网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two management-software applications can you use to manage the Cisco Catalyst Express 500 Series Switches?()
A

Cisco Network Assistant

B

Cisco Security Device Manager

C

Cisco Device Manager

D

Cisco Adaptive Security Device Manager


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two management-software applications can you use to manage the Cisco Catalyst Express 500 Series Switches?()ACisco Network AssistantBCisco Security Device ManagerCCisco Device ManagerDCisco Adaptive Security Device Manager” 相关考题
考题 You create a Web application for your company‘s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time.Which two code segments should you use?()A.B.C.D.

考题 You are a network administrator for your company. All servers run Windows Server 2003.A server named Server1 functions as an application server. Server1 runs several applications. Server1 is located on the company‘s perimeter network. You allow communication to Server1 only over port 80.Users report that applications on Server1 perform poorly during periods of peak activity. You monitor Server1.The results are shown in the exhibit. (Click the Exhibit button.)You need to identify which process is causing Server1 to perform poorly.Which two tools can you use to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)A. Event ViewerB. Task ManagerC. Network MonitorD. System Monitor

考题 Identify two situations in which you can use Data Recovery Advisor for recovery. ()(Choose two.) A. The user has dropped an important table that needs to be recovered.B. The database files are corrupted when the database is open.C. You are not able to start up the database instance because the required database files are missing.D. The archived log files are missing for which backup is not available.

考题 Which two statements apply to policy scheduling?() (Choose two.) A. An individual policy can have only one scheduler applied.B. You must manually configure system-time updates.C. Multiple policies can use the same scheduler.D. Policies that do not have schedulers are not active.

考题 What are the techniques which you can use to teach intonation in a meaningful way?

考题 Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()A、You may use Cisco Network Assistant to set up the initial configurationB、You must use CLI for initial configurationC、You may use either CLI or CAN for configurationD、You may make a direct connection to the PC from any point on the switchE、You may only make a direct connection from the port with the flashing green LED to the PC

考题 Which two statements apply to policy scheduling?() (Choose two.)A、An individual policy can have only one scheduler applied.B、You must manually configure system-time updates.C、Multiple policies can use the same scheduler.D、Policies that do not have schedulers are not active.

考题 In which two ways can you influence how downstream LSRs treat MPLS traffic?()A、Use an EXP rewrite table.B、Use a DSCP rewrite table.C、Statically assign a CoS value to an LDP-signaled LSPD、Statically assign a CoS value to an RSVP-signlated LSP

考题 Which two are true about aggregate functions?()A、You can use aggregate functions in any clause of a SELECT statement.B、You can use aggregate functions only in the column list of the select clause and in the WHERE clause of a SELECT statement.C、You can mix single row columns with aggregate functions in the column list of a SELECT statement by grouping on the single row columns.D、You can pass column names, expressions, constants, or functions as parameter to an aggregate function.E、You can use aggregate functions on a table, only by grouping the whole table as one single group.F、You cannot group the rows of a table by more than one column while using aggregate functions.

考题 You use Microsoft .NET Framework 4 to create a custom Windows Presentation Foundation (WPF) application. Your environment includes several WPF applications. The applications use the same logo and style configuration as part of a corporate standard. You need to ensure that the existing applications can be updated to use the same logo and style settings without recompiling. Which two actions should you perform?()A、Mark the resource as an embedded resource in each application.B、Create a resource in an XAML file that contains the logo and style configurations.C、Create a resource in a custom control that contains the logo and style configurations.D、Add the resource as a ResourceDictionary in the MergedDictionaries collection of each application.E、Use ResourceManager to read the content of the resource. Manually assign the style configurations included in the resource file to the appropriate control in each application.

考题 You are preparing for a new installation of SQL Server 2005. You need to select the protocols that client computers might use to connect to the server.  Which two protocols can you use to achieve this goal?()A、Named PipesB、TCP/IPC、Shared MemoryD、Virtual Interface Adapter (VIA)E、Multiprotocol

考题 You are using NBAR to get a statistical baseline for the applications running on your network butdiscover that some applications are not being recognized. Which of the following are possiblesolutions?(Choose all that apply.)()A、Use the ip nbar pdlm command to allow NBAR to reference a new PDLM in flash memoryB、If NBAR doesn’t recognize certain applications you must contact Cisco and ask them to emailyou a new PDLM for that applicationC、Use the ip nbar port-map command to allow NBAR to recognize certain applications with anev/port numberD、The applications not being recognized can be rerouted to an NBAR collector, which has a morecomplete list of applicationsE、Use the copy nbar flash: command to download a new PDLM file to flashF、Use the ip nbar pdlm command to download a new NBAR reference file from the Cisco website

考题 You have two NTP servers 10.1.1.1  10.1.1.2 and want to configure a router to use 10.1.1.2 as its NTP server before falling back to 10.1.1.1. Which command will you use?

