【判断题】
轨道制作主要是轨道调直和接头,调直后对轨道进行编号,两条轨道上从端部或伸缩缝处算起,轨道接头至少要对齐,以使运转平稳
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
为实现电动机连续正转运行需采用具有接触器自锁的控制线路和手动正转控制回路
【判断题】
在修理带传动机构时,发现带轮孔超差额0.08mm,造成配合过松,一般可用镀铬法来加大轴颈尺寸
【判断题】
用经纬仪和平行光管测量机床转台分度误差时,应用专用心轴配装在转台中心孔中将经纬仪和心轴紧固联接在一起
【判断题】
采用双螺母螺纹式调整滚珠丝杠轴向间隙的方法结构紧凑,调整方便,应用广泛
【判断题】
若自准直仪上读数鼓轮每格角值分度值为1",则其线值分度值可用0.05mm/m表示
【判断题】
所有的紫色酒精,在 1 米内不准点有明火,不准放在暖气片上
【判断题】
固定式装配适用于单件和小批量模具的装配,以及装配精度要求较高,需要调整的部位较多的装配
【判断题】
我国对企业发生的事故,坚持“四不放过”原则进行处理
【判断题】
在机械设备中,凸轮表面误差将会引起扭转振动
【单选题】
What happens to the status of users already logged into ESXi Shell when a vSphere administrator enables lockdown mode?___
A. Users remain logged in and can run commands, except to disable lockdown mode.
B. Users remain logged in and can run commands, including disabling lockdown mode.
C. Users are immediately logged out of ESXi Shell.
D. Users are logged out after a timeout specified by the vSphere administrator.
【单选题】
What is the effective vSphere licensing level during the 60 day evaluation period?___
A. vSphere Foundation Essentials Plus
B. vSphere Standard
C. vSphere Enterprise
D. vSphere
E. nterprise Plus
【单选题】
To comply with security requirements, an administrator with a vCenter Server Appliance needs to force logoff of the vSphere web client after 10 minutes of inactivity.What should the administrator do to meet the requirement?___
A. Edit: /var/lib/vmware/vsphere-client/webclient.properties, modify session.timeout=10
B. Edit: /opt/vmware/vsphere-client/webclient.properties, modify session.timeout=600
C. Edit: /var/lib/vmware/vsphere-client/webclient.properties modify session.timeout=600
D. Edit: /opt/vmware/vsphere-client/webclient.properties, modify session.timeout=10
【单选题】
An administrator enables High Availability (HA) on a Virtual SAN cluster.Which network is used for HA Network Heatbeat configuration?___
A. The Management network.
B. The vMotion network.
C. The Virtual SAN network.
D. The Provisioning Traffic network.
【单选题】
A user wants to monitor a business-critical virtual machine to ensure that it doesn't run out of resources. What metric could be monitored in vRealize Operations to address this concern?___
A. Time Remaining badge
B. Compliance badge
C. Reclaimable Waste badge
D. Density badge
【单选题】
An administrator has recently installed a new ESXi 6.x Host, and during the configuration notices sporadic network problems. To check whether the issue occurred sometime during the configuration, the administrator would like to reset the system.How can this be accomplished in the shortest amount of time?___
A. Run the ESXi installer again and reinstall the host.
B. Select the Reset System Configuration option from the vSphere Client when connected directly to the host.
C. From the
D. irect Console User Interface, select Reset System Configuration.
【单选题】
A vApp is running out of compute resources when overall activity is high within the resource pool. At other times, everything is fine.What should be done to resolve this issue?___
A. Increase the size of the resource pool Shares.
B. Set the vApp's CPU and Memory Reservation Type to Expandable.
C. Set the vApp's CPU and Memory Limit to Unlimited.
D. Create a new resource pool with the existing hardware configuration.
【单选题】
A virtual machine has been renamed and an administrator is unable to find files with the new virtual machine name in the datastore.What is the reason for this?___
