-
What are the four vPath packet flow steps? ()
A . perform flow lookups
B . intercept packets on service enabled ports
C . run packets through the vPath flow manager
D . classify the packets
E . flow manager emits an action for the packets
F . enforce the action determined by the flow manager
-
What are the steps required to perform a Preservation install on a server?()
A . Shutdown the server and boot it into SMS.Select SMS menu option OS Upgrade,Preservation install for the install type,and allow upgrade to run
B . Shut down the server and perform a network boot from a local NIM server.Select Presevation install for the install type,and allow upgrade to run
C . Shutdown the server and boot it into SMS.Select SMS menu option OS Upgrade,Presevation install for the install type,and allow for upgrade to run
D . Re-boot the server and NFS mount the bos images from a local NIM server.Run smit install.Select Presevation install for the install type,and allow upgrade to ru
-
What are the steps required to perform a Preservation install on a server?()
A . Shutdown the server and boot it into SMS.Select SMS menu option OS Upgrade, Preservation install for the install type, and allow upgrade to run.
B . Shut down the server and perform a network boot from a local NIM server. Select Preservation install for the install type, and allow upgrade to run.
C . Shutdown the server and boot it into SMS.Select SMS menu option OS Upgrade, Preservation install for the install type, and allow for upgrade to run.
D . Re-boot the server and NFS mount the bos images from a local NIM server. Run smit install. Select Preservation install for the install type, and allow upgrade to run.
-
What are the steps for configuring stateful NBAR for dynamic protocols?()
A . Use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.
B . Use the command match protocol rtp to allow identification of real-time audio and video traffic. Use thecommand ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers.
C . Use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface.
D . Configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.
E . Configure video streaming. Configure audio streaming. Attach the codec to an interface.
-
What are the steps for configuring stateful NBAR for dynamic protocols? ()
A . use the command ip nbar protocol-discovery to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
B . use the command match protocol rtp to allow identification of real-time audio and video traffic. Use the command ip nbar port-map to extend the NBAR functionality for well-known protocols to new port numbers
C . use the command match protocol to allow identification of stateful protocols. Use the command ip nbar port-map to attach the protocols to an interface
D . configure a traffic class. Configure a traffic policy. Attach the traffic policy to an interface.
E . configure video streaming. Configure audio streaming. Attach the codec to an interface
-
What two steps need to be taken in deploying AutoQoS for enterprise on routers?()
A . provide visibility into the classes of service deployed using system logging and SNMP traps
B . determine WAN settings for fragmentation, compression, encapsulation, and Frame Relay-ATM interworking
C . enable the AutoQoS VoIP for voice traffic
D . generate and deploy MQC-based QoS policies
E . profile the traffic with Auto-Discovery
-
When a router converts analog signals to digital signals, what three steps are always included in the process?()
A . involution
B . encoding
C . sampling
D . quantization
E . compression
F . companding
-
What are the basic configuration steps to enable IS - IS?()
A . Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.
B . Configure the net sy stem - id and the network net - id commands under routerisis.
C . Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.
D . Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.
E . Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.
-
What are two steps that must be taken when mitigating a worm attack?()
A . Inoculate systems by applying update patches.
B . Limit traffic rate.
C . Apply authentication.
D . Quarantine infected machines.
E . Enable anti-spoof measures.
-
IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()https://assets.asklib.com/images/image2/2018072709341330622.jpg
A . A
B . B
C . C
D . D
-
What are the four steps, in their correct order, to mitigate a worm attack?()
A . contain,inoculate,quarantine,and treat
B . inoculate,contain,quarantine,and treat
C . quarantine,contain,inoculate,and treat
D . preparation,identification,traceback,and postmortem
E . preparation,classification,reaction,and treat
F . identification,inoculation,postmortem,and reactio
-
What are two steps that are taken when a router converts a voice signal from analog to digital form?()
A . sampling
B . packetization
C . quantization
D . serializatio
-
As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()
A . Perform a network audit.
B . Form an impression about the network.
C . Use traffic analysis to augment organizational input.
D . Prepare and add to the network description.
-
What are the three steps you should take to tune a JDBC Connection pool in WebLogic from the initial settings in a production environment?()
A . Ensure the maximum size is increased to an appropriate setting.
B . Set the minimum and maximum size of the connection pool to the same value.
C . Increase the statement cache size.
D . Add more heap to the JVM.
E . Add more nodes to the cluster.
-
A system administrator’s daily monitoring has revealed a failing disk drive. The drive that is failing, hdisk0, is a lvm mirrored drive. What is the first step that should be taken in order to physically replace this drive?()
A . Remove the physical volume from the system.
B . Remove the physical volume from the volume group.
C . Remove the physical partitions from the volume group.
D . Remove the logical volume copies from the failing drive.
-
You want to enhance the security within the LAN and prevent VLAN hopping. What two steps can be taken to help prevent this?()
A . Enable BPD guard
B . Disable CDP on ports where it is not necessary
C . Place unused ports in a common unrouted VLAN
D . Prevent automatic trunk configuration
E . Implement port security
-
You want to enhance the security within the LAN and prevent VLAN hopping. What two steps canbe taken to help prevent this?()
A . Enable BPD guard
B . Disable CDP on ports where it is not necessary
C . Place unused ports in a common unrouted VLAN
D . Prevent automatic trunk configuration
E . Implement port security
-
When a router converts analog signals to digital signals, what three steps are always included in the process? ()
A . involution
B . encoding
C . sampling
D . quantization
E . compression
F . companding
-
(9) Unemployment has become an increasing problem in the recent past.What factors contribute to an increase in unemployment and what steps can be taken to solve the problem?
-
What did the man do everySunday? [A]Hewas taken to church three times. [B]Hestayed at home all day. [C]Heplayed in the street.
-
There are several steps that can be taken, of which the chief one is to demand of all
There are several steps that can be taken, of which the chief one is to demand of all the organizations that exist with the declared objectives of safeguarding the interests of animals that they should declare clearly where they stand on violence towards people.
-
What are the necessary steps for writing an illustrative essay?
A.Choose a topiC
B.Brainstorm all the relevant examples.
C.Use all of the examples in the essay.
D.Make an outline before writing the whole essay.
此题为多项选择题。