网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which of the following is the FIRST course of action before implementing a change to a server?()
- A、Survey users to get their response to the potential server change.
- B、The change should be approved by management.
- C、Switch over to the alternate site so users are not affected.
- D、Implement RAID so the server does not go offline.
参考答案
更多 “Which of the following is the FIRST course of action before implementing a change to a server?()A、Survey users to get their response to the potential server change.B、The change should be approved by management.C、Switch over to the alternate site so users are not affected.D、Implement RAID so the server does not go offline.” 相关考题
考题
Which of the following desdription is WRONG .about Wi-Fi? ( ).A.Any standard Wi~Fi device. will work anywhere in the world with global operative set of standaedsB.Now most laptops are built with wireless network adapters insideC.One can connect Wi-Fi devices in ad-hoc mode for client-to-client connections without a routerD.Communications between two devices need the involvement of an access point with Wi-Fi
考题
Which of the following pairs is not a minimal pair?( ) A./sip//zip/
B./fi:l//li:f/
C./keit//feit/
D./sai//sei/
考题
Which of the following statement BEST summarizes the meaning of the first four paragraphs?( ) A.Cyberspace has more benefits than defects.
B.Cyberspace is like a double-edged sword.
C.Cyberspace symbolizes technological advance.
D.Cyberspace still remains a sci-fi notion.
考题
A customer, Bob, needs to be able to access the Internet while traveling. Which of the following could Jill, a technician, recommend to Bob?()A、Cellular service with an adapter for Bob’s laptop.B、USB adapter with 802.11n capabilities for maximum speeds.C、A Bluetooth card to attach to multiple networks.D、Enable Wi-Fi so Bob can connect to any open network.
考题
Which of the following is a performance optimization technology?()A、QoSB、TrunkingC、SpanningD、VoIP
考题
Which of the following utilities are used to choose which programs run at startup? ()A、SFCB、SETDEBUGC、MSCONFIGD、REGEDIT
考题
Which of the following commands will be run at a command prompt to determine which WindowsOS is running on the computer?()A、VERB、Device ManagerC、VERIFYD、SET
考题
Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering
考题
单选题Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()A
MPLS TE FRB
MPLS VPNC
BFDD
RSVPE
VPLSF
SNMP
考题
单选题Scalability: with the cisco wireless location appliance, 2500 devices including wireless clients or wi-fi tags can be tracked simultaneously, helping ensure that location services can be applied to an entire enterprise environment. Which of the following functions on the wireless lan controller is used to determine whether or not a rogue access point is connected to the same layer 2 network?()A
rogue detectorB
rogue containmentC
rldpD
ridp
考题
单选题A customer, Bob, needs to be able to access the Internet while traveling. Which of the following could Jill, a technician, recommend to Bob?()A
Cellular service with an adapter for Bob’s laptop.B
USB adapter with 802.11n capabilities for maximum speeds.C
A Bluetooth card to attach to multiple networks.D
Enable Wi-Fi so Bob can connect to any open network.
考题
单选题Which of the following is a RF peer to peer mesh protocol used for lighting and other residential electronics?()A
Z-WaveB
X10C
CEBusD
Wi-Fi
考题
单选题Which IEEE standard is used to define Wi-Fi?()A
IEEE 802.3B
IEEE 802.5C
IEEE 802.11hD
IEEE 802.11cE
IEEE 802.11
热门标签
最新试卷