Edit the /etc/hosts file and add an alias to the correct entry
Set up an alias in his .kshrc file to alias the hostname to the fully qualified hostname
Add an alias to /etc/aliases
Add mars.net to the search path of the resolv.conf file
第1题:
You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.
You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.
You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.
What should you do?
A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.
B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.
C.Create a Windows 2000 Group Policy that denies user access to My Network Places.
D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.
第2题:
A. user@router# ping 10.10.10.1
B. user@router# run ping 10.10.10.1
C. user@router> ping 10.10.10.1
D. user@router> request ping 10.10.10.1
第3题:
Regarding the extended ping command; which of the statements below are true?
(Select all valid answer choices)
A.The extended ping command is supported from user EXEC mode.
B.The extended ping command is available from privileged EXEC mode.
C.With the extended ping command you can specify the TCP and UDP port to be pinged.
D.With the extended ping command you can specify the timeout value.
E.With the extended ping command you can specify the datagram size.
第4题:
Which of the following tools can be used to identify the location of a network outage?()
第5题:
A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()
第6题:
A. incorrect DSL network redistribution
B. incorrect static host route configuration
C. incorrect static customer route configuration
D. incorrect default static route configuration on the end user
第7题:
A. reflexive
B. extended
C. standard
D. dynamic
第8题:
以下说法正确的是?
A.C-Plane Latency shows the idle to active transition time the end user may experience to setup a service.
B.U-Plane shows the PING round trip time in the end to end communication
C.Peak DL Cell Throughput shows the average throughput the cell can reach in downlink, on the application layer.
D.Attach Time shows the connection time for an end user to attach to the network, during which the activation of a default bearer is performe
第9题:
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()
第10题:
Which of the following can an operator use to shutdown a system into single-user mode?()