首页/ 题库 / [单选题]What is 的答案

What is a characteristic of Network Time Protocol?()

单选题
2022-03-02 18:02
A、NTP updates are sent in the timezone they are collected in,and the syslog server will adjust based  on the input time.
B、NTP authentication verifies the source,not the recipient.
C、NTP authentication requires that the recipient has multiple strata clocks to ensure accuracy.
D、Secure NTP can be configured to use SHA-1 hashing,since NTP is very insecure.
E、A stratum 0 clock should be configured at the core of every network,so it can connect to an accuratetime source.
查看答案

正确答案
B

试题解析

标签: CCIE(350-001)
感兴趣题目
What is the result of increasing the value of the parameter ASM_POWER_LIMIT during a rebalance operation?()  
A customer is interested in purchasing a new IBM System Storage DS8000 solution to consolidateolder ESS and F20 storage systems. What should be done first, prior to final proposaldevelopment?()
What happens on failure of a pre or post event script?()
What is a characteristic of Network Time Protocol?()
What is the default BGP scanner time?()
What is a rotating item?()
An administrator performs a Live Partition Mobility operation. After the operation completes, the administrator runs errpt -a. What is the machine ID reported by errpt command? ()
Jitter is an unwanted variation of one or more characteristics of a periodic signal in electronics and telecommunications and()refers to call issues that cause variations in timing or time of arrival. 
What is true about Unicast RPF in strict mode?()
Which step is designed to prompt a user to press or say a single-digit number to perform a specific function? ()
What is the main function of the CRS Editor? ()
An application or user experiences poor performance, yet examination of the nfsstat -c output indicates no or very few timeouts and retransmits. This means that the client is receiving responses from the server as fast as it is asking for them. What is the first thing to be checked?()
相关题目
A customer wants to install a pSeries system into an OEM rack.  What critical information is provided in the Site and Hardware Planning Information manual?()
When youre performing active database duplication,a backup of what kind is required?()  
What is the proper procedure to recover a lost tempfile?()
What is the proper procedure to recover a lost tempfile?()  
What is the danger associated with stopping a running job by using the STOP_JOB procedure?()  
In a scale-out environment,what is a benefit of running DB2 pureScale compared to other solutions?()
A system administrator thinks that a filesystem may be full and that is what caused the machine to crash. Which command will show the administrator if they are correct?()
Customer X has a hub-and-spoke Frame Relay network, with a central office and two branch offices (RemoteA and RemoteB). Each location has only one physical link to the Frame Relay cloud and RemoteB has a router that is not a Cisco router. Since the installation, there is no connectivity between RemoteB and the central office. What is a possible solution to this issue? ()
Customer X has a hub-and-spoke Frame Relay network, with a central office and two branch offices (RemoteA and RemoteB). Each location has only one physical link to the Frame Relay cloud and RemoteB has a router that is not a Cisco router. Since the installation, there is no connectivity between RemoteB and the central office. What is a possible solution to this issue?()
What is the goal of QoS in a network? ()
What is the purpose of an administrative distance?
What is the default administrative distance of OSPF?()
What tool is used to register a customer service representative with the customer care feature?()
You execute the following command to enable a session in resumable mode: SQL> ALTER SESSION ENABLE RESUMABLE TIMEOUT 60; What is the impact of a timeout on the statements being suspended?()
William is creating a job class. William specifies the LOGGING_FULL setting for the LOGGING_LEVEL attribute at the time of job class creation. What is the impact of using this setting?()  
What features set is most frequently used to prevent hackers from flooding a port with MAC- addresses?()
What is the theoretical maximum number of logical ports that a one port of a 2-port 10Gb IVE can provide if no VIO Server is connected to the IVE()? 
A system administrator increases the mbuf pool allocation, then runs vmstat. It is noticed that the paging rate has not decreased. What is the most effective option to maintain the mbuf pool and decrease paging?()
You are shrinking the SCOTT.EMP table by executing the ALTER TABLE SCOTT.EMP SHRINK SPACE CASCADE statement. What is a prerequisite for shrinking the SCOTT.EMP table?()
What is the importance of using Virtual Output Queues on ingress Line Cards in a high-end router?()
广告位招租WX:84302438

免费的网站请分享给朋友吧