网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

What are two rules for compacting IPv6 addresses?()

  • A、Every 16 - bit segment segment that consists of all zeroes can be represented with a single colon.
  • B、The trailing zeroes in any 16 - bit  segment do not have to be written.
  • C、The leading zeroes in any 16 - bit segment do not have to be written.
  • D、Any single, continuous string of one or more 16 - bit segments that consists of all zeroes can be represented with a double colon.
  • E、The maximum number of times a double colon can replace a 16 - bit segment that consists of all zeroes is two.
  • F、Two zeroes in the middle of any 16 -bit segment do not have to be written.

参考答案

更多 “What are two rules for compacting IPv6 addresses?()A、Every 16 - bit segment segment that consists of all zeroes can be represented with a single colon.B、The trailing zeroes in any 16 - bit segment do not have to be written.C、The leading zeroes in any 16 - bit segment do not have to be written.D、Any single, continuous string of one or more 16 - bit segments that consists of all zeroes can be represented with a double colon.E、The maximum number of times a double colon can replace a 16 - bit segment that consists of all zeroes is two.F、Two zeroes in the middle of any 16 -bit segment do not have to be written.” 相关考题
考题 Which two actions are available in the GUI for creating location awareness rules?() A. WINS serverB. DNS serverC. IP reachabilityD. Resolve address

考题 In which situation do the Rules require both vessels to change course ?______.A.Two power-driven vessels meeting head-onB.Two power-driven vessels crossing when it is apparent to the stand-on vessel that the give-way vessel is not taking appropriate actionC.Two sailing vessels crossing with the wind on the same sideD.All of the above

考题 What are the two functions of intonation?

考题 Before a Diffie-Hellman exchange may begin, the two parties involved must agree on what?()A、Two secret keysB、Two nonsecret keysC、Two secret numbersD、Two nonsecret numbers

考题 Which two statements about static NAT are true? ()(Choose two.)A、Static NAT can only be used with destination NAT.B、Static NAT rules take precedence over overlapping dynamic NAT rules.C、NAT rules take precedence over overlapping static NAT rules.D、A reverse mapping is automatically created.

考题 ---“()” ---“Two degrees on starboard.” A、What rudder?B、How is the heading?C、How answer?D、What course?

考题 What are two security appliances that can be installed in a network? (Choose two.)()  A、ATMB、IDSC、IOSD、IOXE、IPSF、SDM

考题 Which two statements about static NAT are true?()A、Static NAT can only be used with destination NAT.B、Static NAT rules take precedence over overlapping dynamic NAT rules.C、Dynamic NAT rules take precedence over overlapping static NAT rules.D、A reverse mapping is automatically created.

考题 What are three configuration objects used to build JUNOS IDP rules?()A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects

考题 You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing connection security rules.Which of the following is TRUE with regards to connection security rules?()A、Connection security rules allows for traffic to be secured via IPsec.B、Connection security rules do not allow the traffic through the firewall.C、Connection security rules are applied to programs or servicesD、Connection security rules are applied between two computers.

考题 You have an Exchange Server 2010 organization for a company named Contoso, Ltd. Contoso has the following security policy:  .Messages that contain the word budget cannot be sent to external recipients .Messages that contain the name Northwind Traders must be sent to the legal department automaticallyYou need to recommend a solution to meet the security policy.  What should you recommend?()A、Create two transport rules.B、Create two message classifications.C、Create one transport rule and configure a legal hold.D、Create one message classification and configure a legal hold.

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.Due to company growth, TestKing.com has bought two other comapnies named Courseware Publishersand Stanford Finance. Youz have received instructions from the CIO to make sure that the users fromboth of these companies have their own respective e-mail address that correspond to their company. What should you do?()A、The best option is to create and configure two Receive connectors and two address lists.B、The best option is to create and configure two transport rules and two address remote entries.C、The best option is to create and configure two accepted domains and two e-mail address policies.D、The best option is to create and configure two remote domains and two accepted domains.

考题 单选题When vessel enters thick fog, she should sound()every two minutes in accordance with the rules.A one short blastB one prolonged blastC two short blasts

考题 单选题The Rules state that vessels may depart from the Rules when().A there are other vessels in the vicinityB operating in a traffic separation schemeC engaged in a situation involving more than two vesselsD necessary to avoid immediate danger

考题 单选题All client computers in your network run Windows 7 with default firewall settings.   You have a server-based application that requires an agent to be installed on all client computers.   You need to use Group Policy to allow the application to initiate installation of the agent on all client computers.   What should you do?()A Create inbound port rules.B Create inbound program rules.C Create connection security rules.D Create Windows service hardening rules.

考题 单选题—What are the rules at your school?—Don’t run in the hallways and ______ arrive late for class.A not toB won’tC don’tD no

考题 问答题What are the two functions of intonation?

考题 多选题Which two actions are available in the GUI for creating location awareness rules?()AWINS serverBDNS serverCIP reachabilityDResolve address

考题 多选题What are three configuration objects used to build JUNOS IDP rules?()Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects

考题 多选题Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)AAddresses used for NAT pools should never overlap.BIf more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.CIf traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.DDynamic source NAT rules take precedence over static source NAT rules.

考题 单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.Due to company growth, TestKing.com has bought two other comapnies named Courseware Publishersand Stanford Finance. Youz have received instructions from the CIO to make sure that the users fromboth of these companies have their own respective e-mail address that correspond to their company. What should you do?()A The best option is to create and configure two Receive connectors and two address lists.B The best option is to create and configure two transport rules and two address remote entries.C The best option is to create and configure two accepted domains and two e-mail address policies.D The best option is to create and configure two remote domains and two accepted domains.

考题 单选题You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1.  What should you do on Computer1?()A Run Winrm.exe quickconfig.B From Windows Firewall with Advanced Security, select Export Policy.C From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.D Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.

考题 单选题Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2.Server1 has several custom inbound rules and connection security rules.You need to duplicate the Windows Firewall rules from Server1 to Server2.What should you do on Server1?()A At the Command Prompt, run netsh.exe firewall dump.B At the Command Prompt, run netsh.exe firewall show firewall.txt.C From the Windows Firewall with Advanced Security console, click Export policy.D From the Windows Firewall with Advanced Security console, click the Connection Security Rules node, and then click Export List.

考题 多选题Which two statements about static NAT are true? ()(Choose two.)AStatic NAT can only be used with destination NAT.BStatic NAT rules take precedence over overlapping dynamic NAT rules.CNAT rules take precedence over overlapping static NAT rules.DA reverse mapping is automatically created.

考题 多选题What are two characteristics of Telnet (Choose two.)()。AItsendsdataincleartextformat.BItisnolongersupportedonCisconetworkdevices.CItismoresecurethanSSHDItrequiresanenterpriselicenseinordertobeimplemented.EItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.

考题 多选题What are two security appliances that can be installed in a network (Choose two.)()。AATMBIDSCIOSDIOXEIPSFSDM

考题 多选题Which two statements about static NAT are true?()AStatic NAT can only be used with destination NAT.BStatic NAT rules take precedence over overlapping dynamic NAT rules.CDynamic NAT rules take precedence over overlapping static NAT rules.DA reverse mapping is automatically created.