A. The names of the files on the datastore do not change.
B. The names of the files on the datastore have been corrupted.
C. The virtual machine needs to be re-added to the inventory.
D. The Distributed Resource Scheduler moved the virtual machine to another host.
【单选题】
An administrator has configured network connectivity for a new virtual machine, as shown in the Exhibit.What will occur with the network traffic of this virtual machine when communicating externally from vSwitch1?___
A. The virtual machine will communicate on both uplinks
B. The virtual machine will only communicate on vmnic1
C. The virtual machine will only communicate on vmnic2
D. The virtual machine will fail to communicate externally
【单选题】
An administrator is unable to create the first group in a new vRealize Operations environment. What is the likely cause of the problem?___
A. There are no group types defined.
B. The group is not defined in SSO.
C. There are more than 32 group types defined.
D. The description for the group is not provided.
【单选题】
A new vApp was built and tested in the corporate headquarters datacenter running vSphere 6.x. What condition would explain why the virtual machine is failing to boot in an offsite datacenter running on vSphere 5.5?___
A. The virtual machine was built with the default hardware version.
B. The VMFS 5 datastore is not compatible with virtual machines configured with vSphere 6.x.
C. a
D. RS 5.5 cluster cannot run virtual machines configured with vSphere 6.x.
【单选题】
An administrator is evaluating whether to deploy vCenter Server on a Windows server or on a vCenter Server appliance. The administrator has the following requirements: <A web browser will be utilized to manage the vSphere environment.> <16 ESXi hosts will be deployed.> <Licenses must be shared with a vCenter Server at another site.> <An external Oracle 10g database server will be used to host the vCenter Server database.> Why will the administrator need to deploy vCenter Server on a Windows server?___
A. Linked Mode is a requirement for the solution.
B. Oracle 10g is a requirement for the solution.
C. The vSphere web client is a requirement for the solution.
D. Management of more than 5 hosts is a requirement for the solution.
【单选题】
What is a benefit of using VMware Data Protection ?___
A. Provides support for guest-level backups and restores of Microsoft SQL Servers, Exchange Servers, and Share Point Servers.
B. Provides support for advanced storage services including replication, encryption, deduplication, and compression.
C. Provides direct access to VDP configuration integrated into the vSphere Client.
D. Reduces disk space consumed by virtual machine data using deduplication.
【单选题】
An administrator enables vSphere High Availability (HA) on an existing cluster with a large number of hosts and virtual machines. The administrator notices that the setup of vSphere HA on some of the hosts is failing. What step, if taken, might resolve this issue?___
A. Increase the value of the config.vpxd.das.electionWaitTimeSec setting.
B. Set the value of vpxd.das.aamMemoryLimit to 256.
C. Set the value of the das.useDefaultIsolationAddress setting to False.
D. Increase the value of the das.iostatsinterval setting.
【单选题】
An ESXi 6.x host consists of 24 logical cores. Hyperthreading is enabled on the host. What is the maximum number of vCPUs that can be assigned to a virtual machine on this host?___
【单选题】
By default, each ESXi 6.x host is provisioned with a certificate from which root certificate authority?___
A. RedHat Certificate Authority
B. VMware Certificate Authority
C. DigiCert Certificate Authority
D. Verisign Certificate Authority
【单选题】
An administrator is adding an NFS datastore as shown in the Exhibit. What is the purpose of the Servers to be added list?___
A. It contains the IP addresses of the NFS Storage Server to provide multipathing capability.
B. It contains the IP addresses of the ESXi hosts that mount the datastore.
C. It contains the IP addresses used for
D. ynamic Discovery of targets.
【单选题】
An administrator reports that the System Event log data is only available for 24 hours when reviewing the Hardware Status tab. Which condition could be responsible for the loss of data?___
