网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A client cannot mount a filesystem from an NFS server.  Which of the following options is the most probable cause for the mount failure?()

  • A、Server is not running  rpc.lockd
  • B、Client is not running the rpc.statd
  • C、Filesystem not exported by the server
  • D、Client nfsd daemons are all inoperative

参考答案

更多 “A client cannot mount a filesystem from an NFS server.  Which of the following options is the most probable cause for the mount failure?()A、Server is not running  rpc.lockdB、Client is not running the rpc.statdC、Filesystem not exported by the serverD、Client nfsd daemons are all inoperative” 相关考题
考题 A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?() A.FTPB.SMTPC.POPD.SNMP

考题 What are two characteristics of a switch that is configured as a VTP client?() A.if a switch that is configured to operate in client mode cannot access a VTP server,then the switch reverts to transparent mode.B.The local vlan configuration is updated only when an update that has a higher configuration revision number is received.C.Vtp advertisements are not forwarded to neighboring switches that are configured in vtp transparent mode.D.When switches in vtp client mode are rebooted,they send a vtp advertisement request to the vtp servers.E.Vtp client is the default vtp modeF.On switches that are configured to operate in client mode ,vlans can be created,deleted,or renamed locally

考题 Which two statements correctly describe VTP?()A、Transparent mode always has a configuration revision number of 0.B、Transparent mode cannot modify a VLAN database.C、Client mode cannot forward received VTP advertisements.D、Client mode synchronizes its VLAN database from VTP advertisements.E、Server mode can synchronize across VTP domains.

考题 Continuous availability is required for an application in a two-node cluster. There is one rotating resource group in the cluster, and the nodes are identical machines. Client telnet connections to the application cannot be broken because it takes 20 to 30 minutes to recycle the client workstations and transactions will be lost.  What configuration best provides continuous connectivity to the application?()   A、 IPAT using IP Replacement without MAC address takeover.B、 IPAT using IP Aliasing and hardware MAC address takeover.C、 None because continuous telnet connectivity cannot be provided with HACMP.D、 Shared service IP address assigned to multiple network interface cards on each node.

考题 To control the execution of a server process when it is receiving bad packets from a potentially malicious client, you set the SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter as follows: SQL ALTER SYSTEM SET SEC_PROTOCOL_ERROR_FURTHER_ACTION = Drop,10; What is the significance of this setting?()A、It terminates the client connection after 10 bad packets and the client cannot reconnect to the same instance.B、It terminates the client connection after 10 bad packets but the client can still reconnect, and attempt the same operation again.C、It terminates the client connection 10 seconds after receiving a bad packet and the client cannot reconnect to the same instance.D、It terminates the client connection after receiving a bad packet and the client can reconnect to the same instance after 10 minutes.

考题 A wireless client cannot connect to an 802.11b/g BSS with a b/g wireless card. The client section of the access point does not list any active WLAN clients. What is a possible reason for this?()A、The incorrect channel is configured on the client.B、The client's IP address is on the wrong subnet.C、The client has an incorrect pre-shared key.D、The SSID is configured incorrectly on the client.

考题 A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?()A、A switch in the VTP client mode cannot update its local VLAN database.B、A trunk link must be configured between the switches to forward VTP updates.C、A switch in the VTP server mode can update a switch in the VTP transparent mode.D、A switch in the VTP transparent mode will forward updates that it receives to other switches.E、A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.F、A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.

考题 An 802.1X client cannot authenticate to an autonomous access point configured for multiple VLANs. The native VLAN does not have an SSID configured. Which one of the following links being down would prevent the clients from authenticating?()A、between the RADIUS and the access pointB、between the client’s VLAN and the WLSEC、between the native VLAN and the WLSED、between the client’s VLAN and the RADIUS

考题 A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?()A、FTPB、SMTPC、POPD、SNMP

