网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Multiple users are trying to telnet to the AIX server. They are able to ping the server successfully, but are  getting  the  following  error  message:  telnet:  connect:  A remote  host  refused  an  attempted  connect   operation Which of the following options could be the cause of this problem()

  • A、The routing table on the AIX server is incorrect.
  • B、The IP address in the /etc/hosts file is incorrect,
  • C、The portmap daemon is not running on the AIX server.
  • D、The inetd daemon is not running on the AIX server.

参考答案

更多 “Multiple users are trying to telnet to the AIX server. They are able to ping the server successfully, but are  getting  the  following  error  message:  telnet:  connect:  A remote  host  refused  an  attempted  connect   operation Which of the following options could be the cause of this problem()A、The routing table on the AIX server is incorrect.B、The IP address in the /etc/hosts file is incorrect,C、The portmap daemon is not running on the AIX server.D、The inetd daemon is not running on the AIX server.” 相关考题
考题 Which of the following statements about internet is (are) correct?Ⅰ.Each host in internet only has a IP address.Ⅱ.It is possible to have multiple names corresponding to the same IP address.Ⅲ.In users' points, Internet means a virtual network.A.NoneB.Ⅰ and ⅡC.Ⅱ and ⅢD.All

考题 A Next Generation Network(NGN) is a (上题选择) network ,which is able to provide Telecomunication Services ti users and to make use of multiple broadband, QoS-enable transport technologies and in which service-related functions are () of the underlying transport-related technologies.A.dependentB.independentC.relatedD.depend

考题 You are writing an application that uses isolated storage to store user preferences.The application uses multiple assemblies.Multiple users will use this application on the same computer.You need to create a directory named Preferences in the isolated storage area that is scoped to the current Microsoft Windows identity and assembly.Which code segment should you use?()A.B.C.D.

考题 Which two statements are true about the configure exclusive command?() A. It allows users to retain all uncommitted changes when exiting exclusive configuration mode.B. It allows multiple users to edit private copies of the configuration concurrently.C. It causes the loss of all uncommitted changes when exiting exclusive configuration mode.D. It excludes other users from editing the configuration.

考题 Multiple users have reported not being able to print to a network printer. Which of the followingcommands will test the network connectivity status of the printer?() A. rsyncB. netstatC. pingD. ipconfig

考题 CDMA for cellular systems can be described as follows.As with FDMA,each cell is allocated a frequency( ),which is split into two parts,half for reverse(mobile unit to base station)and half for( )(base station to mobile unit).For full-duplex( ).a mobile unit uses both reverse and forwardchannels.Transmission is in the form of direct-sequence spread(本题),which uses a chipping code to increase the data rate of the transmission,resulting inan increased signal bandwidth.Multiple access is provided by assigning( )chipping codes to multiple users,so that the receiver can recover the transmission of an individual unit from multiple transmissions.A.structure B.spectrum C.stream D.strategy

考题 Which are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links?()A、reduced costB、better throughputC、increased securityD、scalabilityE、reduced latencyF、broadband incompatibility

考题 Which of the following BEST describes server virtualization?()A、 A single logical server operating on multiple physical servers.B、 Applications hosted on a single server and deployed to multiple users.C、 Multiple servers used to host applications for multiple users.D、 Multiple logical servers operating on the same physical server.

考题 Your network contains multiple computers that run Windows XP Professional. Multiple users share the computers. You need to ensure that users can switch their keyboard layouts between multiple languages. What should you do?() A、Install the Multilingual User Interface (MUI) pack.B、From Internet Explorer, modify the Language Preferences.C、From the Keyboard settings, update the driver for the keyboard. D、From Regional and Language Options, modify the Text services and input languages settings.

考题 In one of your online transaction processing (OLTP) applications, most users frequently modify the values, including the key values, of the application tables. Some users generate application reports by using multiple application tables.  What is the best table structure that you can use to gain optimal performance?()A、heap tableB、object tableC、external tableD、clustered tableE、global temporary tableF、index­organized table (IOT)

考题 When is the site-to-site remote access model appropriate? ()A、for multiple ISDN connectionsB、for modem concentrated dial-up connectionsC、for a group of users in the same vicinity sharing a connectionD、for use by mobile users

考题 Multiple users have reported not being able to print to a network printer. Which of the followingcommands will test the network connectivity status of the printer?()A、rsyncB、netstatC、pingD、ipconfig

考题 A company may use the Windows XP Professional MUI Pack because the company:()A、has offices where users who speak different languages share computers.B、wants to maintain multiple operating systems.C、has users who work remotely at home offices.D、wants to deploy and maintain a single operating system standard.

