download and delete log files
view real-time statics of interfaces
reboot the system
view and add licenses
edit security settings
第1题:
When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()
第2题:
The RMAN BACKUP command using the DELETE INPUT option can be used with which three types of files? ()
第3题:
To force a user to use Ctrl-Alt-Delete to log into the computer, a technician can go to Control Panel then:()
第4题:
Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()
第5题:
Which J-Web lab do you use lo add licenses to the device?()
第6题:
Which three functions are provided by the Junos OS for security platforms?()(Choose three.)
第7题:
Which three functions are available under the "Maintain" tab of J-Web?()
第8题:
You are an administrator at Certkiller .com. Certkiller has a RODC (read-only domain controller) server at a remote location. The remote location doesn’t have proper physical security. You need to activate non- administrative accounts passwords on that RODC server. Which of the following action should be considered to populate the RODC server with non-administrative accounts passwords()
第9题:
VPN establishment
stateful ARP lookups
Dynamic ARP inspection
Network Address Translation
inspection of packets at higher levels (Layer 4 and above)
第10题:
data files
backup sets
control files
archived redo log files
第11题:
Configure
Troubleshoot
Monitor
Maintain
第12题:
Duplex mode selections
Auto MDIX selections
Status Selections
Group mode selections
Port security selections
第13题:
Which three parameters are configured in the IKE policy?()
第14题:
What are three functions of the Cisco wireless LAN controller, which is being used in the Company Centralized WLAN solution network? ()
第15题:
Which of the following sequences of steps can be used to increase the amount of virtual memory (page memory) available to Windows?()
第16题:
Which J-Web tab do you use to add licences to the device?()
第17题:
Which three parameters are configured in the IKE policy? ()(Choose three.)
第18题:
Which three functions are available under the "Maintain" tab of J-Web?()
第19题:
Certkiller .com boosts a main office and 20 branch offices. Configured as a separate site, each branch office has a Read-Only Domain Controller (RODC) server installed. Users in remote offices complain that they are unable to log on to their accounts. What should you do to make sure that the cached credentials for user accounts are only stored in their local branch office RODC server()
第20题:
You are the network administrator for the Berlin office of The company network consists of a single Active Directory domain named The Berlin office contains 15 file servers that contain confidential files. All the file servers run either Windows Server 2003 or Windows 2000 Server. All the file servers are in the BerlinFilePrint organizational unit (OU). TestKing's security department sets a rule that specifies the size and retention settings for the Security event log of all file servers. The rule also specified that local administrators on servers cannot override the changes you make to the settings for the Security event log. You need to define a method to modify the Security event log settings on each file server in the Berlin office in order to meet the states requirements. What should you do?()
第21题:
download and delete log files
view real-time statistics of interfaces
reboot the system
view and add licenses
edit security settings
第22题:
VPN establishment
stateful ARP lookups
Dynamic ARP inspection
Network Address Translation
inspection of packets at higher levels (Layer 4 and above)
第23题:
string
character
integer
calendar
numeric
translation
date
conversion