计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
填空题18. The five core reasons for intruding on a system or network include ______. 导致网络入侵的5个主要原因是______。
进入题库练习
填空题 Unicast RPF can operate in ______ or ______ mode
进入题库练习
填空题20. A ______ threshold is triggered when the CPU utilization exceeds a configured threshold. 当CPU使用率高于某个预设值一段时间后,将触发______阈值。
进入题库练习
填空题20. By distributing ______ across multiple key servers and controlling the order of the key servers in the configurations, some load balancing can be achieved. 通过在多台密钥服务器上注册数量均等的 ______ ,并在配置中控制密钥服务器的运行次序,从而在一定程度上实现负载均衡。
进入题库练习
填空题20. The signature update license is configured on the router using the ______ command. 通过命令______为路由器配置签名更新许可。
进入题库练习
填空题1. A typical NAT implementation includes a single ______ stub host that requires translation to a(n) ______ network. NAT通常用于将单一一个______末端主机地址转换为______网络地址。
进入题库练习
填空题 When using EAP-MD5
进入题库练习
填空题17. The ______ SNMP security model supports both authentication and encryption. ______ SNMP安全模型同时支持认证与加密。
进入题库练习
填空题 GET VPNs provide connectionless
进入题库练习
填空题19. If the key server fails to get a ______ to a rekey message from the group member after three rekeys, it removes the group member. 如果密钥服务器连续3次没有从组成员那里接收到关于密钥更新消息的______,那么密钥服务器将移除组成员关系。
进入题库练习
填空题5. The Network Time Protocol (NTP)is typically used with the ______ SCF action. 网络时间协议(NTP)通常与SCF定义的______行为配合使用。
进入题库练习
填空题2. ______ can increase the risk to remote clients and internal resources because the clients can potentially act as a relay between untrusted and trusted networks. ______会给远程客户端和内部资源带来风险,因为客户端可能成为不可信任网络和可信任网络之间的中继设备。
进入题库练习
When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?
进入题库练习
Refer to the exhibit. The FMJ manufacturing company is concerned about unauthorized access to the Payroll Server. The Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers with access to the Payroll Server. What two technologies should be implemented to help prevent unauthorized access to the server?
进入题库练习
Refer to the exhibit. A network administrator configures a new router and enters the copy startup-config running-config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enter the system configuration dialog as shown. What is the caust of the problem?
进入题库练习
Which statement about access lists that are applied to an interface is true?
进入题库练习
which command is used to enable CHAP authentication whit PAP as the fallback method on a serial interface?
进入题库练习
Refer to the exhibit:The technician wants to upload a new IOS in the router while keeping the existing IOS. What is the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash?
进入题库练习
Which three statements about the features of SNMPv2 and SNMPv3 are true?
进入题库练习
You are working in a data center environment and are assigned the address range 10.188.31.0/23.You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each.Which IP address range meets these requirements?
进入题库练习