-
You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure Tom’s computer to run the Magnifier each time he logs on to his computer. Which two interfaces can you use?()
A . Utility Manager
B . Accessibility Wizard
C . Accessibility Options icon in Control Panel
D . Users and Passwords icon in Control Panel
-
What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link,but only allow eachindividual flow to use 1 MB/s?()
A . ip rsvp bandwidth 100000 1000
B . ip rsvp bandwidth 100000 1
C . ip rsvp bandwidth 10 1
D . ip rsvp bandwidth 1000000 1000
-
What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link, but only allow each individual flow to use 1 MB/s?()
A . ip rsvp bandwidth 10000 1000
B . ip rsvp bandwidth 100000 1
C . ip rsvp bandwidth 10 1
D . ip rsvp bandwidth 1000000 1000
-
Which two of the following statements describe a routed switch port on a multilayer switch?()
A . Layer 2 switching and Layer 3 routing are mutually supported.
B . The port will not be associated with any VLAN.
C . The routed switch port supports VLAN subinterfaces.
D . The routed switch port is used when a switch has only one port per VLAN or subnet.
E . The routed switch port ensures that STP remains in the forwarding state.
-
You need make configuration changes to an existing layer 3 switch in the Company network. On a multilayer Catalyst switch, which interface command is used to convert a Layer 3 interface to a Layer 2 interface?()
A . switchport access vlan vlan-id
B . switchport
C . switchport mode access
D . no switchport
E . None of the other alternatives apply
-
What does the DB_FLASHBACK_RETENTION_TARGET parameter configure?()
A . An upper limit on how far you can flash back the database,depending on the information in the redo logs
B . An upper limit on how far you can flash back the database,depending on the information in the undo tablespace
C . The amount of time for which the flashback data is to be kept in the flash recovery area, provided that there is enough space
D . The amount of time for which the flashback data is guaranteed to be kept in the undo tablespace,provided that there is enough space
-
Automatic PGA Memory Management eliminates the need to manually configure which of the following initialization parameters?()
A . SORT_AREA_SIZE
B . HASH_AREA_SIZE
C . BITMAP_MERGE_AREA_SIZE
D . CREATE_BITMAP_AREA_SIZE
E . PGA_AGGREGATE_TARGET
-
As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()
A . An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.
B . The counters were deleted.
C . The ARP cache was removed.
D . The IP EIGRP neighbor relationship was cleared manually.
-
Which of the following SMIT panel screens are used to configure a system’s basic network parameters for the very first time only?()
A . Change System User Interface
B . TCP/IP Further Configuration
C . TCP/IP Minimum Configuration
D . Network Installation Management
-
You have a file server that runs Windows Server 2008 R2.You configure quotas on the server.You need to view each user¯s quota usage on a per folder basis What should you do?()
A . From File Server Resource Manager, create a File Screen.
B . From File Server Resource Manager, create a Storage Management report.
C . From the command prompt, run dirquota.exe quota list.
D . From the properties of each volume, review the Quota Entries list.
-
Refer to the diagram. Which OSPF configuration command is required to configure Area 3 a s atotally stubby area?()https://assets.asklib.com/images/image2/2018073011334294346.jpg
A . On the ABR router ospf 10 area 3 stub
B . On all Area 3 routers router ospf 10 area 3 stub
C . On all Area 3 routers router ospf 10 area 3 stub no - summary
D . On the ABR router ospf 10 area 3 nssa
E . On the ABR rou ter ospf 10 area 3 stub no - summary
-
Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()
A . Configure a dynamic routing protocol.
B . Configure SVI interfaces with IP addresses and subnet masks.
C . Configure switch ports with network addresses.
D . Configure switch ports with the autostate exclude command.
E . Document the MAC addresses of the switch ports.
-
pany has implemented numerous multilayer switches that utilize FIB tables. Which statement is true about the Forward Information Base (FIB) table?()
A . The FIB is derived from the IP routing table and is optimized for maximum lookup throughput.
