Implementation of access control lists (ACLs)
Implementation of more than two network cards
Implementation of iSCSI attached storage
Implementation of more than 4GB of RAM
第1题:
Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?()
第2题:
Which of the following cables would use a DB-15 connector type?()
第3题:
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()
第4题:
Which of the following tools would an administrator BEST use to trace a network cable?()
第5题:
Which of the following protocols would a multilayer switch use to learn the IP address of a directly connected device?()
第6题:
A technician needs to find an end of a network cable drop. Which of the following tools would the technician use?()
第7题:
Which of the following tools would a technician use to map a drive to a user’s machine?()
第8题:
Which of the following commands would a technician MOST likely use to map a printer from aremote computer?()
第9题:
Which of the following scenarios would dictate the use of a 64-bit processor instead of a 32-bit processor?()
第10题:
Which of the following commands would an administrator use to add startup scripts to the system startup process()