.65 through .126
.64 through .127
.66 through .128
.65 through .127
单选题What are the usable host on the 96.6.128.0/19 network?()A 96.6.128.1 through 96.6.143.254B 96.6.128.128 through 96.6.134.254C 96.6.128.0 through 96.6.134.254D 96.6.128.1 through 96.6.159.254
点击查看答案
单选题Which of the following virtualization options are unique to AIX and PowerVM compared to other UNIX based offerings?()A Software virtualization through PowerVM and hardware virtualization through IBM Systems Director.B Hardware virtualization through Workload Partitions (WPARS) and software virtualization through PowerVM.C Software virtualization through Workload Partitions (WPARS) and hardware virtualization through PowerVM.D Hardware virtualization through Workload Partitions (WPARS) and software virtualization through IBM Systems Director.
单选题What are the usable hosts on the .128.0/19 network?()A .128.1 through .143.254B .128.128 through .134.254C .128.0 through .134.254D .128.1 through .159.254
单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A BPDUB Port securityC RSTPD STPE VTPF Blocking mode
单选题Which of the following BEST describes a DAS?()A A collection of disks presented as storage to multiple servers through dedicated channels.B A collection of disks presented as storage to a single server through an existing network.C A collection of disks presented as storage to a single server through directly attached technologies.D A collection of disks presented as storage to multiple servers through an existing network.
单选题What are the usable hosts on the 200.50.12.64/26 network?()A .65 through .126B .64 through .127C .66 through .128D .65 through .127
单选题You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()AAllow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.BAllow all inbound VPN traffic to pass through the perimeter firewall only.CAllow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.DAllow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.