考题 In one of your online transaction processing (OLTP) applications, most users frequently modify the values, including the key values, of the application tables. Some users generate application reports by using multiple application tables.  What is the best table structure that you can use to gain optimal performance?()A、heap tableB、object tableC、external tableD、clustered tableE、global temporary tableF、index-organized table (IOT)

考题 单选题You have a computer that runs Windows XP Professional. Multiple users share the computer. Users work in either French or English. You need to ensure that users can change the language in which the system menus appear. What should you do first?()A From the Display Properties, modify the Desktop settings.B From Internet Explorer, modify the Language Preferences. C From the Multilingual User Interface (MUI) pack installation CD, run muisetup.exe. D From Regional and Language Options, modify the Location settings and the Input Languages settings. 

考题 单选题Which of the following BEST describes server virtualization?()A  A single logical server operating on multiple physical servers.B  Applications hosted on a single server and deployed to multiple users.C  Multiple servers used to host applications for multiple users.D  Multiple logical servers operating on the same physical server.

考题 单选题When is the site-to-site remote access model appropriate? ()A for multiple ISDN connectionsB for modem concentrated dial-up connectionsC for a group of users in the same vicinity sharing a connectionD for use by mobile users

考题 多选题Which two statements are true about the configure exclusive command?()AIt allows users to retain all uncommitted changes when exiting exclusive configuration mode.BIt allows multiple users to edit private copies of the configuration concurrently.CIt causes the loss of all uncommitted changes when exiting exclusive configuration mode.DIt excludes other users from editing the configuration.

考题 单选题Which of the following is the BEST way to ensure that all users receive a mapping to multiple shared drives?()A Configure individual user accountsB Logon scriptsC Local policyD Set NTFS permissions

考题 单选题When is the site-to-site remote access model appropriate? ()A  for multiple ISDN connectionsB  for modem concentrated dial-up connectionsC  for a group of users in the same vicinity sharing a connectionD  for use by mobile users

考题 单选题In one of your online transaction processing (OLTP) applications, most users frequently modify the values, including the key values, of the application tables. Some users generate application reports by using multiple application tables. What is the best table structure that you can use to gain optimal performance?()A  Heap tableB  Object tableC  External tableD  Clustered tableE  Global temporary tableF  Index-organized table (IOT)

考题 单选题Which of the following is the BEST way to ensure that all users receive a mapping to multiple shared drives?()A  Configure individual user accountsB  Logon scriptsC  Local policyD  Set NTFS permissions

考题 单选题You have a computer that runs Windows XP Professional. Multiple users share the computer. You log on to the computer by using the local administrator account and install a custom application. You need to add an application shortcut to the desktop of all new users who use the computer. The shortcut must appear on the desktop of new users only. What should you do?()A Copy the shortcut to %systemdrive%/documents and settings/default user/desktop/.B Copy the shortcut to %systemdrive%/documents and settings/all users/desktop/.C Copy the shortcut to your desktop. Modify the %comspec% system environment variable. D Copy the shortcut to the guest user’s desktop. Assign the Everyone group Read permission to the guest user profile.

考题 单选题Your network consists of a single Active Directory domain. The functional level of the forest is Windows Server 2008. You need to create multiple password policies for users in your domain. What should you do()A From the Schema snap-in, create multiple class schema objects.B From the ADSI Edit snap-in, create multiple Password Setting objects.C From the Security Configuration Wizard, create multiple security policies.D From the Group Policy Management snap-in, create multiple Group Policy objects.

考题 单选题You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer.  What should you do? ()A Configure File signature verification to block driver installation, and set driver signing as a system default.B Remove all users from the Power User group.C Create a Local Computer Policy to prevent users from installing drivers.D Create a Local Computer Policy to enable Windows File Protection.

考题 单选题Your network consists of a single Active Directory domain. The functional level of the forest is  Windows Server 2008 R2.   You need to create multiple password policies for users in your domain.     What should you do()A From the Active Directory Schema snap-in, create multiple class schema objects.B From the ADSI Edit snap-in, create multiple Password Setting objects.C From the Security Configuration Wizard, create multiple security policies.D From the Group Policy Management snap-in, create multiple Group Policy objects.

考题 多选题Which are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links?()Areduced costBbetter throughputCincreased securityDscalabilityEreduced latencyFbroadband incompatibility

考题 单选题In one of your online transaction processing (OLTP) applications, most users frequently modify the values, including the key values, of the application tables. Some users generate application reports by using multiple application tables.  What is the best table structure that you can use to gain optimal performance?()A heap tableB object tableC external tableD clustered tableE global temporary tableF index­organized table (IOT)