B . The FIB table is derived from the Address Resolution Protocol table, and it contains Layer 2 rewrite (MAC) information for the next hop.
C . When the FIB table is full, a wildcard entry redirects traffic to the Layer 3 engine.
D . The FIB lookup is based on the Layer 2 destination MAC address.
E . None of the other alternatives apply
-
You have a self-hosted Windows Communication Foundation (WCF) service. You need to configure the service to provide an X509 certificate during authentication. What should you use to configure the service?()
A . the Certificate property of the X509 Certificate lnitiator Service Credential class
B . the SetCertificate method of the X509 Certificate Initiator Service Credential class
C . the SetCertificate method of the X509 Certificate Recipient Service Credential class
D . the TrustedStoreLocation property of the X509 Certificate Recipient Service Credential cla
-
What does the DB_FLASHBACK_RETENTION_TARGET parameter configure?()
A . An upper limit on how far you can flash back the database, depending on the information in the redo logs
B . An upper limit on how far you can flash back the database, depending on the information in the undo tablespace
C . The amount of time for which the flashback data is to be kept in the flash recovery area, provided that there is enough space
D . The amount of time for which the flashback data is guaranteed to be kept in the undo tablespace, provided that there is enough space
-
Which utility is used to configure the WebSEAL Server once the files are installed?()
A . pdadmin
B . pdconfig
C . web_config
D . config_we
-
You have 20 computers that run Windows XP Professional. You need to configure the computers to use your company’s internal Windows Server Update Services (WSUS) server. What should you do?()
A . Create a scheduled task that runs wuauclt.exe.
B . Modify the Automatic Updates settings from Control Panel.
C . Modify the Automatic Updates settings in the Local Computer Policy.
D . Connect to the Windows Update Web site and select Change settings.
-
You need to configure Windows Update to meet the company’s technical requirements. What should you do?()
A . Configure WSUS2 as an autonomous server.
B . Create a Network Load Balancing (NLB) cluster.
C . Create multiple Host (A) records and use round robin DNS.
D . Configure multiple service location (SRV) records and use round robin DNS.
-
A storage administrator wants to configure the DS8000 CIM Agent for Tivoli Storage Productivity Center for Disk Version 4.1.1. What is the required tool to configure the CIM Agent()
A . the DS command line interface
B . the Storage Manager interface on the HMC
C . the DS8000 Storage Manager
D . the DS CIM command line interface (DSCIMCLI)
-
Which three actions are required to configure the Flashback Database?()
A . set Flash Recovery Area
B . enable Flashback logging
C . create FLASHBACK tablespace
D . start the database in the ARCHIVELOG mode
E . start the database in the NOARCHIVELOG mode
-
What is the IBM tool used to configure the IBM System Storage DS5000 system?()
A . DS Storage Manager
B . Tivoli Storage Manager
C . Remote Support Manager
D . Tivoli Provisioning Manager
-
Which of the following tools can be used to configure the IBM System Storage DS8000? ()
A . IBM Systems Director
B . Unisphere Management Suite
C . IBM System Storage Productivity Center (SSPC)
D . IBM Standalone Solutions Configuration Tool (SSCT)
-
If you click the Configure button along the top of Cisco SDM is graphical interface,which Tasks buttonpermits you to configure such features as SSH, NTP, SNMP, and syslog?()
A . Interfaces and Connections
B . Intrusion Prevention
C . Security Audit
D . Additional Task
-
Your network consists of a single Active Directory domain. The domain contains a server namedServer1 that runs Windows Server 2003 Service Pack 2 (SP2).Your company’s security policy states that domain users must be prevented from logging on to Server1 ifa domain controller is unavailable.You disconnect Server1 from the network and discover that you can log on to Server1.You need to configure Server1 to comply with the company’s security policy.What should you do on Server1?()
A. From the local security policy, modify the Security Options.
B. From the local security policy, modify the User Rights Assignment.
C. From Active Directory Users and Computers, modify the properties of the Server1 account.
D. From Active Directory Users and Computers, modify the properties of the Domain Computers group.