CompTIA认证考试

Which of the following can limit cabling mistakes?()A、Proper labelingB、Asset managementC、Keeping good vendor logsD、Keeping up-to-date repair logs

题目

Which of the following can limit cabling mistakes?()

  • A、Proper labeling
  • B、Asset management
  • C、Keeping good vendor logs
  • D、Keeping up-to-date repair logs
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following methods can move files in clear text and can be easily intercepted?()

A.RSH

B.SNMP

C.FTP

D.TELNET


参考答案:C

第2题:

An administrator wants to limit how much data each user is storing. Which of the following will BEST address this issue?()

  • A、 Quotas
  • B、 SNMP
  • C、 Disk management
  • D、 ACL

正确答案:A

第3题:

(ii) Explain, with reasons, the relief available in respect of the fall in value of the shares in All Over plc,

identify the years in which it can be claimed and state the time limit for submitting the claim.

(3 marks)


正确答案:

 

第4题:

Which of the following tools can be used to identify the location of a network outage?()

  • A、traceroute
  • B、netstat
  • C、nslookup
  • D、ping

正确答案:A

第5题:

Which of the following methods can move files in clear text and can be easily intercepted?()

  • A、RSH
  • B、SNMP
  • C、FTP
  • D、TELNET

正确答案:C

第6题:

What does the DB_FLASHBACK_RETENTION_TARGET parameter configure?()

  • A、An upper limit on how far you can flash back the database, depending on the information in the redo logs
  • B、An upper limit on how far you can flash back the database, depending on the information in the undo tablespace
  • C、The amount of time for which the flashback data is to be kept in the flash recovery area, provided that there is enough space
  • D、The amount of time for which the flashback data is guaranteed to be kept in the undo tablespace, provided that there is enough space

正确答案:C

第7题:

Which of the following protocols can be found at the application layer?()

  • A、Telnet
  • B、TCP
  • C、SNMP
  • D、UDP

正确答案:A

第8题:

A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()

A. It enables an attacker to perform an IP sweep of devices.

B. It enables a hacker to know which operating system the system is running.

C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.

D. It creates a ping of death and can cause the entire network to be infected with a virus.


参考答案:C

第9题:

Which of the following are storage technologies that can be hot swappable?()

  • A、SCSI
  • B、SAS
  • C、ATA
  • D、IDE
  • E、CMOS

正确答案:A,B

第10题:

The "1000" in 1000BaseT cabling represents which of the following?()

  • A、The theoretical maximum cable length
  • B、The theoretical maximum bandwidth
  • C、The theoretical port limit of the cable
  • D、The quality level of the copper wiring used

正确答案:B

更多相关问题