide-metrics-only under protocol IS-ISC、Enable traffic-engineering under protocols IS-ISD、Disable TVL’s 2 and 128 which carry the 6-bit metrics (0-63).

考题 You want to use WLST to view metrics for a running domain. Which command should you issue to navigate through the Mbean hierarchy containing the metrics?()A、runtime ()  B、runtimeMbeanServer ()C、connectRuntime ()D、beginRuntime ()E、serverRuntime ()

考题 Your network contains a single Active Directory domain. The functional level of the forest is Windows  Server 2008 R2.   You need to enable the Active Directory Recycle Bin.   What should you use()A、the Dsmod toolB、the Enable-ADOptionalFeature cmdletC、the Ntdsutil toolD、the Set-ADDomainMode cmdlet

考题 You need to design a method to enable remote encryption on Server5. What should you do?()A、Configure the editor’s user account properties to enable Store password using reversible encryptionB、Configure the editor’s user account properties to enable Use DES encryption for this accountC、Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyD、Configure the Server5 computer account properties to enable Trust computer for delegation

考题 You work as an ASP.NET Web Application Developer for SomeCompany.  The company uses Visual Studio .NET 2010 as its application development platform. You create an ASP.NET Web application using .NET Framework 4.0. You create a Web page in the application. The Web page will get large sets of data from a data source.  You add a DataPager control to the page. You are required to display navigation controls that enable you to create a custom paging Ul for the DataPager control. What will you do?()A、Use NextPreviousPagerField.B、Use NumericPagerField.C、Use PreviousPagerField.D、Use NextPagerField.E、Use TemplatePagerField.

考题 单选题What is a key new feature in Tivoli Storage Manager Version 6 that allows for a larger sizeddatabase?()A  DB2 is the underlying database manager B  Data is compressed without any change to the database C  SSD drives are now required allowing for faster database access D  Deduplication within the database shrinks the size of the current database

考题 单选题In addition to a POWER5 system and an HMC, what else is required to enable Micro-Partitions in an AIX environment?()A AIX 5.3 and Dynamic Logical PartitioningB AIX 5.2 and Dynamic Logical PartitioningC AIX 5.2 and Advanced POWER Virtualization featureD AIX 5.3 and Advanced POWER Virtualization feature

考题 单选题You want to use WLST to view metrics for a running domain. Which command should you issue to navigate through the Mbean hierarchy containing the metrics?()A runtime ()  B runtimeMbeanServer ()C connectRuntime ()D beginRuntime ()E serverRuntime ()

考题 单选题Your network contains a single Active Directory domain. The functional level of the forest is  Windows Server 2008 R2.   You need to enable the Active Directory Recycle Bin.     What should you use()A the Dsmod toolB the Enable-ADOptionalFeature cmdletC the Ntdsutil toolD the Set-ADDomainMode cmdlet

考题 单选题What is required to enable fragmentation of large FTP packets when voice quality on the network is affected by FTP transfers?()A Configure TCP header compression on interfaceB Configure MPL on the Frame Relay interfacesC Configure FRF 12 fragmentation on the Frame Relay interfacesD Fragmentation is not supported with service internetworking

考题 多选题Choose two commands that are required to enable multicast on a router, when it is known that the receivers use a specific functionality of IGMPv3.()Aip pim rp-addressBip pim ssmCip pim sparse-modeDip pim passive

考题 单选题You work as a database administrator for Supportcenter.cn. You want to be notified when the number of disk I/O increases by 10% of what it was yesterday. You create a baseline metric for yesterday’s disk I/O performance. How do you use the baseline metrics to achieve your objective?()A Save the baseline in the databaseB Save the baseline in the Database Control Home PageC Create a procedure to read and apply the baseline to disk I/O metricsD Apply the baseline to the disk I/O metrics in the Mange Metrics pageE Alter the disk I/O metrics to include baseline by using the ALTER METRICScommnd

考题 单选题What is required to enable the use of metrics larger than 63 for traffic engineering in IS-IS?()A Nothing, wide metrics are used by default in IS-ISB Enable wide-metrics-only under protocol IS-ISC Enable traffic-engineering under protocols IS-ISD Disable TVL’s 2 and 128 which carry the 6-bit metrics (0-63).