考题 An administrator is trying to diagnose as to why a new VIO client (vio_client1) cannot see an allocated disk (hdisk4) from a VIO server (VIOS-A). The client virtual SCSI adapter has a slot ID of 5 and the corresponding VIO server virtual SCSI adapter has a slot ID of 3. The administrator checks the virtual SCSI configuration from the HMC using the following lshwres command.  lshwres –r virtualio --rsubtype scsi -m 9117-570*65ABCDE  --level lpar -F / lpar_name,slot_num,remote_lpar_name,remote_slot_num,backing_device VIOS A,5,vio_client2,2,hdisk3 VIOS-A,4,vio_client1,4,hdisk4 VIOS-A,3,vio_client1,6,hdisk5 VIOS-A,2,vio_client3,2,hdisk6 vio_client2,2,VIOS-A,5,hdisk0 vio_client1,4,VIOS-A,4,hdisk0  vio_client1,5,VIOS-A,3,null vio_client3,2,VIOS-A,2,hdisk0 From the output above,  what is the most likely reason why the client cannot see the mapped storage?()A、 The hard disk has been inccorectly mapped on the VIO server.B、 The hard disk has been incorrectly addressed on the VIO client.C、 The client SCSI adapter has been mapped to the incorrect server SCSI adapter.D、 The server SCSI adapter has been mapped to the incorrect client server adapter.

考题 Which  statements regarding the server parameter file (SPFILE) are true()A、An SPFILE is a binary file.B、An SPFILE cannot reside on a client.C、An SPFILE cannot contain static parameters.D、An SPFILE can store changes persistently across instance restarts.E、An SPFILE can be read by the database server, but it is not written to by the server.F、An SPFILE must be created manually, before creating a database, even if you use the DatabaseConfiguration Assistant (DBCA) to create the database

考题 You issued the following command to mount the DATA disk group in restricted mode:   ALTER DISKGROUP data MOUNT RESTRICT;   What is the implication of this command?()A、 The client RDBMS instance can access the file as a read-only file.B、 A new disk cannot be added to a disk group.C、 A disk in a disk group can be taken offline.D、 The client RDBMS instance cannot access the files in the disk group.

考题 Your network consists of a single Active Directory domain. You have a DHCP server named DHCP1 that runs Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Service Pack 3 (SP3). All client computers are configured as DHCP clients. You change the IP address on DHCP1. Users report that they cannot connect to the network. You verify that the client computers do not receive an IP address configuration from DHCP1. You need to ensure that the client computers receive an IP address configuration from DHCP1.  What should you do on DHCP1? ()A、Authorize the server.B、Reconcile the scope.C、Enable conflict resolution.D、Restore the server configuration by using the DHCP snap-in.

考题 Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()A、Disjoin and rejoin Client1 to the domain.B、Add the computer account for Client1 to the Domain Computers Active Directory group.C、Reset the account password for Client1 through Active Directory Users and Computers.D、Reset the account password for the user through Active Directory Users and Computers.

考题 You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named Lilli receives a new computer named Client223. She successfully logs on to the domain. The next day, she tries to log on again. The domain name appears in the domain dropdown list in the dialog box. However, Lilli cannot log on. You try to log on by using Client223, but you are also unsuccessful. Then you use a local Administrator account to log on. You read the following error message in the system event log. "NETLOGON Event ID 3210: Failed to authenticate with //Server5, a Windows NT domain controller for domain TestKing". You search the computer account for Client223 in Active Directory Users and Computers, but the account does not appear. You need to ensure that Lilli can log on to the domain successfully. What should you do?()A、Recreate the user account for Lilli and add her to all appropriate security groups.B、Run the netdom reset 'Client223' /domain:'testking' command and then restart Client223.C、Add Client223 to a workgroup. Then join Client223 to the domain.D、Reset the computer account for Server5 in Active Directory Users and Computers.

