What does the Filesystem Hierarchy Standard enable? ()

题目
多选题
What does the Filesystem Hierarchy Standard enable? ()
A

software to predict the location of installed files and directories

B

software to predict the ownership and access rights to files and directories

C

users to predict the location of installed files and directories

D

users to predict how the filesystem should be formatted according to need

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

In a switched environment, what does the IEEE 802.1Q standard describe?()

A.the operation of VTP

B.a method of VLAN trunking

C.an approach to wireless LAN communication

D.the process for root bridge selection

E.VLAN pruning vlan


参考答案:B

第2题:

In a switched environment, what does the IEEE 802.1Q standard describe?()

  • A、the operation of VTP
  • B、a method of VLAN trunking
  • C、an approach to wireless LAN communication
  • D、the process for root bridge selection
  • E、VLAN pruning vlan

正确答案:B

第3题:

In the Ezonexam switched LAN environment, what does the IEEE 802.1Q standard describe?

A. VLAN pruning

B. A method of VLAN trunking

C. An approach to wireless LAN communication

D. The operation of VTP

E. The process for root bridge selection

F. None of the above


正确答案:B
B 解析:Explanation:
A broadcast domain must sometimes exist on more than one switch in the network. To accomplish this, one switch must send frames to another switch and indicate which VLAN a particular frame. belongs to. On Cisco switches, a trunk link is created to accomplish this VLAN identification. ISL and IEEE 802.1Q are different methods of putting a VLAN identifier in a Layer 2 frame.

The IEEE 802.1Q protocol interconnects VLANs between multiple switches, routers, and servers. With 802.1Q, a network administrator can define a VLAN topology to span multiple physical devices. Cisco switches support IEEE 802.1Q for FastEthernet and Gigabit Ethernet interfaces. An 802.1Q trunk link provides VLAN identification by adding a 4-byte tag to an Ethernet Frame. as it leaves a trunk port.

第4题:

As a candidate for CCNA examination, when you are familiar with the basic commands, if you input thecommand "enable secret level 5 password" in the global mode , what does it indicate?()

  • A、Set the enable secret command to privilege level 5
  • B、The enable secret password is hashed using MD5
  • C、The enable secret password is for accessing exec privilege level 5
  • D、The enable secret password is hashed using SHA
  • E、The enable secret password is encrypted using Cisco proprietary level 5 encryption

正确答案:C

第5题:

An application writes to a log file in the /logs filesystem that is full. After the log file is deleted, 'df' still shows the filesystem as 100% full. What is the likely cause of the problem and what will resolve it?()

  • A、The deleted file is still open by the application.The system must be rebooted before'df' will show the reduction in the filesystem.
  • B、The deleted file is still open by the application.The application must be stoppedbefore 'df' will show the reduction in the filesystem.
  • C、The filesystem is still marked as full in the /etc/fs.status file.The system must be rebooted before 'df' will show the reduction in the filesystem.
  • D、The filesystem is still marked as full in the /etc/fs.status file.The application must be stopped before 'df' will show the reduction in the filesystem.

正确答案:B

第6题:

Which of the following may illustrate the difference between "competence" and__________ "performance"?

A.What a person "knows" and what he/she "does".
B.What a person "can do" and what he/she "does".
C.What a person "does" and what he/she "knows".
D.What a person "does" and what he/she "can do".

答案:A
解析:
考查语言学知识。competence“语言能力”,指语言使用者对于语言规则系统的潜在意识;performance“语言运用”,指在具体场景中语言的实际运用,二者对应的分别为“knows”和“does”。故选A。

第7题:

A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()

  • A、The source and destination addresses
  • B、The destination port number
  • C、The destination address
  • D、The source address
  • E、All of the above

正确答案:D

第8题:

A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()

A. The source and destination addresses

B. The destination port number

C. The destination address

D. The source address

E. All of the above


参考答案:D

第9题:

A constraint in a table is defined with the INITIALLY IMMEDIATE clause. You executed the ALTER TABLEcommand with the ENABLE VALIDATE option to enable the constraint that was disabled.  What are the twoeffects of this command()

  • A、It fails if any existing row violates the constraint.
  • B、It does not validate the existing data in the table.
  • C、It enables the constraint to be enforced at the end of each transaction.
  • D、It prevents insert, update, and delete operations on the table while the constraint is in the process of beingenabled

正确答案:A,D

第10题:

What does the Filesystem Hierarchy Standard enable? ()

  • A、 software to predict the location of installed files and directories
  • B、 software to predict the ownership and access rights to files and directories
  • C、 users to predict the location of installed files and directories
  • D、 users to predict how the filesystem should be formatted according to need

正确答案:A,C

更多相关问题