【单选题】
支配瞳孔括约肌和睫状肌的脑神经是 ___
A. :视神经
B. :动眼神经
C. :滑车神经
D. :面神经
E. :迷走神经
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
虚拟机,从而提升你内存利用率的是___
A. 内存共享
B. 内存置换
C. 内存气泡
D. 以上全部
【单选题】
2FusionSphere中虚拟机规则组的使用场景描述恰当的是___
A. 将必须运行在同一物理机上的虚拟机设为互斥虚拟机
B. 将主备模式运行的虚拟机设为聚集虚拟机
C. 将不同的应用部署在同一虚拟机组内,称之为虚拟机到主机
D. 将运行在负载均衡模式下的两台虚拟机设为互斥虚拟机
【单选题】
3FusionSphere按照物理CPU和虚拟机数量进行产品报价___
A. 对
B. 错
【单选题】
4随着云计算的发展,并没有加速云数据中心建设的步伐,而传统数据中心建设模式不受云计算技术的影响___
A. 对
B. 错
【单选题】
5基于数据存储的磁盘迁移,不能决定迁移是否成功的有:___
A. 虚拟机的状态
B. 磁盘的类型
C. 存储是否异构
D. 目的存储的空间
【单选题】
超过:___
A. 256G
B. 384G
C. 512G
D. 640G
【单选题】
7华为FusionCompute DPM功能策略可以单独执行,无需先启用和设置好DRS功能策略。___
A. 对
B. 错
【单选题】
灵活的进行空间扩容,有效提高数据存储扩展性。___
A. 对
B. 错
【单选题】
13FusionCompute使用FC SAN存储,用户需额外购买10GE以太网交换机和HBA卡___
A. 对
B. 错
【单选题】
一个VCPU,请问可以同时有几台这样的虚拟机运行在该物理主机上:___
A. 4台
B. 8台
C. 32台
D. 条件不足,无法计算
【单选题】
容,并在另一块空硬盘上恢复数据。___
A. 对
B. 错
【单选题】
19FusionCompute链接克隆虚拟机的差分盘使用哪种虚拟磁盘类型:___
A. 固定磁盘
B. 差分磁盘
C. 动态磁盘
D. SSD
【单选题】
20关于FusionCompute使用NAS存储描述正确的是:___
A. 可以使用NFS或CIFS类型共享文件夹
B. 推荐使用万兆以太交换机连接
C. 推荐使用光纤交换机连接
D. 推荐使用域控对共享文件夹的权限进行管理
【单选题】
21关于FusionStorage中资源池的描述正确的是:___
A. FusionStorage用资源池取代了传统存储raid组
B. FusionStorage用资源池取代了传统存储的LUN
C. 资源池中可以灵活的选择RAID类型,如RAID1、RAID5等
D. 一个硬盘可以添加到多个资源池
【单选题】
22登录一台Windows虚拟机,发现资源管理器中有一个c盘和一个d盘,那么以为着这台虚拟机的磁盘文件是两个VHD文件。___
A. 对
B. 错
【单选题】
23FusionCompute中以下涉及到差分磁盘文件的场景是:___
A. 虚拟机磁盘扩容
B. 虚拟机容灾备份
C. 完整复制桌面
D. 虚拟机热迁移
【单选题】
24关于虚拟化本质,以下哪些说法是正确的?___
A. 分区:在物理机上安装操作系统,过程中对硬盘进行分区
B. 隔离:同一台物理机上的虚拟机相互隔离,所以虚拟机间不能互相通信
C. 封装:整个虚拟机都保存在文件中,可以通过移动这些文件夹来移动该虚拟机
D. 相对硬件独立:一台虚拟机可以同时运行在多台主机上
【单选题】
26FusionStorage采用两副本方式,数据写入时,将数据写入( )后,返回数据写入成功信息。___
A. 主副本磁盘
B. 所有副本磁盘
C. 主副本磁盘
D. 所有副本缓存
【单选题】
27从Hyper-V上到处的虚拟机VHD格式文件,可以直接导入FusionCompute上进行使用。___
A. 对
B. 错
【单选题】
39对比ovs、DVS和Neutron。下列说法错误的是?___
A. OVS是一款开源的虚拟交换机
B. DVS是OVS的一种实现方式,可以跨多个物理服务器
C. Neutron是OpenStack中的虚拟交换机
D. DVS是分布式虚拟交换机
【单选题】
40FusionSphere中存储模型与物理呈现的对应关系错误的是:___
A. FusionStorage是存储资源
B. OceanStor V3是存储资源
C. LUN是存储设备
D. 共享文件夹是数据存储
【单选题】
41VXLAN的部署方式有 和 。___
A. 单机部署、控制器部署
B. 手动部署、自动部署
C. 物理部署、虚拟部署
D. 静态部署、动态部署
【单选题】