考题 单选题A client cannot mount a filesystem from an NFS server.  Which of the following options is the most probable cause for the mount failure?()A Server is not running  rpc.lockdB Client is not running the rpc.statdC Filesystem not exported by the serverD Client nfsd daemons are all inoperative

考题 单选题To control the execution of a server process when it is receiving bad packets from a potentially malicious client, you set the SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter as follows: SQL ALTER SYSTEM SET SEC_PROTOCOL_ERROR_FURTHER_ACTION = Drop,10; What is the significance of this setting?()A It terminates the client connection after 10 bad packets and the client cannot reconnect to the same instance.B It terminates the client connection after 10 bad packets but the client can still reconnect, and attempt the same operation again.C It terminates the client connection 10 seconds after receiving a bad packet and the client cannot reconnect to the same instance.D It terminates the client connection after receiving a bad packet and the client can reconnect to the same instance after 10 minutes.

考题 单选题A technician supports users in a client/server environment. A user suddenly cannot access any network resources. The user tried to logon to a known working computer but was unsuccessful.Which of the following should the technician check FIRST?()A Check if the user account is lockedB Check group policyC Check the drive for fragmentationD Check NTFS permissions

考题 多选题A host named client12 is having difficulty communicating with a heavily used server named server14. The server14 server has the ce0, ce1, ce4, and qfe4 interfaces active. The client12, admin6, and appserv5 hosts are all on a private network and access the ce4 interface on server14 exclusively and cannot access other network interfaces on server14. The appserv5 and admin6 hosts are currently generating heavy traffic to server14 due to a running batch process.  Which two commands can you run on server14 to look at the network traffic generated between only client12 and server14 to assist in troubleshooting the communication issue?()Asnoop !admin6Bsnoop -d client12Csnoop -d ce server14Dsnoop -d ce4 client12Esnoop -d ce4 client12 server14Fsnoop -i ce4 server14 client12

考题 多选题What are two characteristics of a switch that is configured as a VTP client?()Aif a switch that is configured to operate in client mode cannot access a VTP server,then the switch reverts to transparent mode.BThe local vlan configuration is updated only when an update that has a higher configuration revision number is received.CVtp advertisements are not forwarded to neighboring switches that are configured in vtp transparent mode.DWhen switches in vtp client mode are rebooted,they send a vtp advertisement request to the vtp servers.EVtp client is the default vtp modeFOn switches that are configured to operate in client mode ,vlans can be created,deleted,or renamed locally

考题 单选题You issued the following command to mount the DATA disk group in restricted mode:   ALTER DISKGROUP data MOUNT RESTRICT;   What is the implication of this command?()A  The client RDBMS instance can access the file as a read-only file.B  A new disk cannot be added to a disk group.C  A disk in a disk group can be taken offline.D  The client RDBMS instance cannot access the files in the disk group.

考题 单选题A wireless client cannot connect to an 802.11b/g BSS with a b/g wireless carD.The client section of the access point does not list any active WLAN clients. What is a possible reason for this?()A The incorrect channel is configured on the client.B The client's IP address is on the wrong subnet.C The client has an incorrect pre-shared key.D The SSID is configured incorrectly on the client.

考题 单选题You need to improve the company’s security patch management process. Your solution must meet existing business requirements and it cannot increase the number of employees or unnecessarily increase ongoing administrative effort. What should you do?()A Provide all users with the ability to access and use the Windows Update Web siteB Upgrade all client computers to either Windows 2000 Professional or Windows XP Professional. Implement Software Update Services (SUS)C Upgrade all client computers to either Windows 2000 Professional or Windows XP Professional.Make all users members of the Power Users group on their client computersD Install the Active Directory Client Extensions on all Windows 95, Windows 98, and Windows NT Workstation 4.0 computers. Manually download all security patches to a Distributed File System (DFS) replica. Instruct all users to use the DFS replica to install security patchesE Install the Active Directory Client Extensions on all Windows 95, Windows 98, and Windows NT Workstation 4.0 computers. Install a Software Update Services (SUS) server and make all users local administrators on their client computers

考题 多选题Which  statements regarding the server parameter file (SPFILE) are true()AAn SPFILE is a binary file.BAn SPFILE cannot reside on a client.CAn SPFILE cannot contain static parameters.DAn SPFILE can store changes persistently across instance restarts.EAn SPFILE can be read by the database server, but it is not written to by the server.FAn SPFILE must be created manually, before creating a database, even if you use the DatabaseConfiguration Assistant (DBCA) to create the database