网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which smb.conf configuration keyword determines the hostname resolution order?()
A

 use ads

B

 name resolve order

C

 use nsswitch.conf

D

 use resolv.conf


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which smb.conf configuration keyword determines the hostname resolution order?()A  use adsB  name resolve orderC  use nsswitch.confD  use resolv.conf” 相关考题
考题 The question ()we should use this brand name will be decided by our marketing team. A、whetherB、whatC、which

考题 What is the use of final keyword?

考题 Given the following router output,which configuration file will the router use at its next reload?() A.configB.clientqos.cnfC.startup-configD.running-configuration

考题 A system does not have a nameserver defined for IP address resolution. What file does AIX use to determine the IP address of a remote system?() A. /etc/hostsB. /etc/namesC. /etc/rc.tcpipD. /etc/resolv.conf

考题 Which two of these are correct regarding the recommended practice for distribution layer design based on the following configuration?() A. use a Layer 2 link between distribution switchesB. use a Layer 3 link between distribution switchesC. use a redundant link to the coreD. use a Layer 3 link between distribution switches with route summarization

考题 Which keyword can protect a class in a package from accessibility by the classes outside the package()。A、privateB、protectedC、finalD、don’t use any keyword at all (make it default)

考题 You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application. The user name and password that is kept by the connection string is stored directly in the code of the application. You want to make sure that the password in the connection string is as protected.   What should you do? ()A、 Add the connection string to the Settings.settings file.B、 Add connection string to the Web.config file and use protected configuration.C、 Use the TRUE setting in the Persist Security Info keyword.D、 Use the FALSE setting in the Persist Security Info keyword

考题 Which of the following statements regarding documentation would not be considered a helpful stepin the troubleshooting process?()A、Use the Cisco Auto Configuration toolB、Use the Cisco Rollback featureC、Automate documentationD、Schedule documentation checksE、Use the Cisco Configuration Archive toolF、Require documentation prior to a ticket being closed out

考题 Which of the following statements are true when creating NETBIOS names? ()A、 NETBIOS names can only use alphanumeric characters.B、 You can use a ’.’ in a NETBIOS name.C、 You can use an ’_’ (underscore) in a NETBIOS name.D、 NETBIOS names must be UPPERCASEE、 NETBIOS names can be a maximum of 32 characters

考题 Which smb.conf configuration keyword determines the hostname resolution order?()A、 use adsB、 name resolve orderC、 use nsswitch.confD、 use resolv.conf

考题 A system does not have a nameserver defined for IP address resolution. What file does AIX use to determine the IP address of a remote system?()A、/etc/hostsB、/etc/namesC、/etc/rc.tcpipD、/etc/resolv.conf

考题 Which clause should you use to exclude group results?()A、WHEREB、HAVINGC、RESTRICTD、GROUP BYE、ORDER BY

考题 You are administering a database stored in Automatic Storage Management (ASM). You use RMAN to back up the database and the MD_BACKUP command to back up the ASM metadata regularly. You lost an ASM disk group DG1 due to hardware failure. In which three ways can you re-create the lost disk group and restore the data?()A、Use the MD_RESTORE command to restore metadata for an existing disk group by passing the existing disk group name as an input parameter and use RMAN to restore the data.B、Use the MKDG command to restore the disk group with the same configuration as the backed-up disk group and data on the disk group.C、Use the MD_RESTORE command to restore the disk group with the changed disk group specification, failure group specification, name, and other attributes and use RMAN to restore the data.D、Use the MKDG command to restore the disk group with the same configuration as the backed-up disk group name and same set of disks and failure group configuration, and use RMAN to restore the data.E、Use the MD_RESTORE command to restore both the metadata and data for the failed disk group.F、Use the MKDG command to add a new disk group DG1 with the same or different specifications for failure group and other attributes and use RMAN to restore the data.

考题 You are designing a strategy to enable the ATC application to successfully resolve computer names. Which name resolution method should you use?()A、DNSB、WINSC、Hosts fileD、Lmhosts file

考题 You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.

考题 单选题You are designing a strategy to enable the ATC application to successfully resolve computer names. Which name resolution method should you use?()A DNSB WINSC Hosts fileD Lmhosts file

考题 单选题An administrator is attempting to use Hyper-V on a server with an AMD processor but is receiving an error. Which of the following should be enabled to resolve the error?()A XDB NXC VTD Hyperthreading

考题 单选题Which of the following BEST describes the function of a DNS server?()A Secures network traffic through shared key encryption.B Provides resolution of host names to IP addresses.C Provides security for a network through the use of ACLs.D Dynamically assigns IP addresses for easy client configuration.

考题 单选题Which interface does the Infranet Controller use to push the configuration? ()A trusted portB internal portC trust interfaceD untrust interface

考题 单选题You are designing a strategy to enable the ATC application to successfully resolve computer names.  Which name resolution method should you use?()A  DNSB  WINSC  Hosts fileD  Lmhosts file

考题 单选题A system does not have a nameserver defined for IP address resolution. What file does AIX use to determine the IP address of a remote system?()A /etc/hostsB /etc/namesC /etc/rc.tcpipD /etc/resolv.conf

考题 单选题You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application. The user name and password that is kept by the connection string is stored directly in the code of the application. You want to make sure that the password in the connection string is as protected.   What should you do? ()A  Add the connection string to the Settings.settings file.B  Add connection string to the Web.config file and use protected configuration.C  Use the TRUE setting in the Persist Security Info keyword.D  Use the FALSE setting in the Persist Security Info keyword

考题 单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.Which of the following options can be you in order to change the permissions settings for a public folder?()A You must use the Active Directory Users and Computers.B You must use the Microsoft Office Outlook.C You must use the Mail Flow Troubleshooter.D You must use the Exchange Server Jetstress 2010.

考题 单选题Which keyword can protect a class in a package from accessibility by the classes outside the package()。A privateB protectedC finalD don’t use any keyword at all (make it default)

考题 单选题A user took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. The user can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?()A Incorrect DNSB Incorrect subnet maskC Duplicate IP addressD Incorrect SSID

考题 多选题Which of the following statements are true when creating NETBIOS names? ()ANETBIOS names can only use alphanumeric characters.BYou can use a ’.’ in a NETBIOS name.CYou can use an ’_’ (underscore) in a NETBIOS name.DNETBIOS names must be UPPERCASEENETBIOS names can be a maximum of 32 characters

考题 单选题You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A You should use /63.B You should use /64.C You should use /61.D You should use /62.

考题 单选题Which smb.conf configuration keyword determines the hostname resolution order?()A  use adsB  name resolve orderC  use nsswitch.confD  use resolv.conf