A. A Reset event log was executed.
B. The statistical collection level was set to a value of 1.
C. The boot disk of the host is corrupt.
D. Syslog has been configured at the vCenter Server level.
【单选题】
During an upgrade, the ESXi 6.x installer finds an existing version of ESXi and a VMFS3 volume. No virtual machines exist on the host or VMFS3 volume. The requirement is to upgrade to VMFS5. Which option should be chosen to meet this requirement?___
A. Upgrade ESXi and preserve the VMFS datastore
B. Install ESXi and preserve the VMFS datastore
C. Install ESXi and overwrite the VMFS datastore
D. Upgrade
E. SXi and overwrite the VMFS datastore
【单选题】
A vSphere 6.x Standard Switch is configured with 4 virtual machine portgroups, as shown in the exhibit. Which portgroup would be utilized by default when creating a new virtual machine?___
A. Access Network
B. DMZ Network
C. VM Network
D. Virtual Machine Network
【单选题】
Which vSphere 6.x feature will allow an organization to utilize native snapshots?___
A. Virtual Volumes
B. Virtual SAN
C. VMFS3
D. VMFS5
【单选题】
An administrator is creating a new vSphere Distributed Switch that will be utilized with a specific vSphere Cluster. The cluster itself contains a mix of ESXi 5.x and 6.x Hosts. Which Distributed Switch version should be created to support this configuration?___
A. Distributed Switch: 6.0.0
B. Distributed Switch: 5.0.0
C. Distributed Switch: 5.1.0
D. Distributed Switch: 5.5.0
【单选题】
Which load balancing policy, previously limited to vSphere Distributed Switches, is now available on vSphere Standard Switches with vSphere 6.x?___
A. Route based on physical NIC workload
B. Route based on IP Hash
C. Route based on the originating virtual port
D. Route based on Source MAC Hash
【单选题】
A storage administrator is not seeing full utilization of all bandwidth from an ESXi host. The vSphere administrator observes the adapter details, as shown in the Exhibit. What is the probable cause of this issue?___
A. Another path needs to be used to allow full utilization of the bandwidth.
B. The array is not setup to use the correct multipathing policy.
C. There are no virtual machines on the host.
D. No traffic is being sent across it because a path failed.
【单选题】
A storage administrator is not seeing full utilization of all bandwidth from an ESXi host. The vSphere administrator observes the adapter details, as shown in the Exhibit. What is the probable cause of this issue?___
A. Another path needs to be used to allow full utilization of the bandwidth.
B. The array is not setup to use the correct multipathing policy.
C. There are no virtual machines on the host.
D. No traffic is being sent across it because a path failed.
【单选题】
An administrator has just completed performing an interactive installation of ESXi 6.x and is booting the host. How is the network initially configured?___
A. The network is configured by Automatic Private IP Addressing (APIPA).
B. The network is configured based on the settings detected in DNS.
C. The network is configured with the address as specified in the installer.
D. The network is automatically configured by DHCP.
【单选题】
You have just installed an ESXi 6.x Host. As part of your company security regulations, a security banner must be presented on the console of the host. How can this action be accomplished?___
A. Configure the Advanced Settings > Annotations screen of the ESXi host.
B. This is configured from the Direct Console User Interface configuration menu.
C. It is not possible to configure a security banner for the ESXi host.
D. From vCenter Server, this setting is configured globally in the vCenter Server configuration.
【单选题】
An administrator is only able to see the Health Badge when using the vRealize Operations user interface. What is the likely cause of this behavior?___
A. The vRealize Operations Foundation License is in use.
B. The vmware-sps service failed to start.
C. The vRealize Operations Standard License is in use.
D. The vmware-rbd-watchdog service failed to start.
【单选题】
An administrator has configured an alarm to be notified when a virtual machine meets either of these conditions: <High virtual CPU> <High active memory consumption.> <The alarm is only triggering when both of the conditions are met.> What can be done to correct the alarm behavior?___
A. Edit the alarm and select Trigger if ANY of the following conditions are satisfied.
B. Edit the alarm and select Trigger if ALL of the following conditions are satisfied.
C. Create two separate alarms, one for CPU and one for memory and link them together with ESXCLI.
D. Delete the existing alarm and create a new event based alarm.
【单选题】
An administrator creates an ESXi cluster using vSphere Auto Deploy. The ESXi hosts are configured to get a management IP address from a DHCP server. The administrator needs to troubleshoot the management network on one of the hosts. Which DCUI option should the administrator use to renew the DHCP lease? ___
A. Restart Management Network
B. Restore Network Settings
C. Test Management Network
D. Configure Management Network
推荐试题
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers