-
Which of these commands can you use to show if an operational Catalyst switch port is set for autonegotiation of speed and duplex when running Cisco IOS software?()
A . show port network
B .
-
The VBB Company wants to find out which set of progress tones and cadences are supported with its local Cisco Unified CallManager Express service. Which command should be used?()
A . VBBRtr(config-telephony)#user-network ?
B . VBBRtr(config-telephony)#local-network ?
C . VBBRtr(config-telephony)#language-type ?
D . VBBRtr(config-telephony)#network-locale ?
E . VBBRtr(config-telephony)#network-language ?
-
Which command will set the core size file to unlimited for the user‘webapp’?()
A . no -p 'core=-1' webapp
B . chuser 'core=-1' webapp
C . setsenv -attr 'core=unlimited' webapp
D . chsec -f '/etc/security/limits' 'core=-1' weba
-
You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?()
A . Bandwidth 56000
B . Bandwidth 56000000
C . Bandwidth 56
D . Bandwidth 56k
-
Which of the following commands should be used to set network attributes on a currently running kernel?()
A . no
B . chdev
C . vmtune
D . schedtune
-
Which command will display the current control key settings?()
A . ’tty-l’
B . ’stty-a’
C . ’lstty-a’
D . ’terminfo-l&rsquo
-
Which command will create a group called ’delivery’ and set the administrators to ’john’ and ’mary’?()
A . mkgroup -A=john,mary delivery
B . groupadd -A=john,mary delivery
C . mkgroup adms=john,mary delivery
D . groupadd adms=john,mary delivery
-
An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()
A . As the root user from serverA run the command rhost serverB
B . As the root user from serverA run the command rlogin serverB
C . As the desired user from serverB run the command rhost serverA
D . As the desired user from serverA run the command rlogin serverB
-
A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?()
A .https://assets.asklib.com/images/image2/2018072410184265102.jpg
B .https://assets.asklib.com/images/image2/2018072410185018652.jpg
C .https://assets.asklib.com/images/image2/2018072410192858817.jpg
D .https://assets.asklib.com/images/image2/201807241019353667.jpg
-
Examine the command: SQL> DBMS_STATS.SET_TABLE_PREFS(’SH’, ’CUSTOMERS’, ’PUBLISH’, ’false’); Which statement describes the effect of the above command()
A . Automatic statistics collection is stopped for the CUSTOMERS table.
B . Statistics for the CUSTOMERS table are locked and cannot be overwritten.
C . Existing statistics for the CUSTOMERS table become unusable for the query optimizer.
D . Subsequently, statistics gathered on the CUSTOMERS table are stored as pending statistics.
-
Which set of commands is recommended to prevent the use of a hub in the access layer?()
A . switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1
B . switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1
C . switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1
D . switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1
-
Which of the following commands will set the duplex of a network adapter?()
A . no -a media_speed=100_Full_Duplex en0
B . ifconfig -a media_speed=100_Full_Duplex ent0
C . chdev -l ent0 -a media_speed=100_Full_Duplex
D . chinet -l en0 -a media_speed=100_Full_Duplex en0
-
Which command will show the network configuration settings associated with an Ethernet adapter?()
A . lscfg
B . lsdev
C . netstat
D . ifconfig
-
Which command will display the current control key settings?()
A . ‘tty -l’
B . ‘stty -a’
C . ‘lstty -a’
D . ‘terminfo -l&rsquo
-
Examine the following command; ALTER SYSTEM SET enable_ddl_logging = TRUE; Which statement is true?()
A . Only the data definition language (DDL) commands that resulted in errors are logged in the alert log file.
B . All DDL commands are logged in the alert log file.
C . All DDL commands are logged in a different log file that contains DDL statements and their execution dates.
D . Only DDL commands that resulted in the creation of new segments are logged.
E . All DDL commands are logged in XML format in the alert directory under the Automatic Diagnostic Repository (ADR) home.
-
Which command sets and automatically encrypts the privileged enable mode password?()
A . enbale password c1sco
B . secret enable c1sco
C . password enable c1sco
D . enable secret c1sco
-
An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()
A . As the root user from serverA run the command rhost serverB
B . As the root user from serverA run the command rlogin serverB
C . As the desired user from serverB run the command rhost serverA
D . As the desired user from serverA run the command rlogin serverB
-
Which of the following commands should be used to check the settings for a new tty that was just set up as tty2?()
A . lsattr -El tty2
B . lscons -d /dev/tty2
C . lscfg -vl tty2
D . what /dev/tty2
-
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()
A . all interfaces in the path toward the destination
B . all networks in the path toward the destination
C . adjacent next hop router in the path toward the destination
D . all routers in the path toward the destination
E . all interfaces through which the packets can be routed
F . type of service and precedence in the IP packet
-
A system administrator needs to replace a mirrored disk. After performing the proper removal process and replacing the disk, which of the following set of commands should be performed to bring the disk back into production?()
A . reboot, mklvcopy, syncvg
B . cfgmgr -vl ssar, chvg -va, syncvg
C . cfgmgr, extendvg, syncvg
D . extendvg, mklvcopy, syncvg
-
Which command will set the core size file to unlimited for the user ‘webapp’?()
A . no -p ’core=-1’ webapp
B . chuser ’core=-1’ webapp
C . setsenv -attr ’core=unlimited’ webapp
D . chsec -f ’/etc/security/limits’ ’core=-1’ weba
-
Examine the following command:ALTER SYSTEM SET enable_ddl_logging=FALSE;Which statement is true?()
A . None of the data definition language (DDL) statements are logged in the trace file.
B . Only DDL commands that resulted in errors are logged in the alert log file.
C . A new log.xml file that contains the DDL statements is created, and the DDL command details are removed from the alert log file.
D . Only DDL commands that resulted in the creation of new database files are logged.
-
Examine the command: SQL> DBMS_STATS.SET_TABLE_PREFS(’SH’, ’CUSTOMERS’, ’PUBLISH’, ’false’); Which statementdescribes the effect of the above command()
A . Automatic statistics collection is stopped for the CUSTOMERS table.
B . Statistics for the CUSTOMERS table are locked and cannot be overwritten.
C . Existing statistics for the CUSTOMERS table become unusable for the query optimizer.
D . Subsequently, statistics gathered on the CUSTOMERS table are stored as pending statistic
-
In a Bridged 1483 network, which set of commands is used to configure an ATM subinterface?()
<img src='https://img2.soutiyun.com/shangxueba/ask/17124001-17127000/17126077/dc9fe5064199fb9f9cef6d2afb6f11cc.jpg' /><img src='https://img2.soutiyun.com/shangxueba/ask/17124001-17127000/17126077/ef0d6f202b5ced69b5ea9879bbc5e019.jpg' /><img src='https://img2.soutiyun.com/shangxueba/ask/17124001-17127000/17126077/bbd13fb87c2d391ff28b07beae74c453.jpg' />
A.A
B.B
C.C
D.D