考题 Which of the following statements are true when creating NETBIOS names? ()A、 NETBIOS names can only use alphanumeric characters.B、 You can use a ’.’ in a NETBIOS name.C、 You can use an ’_’ (underscore) in a NETBIOS name.D、 NETBIOS names must be UPPERCASEE、 NETBIOS names can be a maximum of 32 characters

考题 Which two statements are true about interoperating with Oracle AQ JMS with Oracle WebLogic server ?()A、 If you select a non-XA JDBC driver, you can use WebLogic AQ JMS in both local  global transactionsB、 Oracle WebLogic Server requires a JDBC driver to communicate with the Oracle AQ JMSC、 Oracle WebLogic AQ JMS stand-alone client automatically participate in global transactions managed by Oracle WebLogic ServerD、 If you select an XA JDBC driver, you can use WebLogic AQ JMS in both local and global transactions

考题 Which two statements are correct regarding the Flashback Versions Query feature?()A、 You can use this feature to identify the committed versions of the rows, but not the uncommitted versions.B、 You can use this feature to identify the versions of V$ views.C、 You can use this feature to identify the inserts, deletes, and updates performed on a particular row but not the data definition language (DDL) operations performed on the table.D、 You can use this feature for a table only if row movement is enabled for the table.E、 You can use this feature to identify the versions of external and fixed tables.

考题 Identify two situations in which you can use Data Recovery Advisor for recovery. ()(Choose two.)A、The user has dropped an important table that needs to be recovered.B、The database files are corrupted when the database is open.C、You are not able to start up the database instance because the required database files are missing.D、The archived log files are missing for which backup is not available.

考题 You are configuring services to be discoverable. The services must be discoverable without relying on a central server. Client applications that consume the services are on a network segment that is separate from the network segment that the services are located on.A firewall blocks all TCP ports between the two network segments, but allows other protocols to pass through.You need to ensure that the client applications can discover the services. What should you do?()A、Use ad-hoc discovery mode over HTTP.B、Use ad-hoc discovery mode over UDP.C、Use managed discovery mode over HTTP.D、Use managed discovery mode over UDP.

考题 You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You need to ensure that users can view content in a book-reading format that displays two pages at a time. Which control should you use?()A、FlowDocumentB、FlowDocumentReaderC、FlowDocumentPageViewerD、FlowDocumentScrollViewer

考题 You are preparing for a new installation of SQL Server 2005. You need to select the protocols that client computers might use to connect to the server. Which two protocols can you use to achieve this goal?()A、 Named Pipes B、 TCP/IP C、 Shared Memory D、 Virtual Interface Adapter (VIA) E、 Multiprotocol 

考题 You discover that a particular group of settings named UserPreferences changes.You need to store the UserPreference settings to prevent affecting other applications. Which two actions should you perform?()A、Use the Properties.USerPreferences objectB、Use the Properties.Settings.Default.Userprefences objectC、Use the ConfigurationManager.AppSettings object during runtimeD、Create the settings by using Application scopeE、Create the settings by using User scope

考题 单选题While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior  administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore.  How can you determine which files are already marked for extraction and restore? ()A  You can use the ls subcommand of ufsrestore.B  You can use the add subcommand of ufsrestore.C  You can use the select subcommand of ufsrestore.D  You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.

考题 多选题You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()APPPBUDPCTCPDICMP

考题 多选题You use Microsoft .NET Framework 4 to create a custom Windows Presentation Foundation (WPF) application. Your environment includes several WPF applications. The applications use the same logo and style configuration as part of a corporate standard. You need to ensure that the existing applications can be updated to use the same logo and style settings without recompiling. Which two actions should you perform?()AMark the resource as an embedded resource in each application.BCreate a resource in an XAML file that contains the logo and style configurations.CCreate a resource in a custom control that contains the logo and style configurations.DAdd the resource as a ResourceDictionary in the MergedDictionaries collection of each application.EUse ResourceManager to read the content of the resource. Manually assign the style configurations included in the resource file to the appropriate control in each application.

考题 多选题For which two SQL statements can you use the Flashback Table feature to revert a table to its previous state?()AUPDATE TABLEBCREATE CLUSTERCTRUNCATE TABLEDALTER TABLE MOVEEINSERT INTO···VALUESFALTER TABLE···DROP COLUMNGALTER TABLE···DROP PARTITION

考题 多选题You are a systems administrator responsible for managing a Windows Server 2008 Web Server Currently,there are no Web sites configured on the server. You need to configure the server to host two Web applications: Engineering App and Sales App. Both Web applications must be accessible by using HTTPport 80 without the use of host headers. Also, you must protect against problems in one Web applicationaffecting the performance or reliability of the other Web application. Which two steps should you take tomeet these requirements?()ACreate a single Web site that contains both Web applications.BCreate two Web sites, one for each Web application.CAssign both Web applications to the same application pool.DAssign each Web application to its own application pool.

考题 单选题You need to create a class definition that is interoperable along with COM.You need to ensure that COM applications can create instances of the class and can call the GetAddress method. Which code segment should you use?()A AB BC CD D