42以下哪个场景建议使用磁盘裸设备映射?___
A. Web应用服务
B. Oracle RAC
C. 管理虚拟机(如VRM)
D. 虚拟桌面
【单选题】
43关于OceanStor DJ,说法不正确的是:___
A. OceanStor DJ能解决由于数据迅速增长带来的存储资源紧张问题
B. OceanStor DJ可以根据用户的需求定制资源池
C. OceanStor
D. J可以提高运营效率
【单选题】
44三台虚拟机共用一个CPU线程,主额为2.86Hz。VM1的资源预留为1000MHz,VM2和VM3不预留资源;VM1的配额为1000,VM2配额为2000,VM3配额为4000;三台虚拟机的上限是2000MHz;则在三台虚拟机CPU使用率100%的情况下,VM3的CPU资源为:___
A. 1200MHz
B. 1600MHz
C. 1800MHz
D. 2000MHz
【单选题】
45初始化配置FusionStorage包含以下步骤:1、创建存储池 2、创建块客户端 3、安装FSA 4、创建控制集群正确的安装顺序是:___
A. 3 - 2 - 4 - 1
B. 3 - 4 - 1 - 2
C. 2 - 3 - 4 - 1
D. 1 - 2 - 3 - 4
【单选题】
46在FusionCompute中,统一集群内的两台虚拟机运行正常,但是不能互相通信,有可能的原因有?___
A. 管理员调整了其中一台VM的磁盘容量
B. 管理员调整了其中一台VM的内存大小
C. 管理员调整了其中一台VM的所属端口组
D. 管理员调整了其中一台VM的描述
【单选题】
47虚拟镜像管理系统支持特性包括瘦分配、快照、存储热迁移。___
A. 对
B. 错
C. orrect Answer: A
【单选题】
48虚拟化的目的是通过使用虚拟化管理器,在物理机上虚拟和运行一台或多台虚拟机。___
A. 对
B. 错
C. orrect Answer: A
【单选题】
48虚拟化的目的是通过使用虚拟化管理器,在物理机上虚拟和运行一台或多台虚拟机。___
A. 对
B. 错
【多选题】
8FusionSphere中存储概念之间的对应关系是:___
A. 一个存储资源可以创建多个存储设备
B. 一个存储资源只能创建一个存储设备
C. 一个存储设备可以创建多个数据存储
D. 一个存储设备只能创建一个数据存储
【多选题】
11在FusionCompute中,关于分布式虚拟交换机说法正确的是:___
A. 一台CNA只能关联一个分布式虚拟交换机
B. 分布式虚拟交换机是实现虚拟机跨主机迁移的必要条件
C. 一台分布式虚拟交换机在一台主机上只能有一条上行链路
D. 一台分布式虚拟交换机的上行链路只能对应一个CAN主机一个网口
【多选题】
16有关华为分布式虚拟交换机正确的有?___
A. 可覆盖多个物理服务器
B. 可配置多个虚拟端口
C. 可配置多个uplink端口
D. 每个vm只能选择一个虚拟网卡
【多选题】
17对于计算虚拟化,下列描述正确的是:___
A. 计算虚拟化可以实现计算资源的复用
B. 虚拟机可以像物理机一样运行操作系统和应用
C. 有了虚拟化后,不再需要物理设备
D. 有了虚拟化技术后,一台物理机上可以同时运行多台虚拟机
【多选题】
18华为计算虚拟化技术,内存QoS功能包括以下哪些特性:___
A. 内存上限
B. 内存在线增加
C. 内存预留
D. 内存份额
【多选题】
25华为FusionCompute虚拟机CPU QoS功能包括以下特性:___
A. CPU上限
B. CPU在线增加
C. CPU预留
D. CPU份额
【多选题】
28FusionSphere中DRS动态资源调度适用的场景有:___
A. 在夜间将虚拟机自动迁移到集中的几台服务器上,下电其他物理机
B. 集群内负载均衡,避免出现部分物理机资源占用率过高
C. 在同一台物理机上,将空闲虚拟机的内存释放给使用率较高的虚拟机
D. 当某台物理机的负载过高时,将部分虚拟机迁移到其他负载较低的物理机上
【多选题】
29Server SAN系统扩容之后,存储的哪些指标提升了:___
A. 副本可靠性
B. 存储池容量
C. Cache
D. IOPS
【多选题】
30在FusionCompute中可以用于创建虚拟化类型数据存储的存储类型有:___
A. FC SAN
B. NAS
C. IP SAN
D. FusionStorage
【多选题】
31华为云计算系统,虚拟机迁移技术可以给客户带来以下哪些价值?___
A. 降低客户的业务运行成本
B. 均衡各物理服务器上的负载
C. 保证客户系统的高可靠性
D. 支持硬件在线升级
推荐试题
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP