网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which mode is used to allow only a single person to edit a configuration?()
A

configure batch

B

configure private

C

configure exclusive

D

configure dynamic


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which mode is used to allow only a single person to edit a configuration?()A configure batchB configure privateC configure exclusiveD configure dynamic” 相关考题
考题 Which configuration command dynamically detects and configures a PPPoA interface?() A.auto-configure ipB.auto-configure pppC.auto-configure pppoeD.auto-configure bridgedethernet

考题 Which two steps are needed when configuring multiple RPs using MSDP within a single PIM domain? () A. Configure a non-unique address on the loopback interface for use by the PIM RP.B. Configure MSDP with the unique address (router ID) as the local address of the peer.C. Configure MSDP with the non-unique address (router ID) as the local address of the peer.D. Configure a unique address on the loopback interface, used as the PIM RP.

考题 Which configuration command dynamically detects and configures a Bridged 1483 interface?() A.auto-configure ipB.auto-configure pppC.auto-configure pppoeD.auto-configure bridgedethernet

考题 Which mode is used to allow only a single person to edit a configuration?() A. configure batchB. configure privateC. configure exclusiveD. configure dynamic

考题 You have been asked to configure a login class which will permit its users to view and edit the configuration. The class should only allow the configuration of the interfaces and firewall heirarchies. Which configuration correctly accomplishes this?()A.AB.BC.CD.D

考题 Refer to the network of Layer 3 switches in the exhibit. The RPI Multi cast Server only multicasts to hosts connected to multilayer switches 5 and 6. The CMU Multicast Server multicasts to hosts on multilayer switches 1 - 6. Given the number of configuration steps involved, what is the most efficient way to configure the net work while meeting the requirements for multicast data flow? ()A. Configure each switch with PIM sparse mode and a separate instance of PIM dense mode.Specify switch 1 as the root for the RPI Multicast Server. Specify switch 2 as the root for the CMU Multicast Server.B. Configure each switch with PIM sparse mode and a separate instance of PIM dense mode. Leave each multicast server as the root of its own multicast tree.C. Configure each switch with PIM sparse - dense mode. Configure switch 3 as a ren dezvous point for the RPI multicast stream.D. Configure each switch with PIM sparse mode and a separate instance of PIM dense mode.Allow the switches to elect their own root for each multicast tree.E. Configure each switch with PIM sparse mode.F. Configure each switch with PIM dense mode.

考题 Assuming the default switch configuration,which approach should you use to configure the extended vlan range(1006 through 4094) on a cisco catalyst 3750 series switch?() A. Configure the switch to be in VTP client mode.B. Configure the switch to be in VTP domaint mode.C. Configure the switch to be in VTP transparent mode.D. Configure the switch to be in VTPv2.

考题 Which interface is used to configure debug parameters for log files?()A、Datastore Control Center  B、Alarm and Trace Configuration  C、Custom File Configuration  D、Control Center 

考题 Assuming the default switch configuration,which approach should you use to configure the extended vlan range(1006 through 4094) on a cisco catalyst 3750 series switch?()A、Configure the switch to be in VTP client mode.B、Configure the switch to be in VTP domaint mode.C、Configure the switch to be in VTP transparent mode.D、Configure the switch to be in VTPv2.

考题 When configuring private VLANs, which configuration task must you do first?()A、Configure the private VLAN port parameters.B、Configure and map the secondary VLAN to the primary VLAN.C、Disable IGMP snooping.D、Set the VTP mode to transparent.

考题 Which two statements are true when using the configure exclusive CLI command?()A、Multiple users can enter configuration mode and have their own private configuration.B、When a user commits, only the user's changes are committed.C、A message indicates which other users are in configuration mode and what portion of the configuration they are editing.D、Only a single user can edit the configuration.

考题 You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()A、Configure a DNS suffix.B、Configure a subnet mask.C、Configure an LMHOSTS file.D、Configure an Interface metric.E、Configure at least one DNS address.

考题 Which two steps are needed when configuring multiple RPs using MSDP within a single PIM domain? ()A、Configure a non-unique address on the loopback interface for use by the PIM RP.B、Configure MSDP with the unique address (router ID) as the local address of the peer.C、Configure MSDP with the non-unique address (router ID) as the local address of the peer.D、Configure a unique address on the loopback interface, used as the PIM RP.

考题 Which mode is used to allow only a single person to edit a configuration?()A、configure batchB、configure privateC、configure exclusiveD、configure dynamic

考题 Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()A、Configure a dynamic routing protocol.B、Configure SVI interfaces with IP addresses and subnet masks.C、Configure switch ports with network addresses.D、Configure switch ports with the autostate exclude command.E、Document the MAC addresses of the switch ports.

考题 Which of the following commands will restore a previously archived configuration by replacing therunning configuration with the archived configuration?()A、configure archive running-configB、configure replaceC、copy archive running configD、copy startup-config running-configE、copy tftp running-configF、configure tftp running-config

考题 Which two statements are true about the configure exclusive command?()A、It allows users to retain all uncommitted changes when exiting exclusive configuration mode.B、It allows multiple users to edit private copies of the configuration concurrently.C、It causes the loss of all uncommitted changes when exiting exclusive configuration mode.D、It excludes other users from editing the configuration.

考题 In which mode are users allowed to configure the device, including interfaces, protocols, user access, and system hardware properties?()A、priviledged modeB、configuration modeC、monitoring modeD、operational mode

考题 You are managing an Oracle Database 11g database. You want to ensure the recovery of the database to thepoint of failure. Which configuration will you do to accomplish the task()A、Multiplex all database files.B、Configure the Flash Recovery Area.C、Configure the database instance for ARCHIVELOG mode.D、Configure the FAST_START_MTTR_TARGET initialization parameter

考题 You are managing an Oracle Database 11g database. You want to ensure the recovery of thedatabase to the point of failure.  Which configuration will you do to accomplish the task()A、Multiplex all database filesB、Configure the Flash Recovery Area.C、Configure the database instance for ARCHIVELOG mode.D、Configure the FAST_START_MTTR_TARGET initialization parameter.

考题 You are designing a name resolution strategy for the retail outlets to ensure that the existing bandwidth is used efficiently.  Which three actions should you perform?()A、 Configure the DNS server service on the terminal servers as caching-only servers.B、 Configure multiple sites to have site links and set up a specific replication schedule.C、 Configure the default site to have the subnets of Atlanta and the branch offices.D、 Create a new DNS zone and configure zone transfers to name servers only.E、 Create an application partition to be used for DNSF、 Specify the scope of replication to be used for DNS

考题 单选题Which set of commands allows PPPoE dynamic interfaces to use a profile called config-info?()A profile config-info auto-configure pppB profile config-info auto-configure anyC profile ppp config-info auto-configure pppoeD profile pppoe config-info auto-configure pppoe

考题 单选题Which interface is used to configure debug parameters for log files?()A Datastore Control Center  B Alarm and Trace Configuration  C Custom File Configuration  D Control Center 

考题 单选题Which tool or interface is used to configure debug parameters for log files?()A license informationB Alarm and Trace Configuration C CRS Installer D Control Center

考题 单选题Which configuration command dynamically detects and configures a PPPoA interface?()A auto-configure ipB auto-configure pppC auto-configure pppoeD auto-configure bridgedethernet

考题 多选题Which two statements are true when using the configure exclusive CLI command?()AMultiple users can enter configuration mode and have their own private configuration.BWhen a user commits, only the user's changes are committed.CA message indicates which other users are in configuration mode and what portion of the configuration they are editing.DOnly a single user can edit the configuration.

考题 单选题Which configuration command dynamically detects and configures a Bridged 1483 interface?()A auto-configure ipB auto-configure pppC auto-configure pppoeD auto-configure bridgedethernet