A user can ping everything on the local network earth.net fr

题目
单选题
A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()
A

Edit the /etc/hosts file and add an alias to the correct entry

B

Set up an alias in his .kshrc file to alias the hostname to the fully qualified hostname

C

Add an alias to /etc/aliases

D

Add mars.net to the search path of the resolv.conf file

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.

You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.

You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.

What should you do?

A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.

B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.

C.Create a Windows 2000 Group Policy that denies user access to My Network Places.

D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.


正确答案:C
解析:Explanation: Windows NT 4.0 system polices affect computers running Windows NT 4.0. The Windows NT computers in this scenario are being used as Terminals for the Windows 2000 Server computer that is running Terminal Services. In effect the Windows NT clients are running locally on the Windows 2000 Server. The restriction must be applied on the Windows 2000 Server. This can be done by using a group policy.

Incorrect answers:
A: System policy templates only affect Windows NT 4.0 computers. The restriction must be applied on the Windows 2000 Server.

B: Windows NT policies only affect Windows NT 4.0 computers. The restriction must be applied on the Windows 2000 Server.

D: The NT clients are running locally on the Windows 2000 Server. The restriction must be applied on the Windows 2000 Server.

第2题:

Which two commands will successfully create ping traffic?()

A. user@router# ping 10.10.10.1

B. user@router# run ping 10.10.10.1

C. user@router> ping 10.10.10.1

D. user@router> request ping 10.10.10.1


参考答案:B, C

第3题:

Regarding the extended ping command; which of the statements below are true?

(Select all valid answer choices)

A.The extended ping command is supported from user EXEC mode.

B.The extended ping command is available from privileged EXEC mode.

C.With the extended ping command you can specify the TCP and UDP port to be pinged.

D.With the extended ping command you can specify the timeout value.

E.With the extended ping command you can specify the datagram size.


正确答案:BDE
解析:Explanation:
The extended ping command works only at the privileged EXEC command line.
Some of the extended ping command values include the datagram size and timeout value as shown:

Datagram size [100]: Size of the ping packet (in bytes). Default: 100 bytes.

Timeout in seconds [2]: Timeout interval. Default: 2 (seconds). The ping is declared successful only if the ECHO REPLY packet is received before this time interval.

Incorrect Answers:
A. Regular pings are available in both user and privileged mode, but not extended pings.
C. Ports can not be specified.

第4题:

Which of the following tools can be used to identify the location of a network outage?()

  • A、traceroute
  • B、netstat
  • C、nslookup
  • D、ping

正确答案:A

第5题:

A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()

  • A、Remotely connect to the user's laptop and review the network configuration settings
  • B、Ping the web server from inside the network to ensure it is still up and running.
  • C、Check to make sure the company's website is accessible from the Internet.
  • D、Ensure the Ethernet cable is securely plugged into the user's laptop

正确答案:C

第6题:

You can successfully ping a Bridged 1483 customer‘s workstation from the local ERX. However, a remote ERX router in your network cannot ping that same device.What could be causing this problem?()

A. incorrect DSL network redistribution

B. incorrect static host route configuration

C. incorrect static customer route configuration

D. incorrect default static route configuration on the end user


参考答案:A

第7题:

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

A. reflexive

B. extended

C. standard

D. dynamic


参考答案:D

第8题:

以下说法正确的是?

A.C-Plane Latency shows the idle to active transition time the end user may experience to setup a service.

B.U-Plane shows the PING round trip time in the end to end communication

C.Peak DL Cell Throughput shows the average throughput the cell can reach in downlink, on the application layer.

D.Attach Time shows the connection time for an end user to attach to the network, during which the activation of a default bearer is performe


标准答案:ABD

第9题:

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

  • A、reflexive
  • B、extended
  • C、standard
  • D、dynamic

正确答案:D

第10题:

Which of the following can an operator use to shutdown a system into single-user mode?()

  • A、shutdown -d
  • B、shutdown -s
  • C、shutdown -m
  • D、shutdown -Fr -s 1

正确答案:C

更多相关问题