题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2024-01-04 20:10:52

[多项选择] As part of your design, you are evaluating whether to upgrade all domains to Windows Server 2003. Based on current configurations,  which server or servers prevent you from achieving this goal?()
A.  DC2
B.  DC3
C.  DC4
D.  DC5
E.  DC6
F.  Server1

更多"As part of your&ensp"的相关试题:

[单项选择] As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required.  Which factor necessitates the need for a second-level OU structure?()
A.  Audit policy settings
B.  Software deployment needs
C.  Client operating systems in use
D.  Delegation of administrative authority
[多项选择] You need to design router redundancy on the Company network.  Which three protocols could be  chosen for IP routing redundancy to protect against first-hop router failure?()
A.  GLBP
B.  ICMP
C.  MSTP
D.  HSRP
E.  VRRP
F.  NHRP
[单项选择] You need to design the Service Broker queues that will be used to submit requests for long-running reports. Your solution must minimize complexity of using the queues by applications. What should you do?()
A. Specify one queue for each client application that can submit report requests.
B. Specify one queue for each of the two report-generation services.
C. Specify one queue for all long-running report requests.
D. Specify eight queues:One for each service, and one for each client application.
[单项选择] You need to design a permission structure for registry objects that enables the legacy application at the resorts to run. Your solution must comply with the written security policy.  What should you do?()
A. Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application, Use the GPO to give the Domain Users security group full control on the partitions of the registry that the legacy application uses
B. Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application. Use the GPO to give the Domain Users security group full control on the HKEY_USERS partition of the registry
C. Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to make all users who require access to the application members of Local Administrators group on each computer
D. Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to give all users who require access to the application full control for the Ntuser.dat file
[单项选择] You need to design the configuration for the kiosk computers. Your solution must be able to be implemented by using the minimum amount of administrative effort. What should you do?()
A. Configure the kiosk computers as computers that are not members of any domain.Use Local Computer Policy to configure the computers with the collection of settings in the Kiosk Desktop Specification
B. Install one kiosk computer as a model.Configure this computer with the collection of settings in the Kiosk Desktop Specification.Copy the content of the C:///Documents and Settings/Default Users folder from this model computer to all other kiosk computers
C. Create a system policy file named Ntconfig.pol and configure it with the collection of settings in the Kiosk Desktop Specification.Make the kiosk computers members of the Active Directory domain.Use a Group Policy object (GPO) to run a startup script that copies the Ntconfig.pol file to the System32 folder on each kiosk computer
D. Create a Group Policy object (GPO) and configure it with the collection of settings in the Kiosk Desktop Specification: Also include an appropriate software restriction policy.Make the kiosk computers members of the Active Directory domain, and place the computer account objects in a dedicated OU. Link the GPO to this OU
[单项选择] You need to design a Windows Server Update Services (WSUS) infrastructure that meets the  following requirements:   èThe updates must be distributed from a central location.   èAll computers must continue to receive updates in the event that a server fails. What should you include in your design?()
A. Configure two WSUS servers in a Microsoft SQL Server 2008 failover cluster. Configure each WSUS  server to use a local database.
B. Configure a single WSUS server to use multiple downstream servers. Configure each WSUS server touse a RAID 1 mirror and a local database.
C. Configure a single WSUS server to use multiple downstream servers. Configure each WSUS server to  use a RAID 5 array and a local database.
D. Configure a Microsoft SQL Server 2008 failover cluster. Configure two WSUS servers in a Network Load Balancing cluster. Configure WSUS to use the remote SQL Server 2008 database instance.
[单项选择] You need to ensure that you can recover system configuration and data if your computer hard disk fails.  What should you do? ()
A. Create a system restore point.
B. Create a backup of all file categories.
C. Create a Complete PC Backup and Restore image.
D. Perform an Automated System Recovery (ASR) backup.
[多项选择] The EMP table exists in your schema. You want to execute the following query:   SELECT ename, sal FROM emp AS OF TIMESTAMP (SYSTIMESTAMP - INTERVAL ’6’ MINUTE)   WHERE ename = ’ALLEN’;   What are the minimum requirements for the statement to execute successfully?()
A.  ARCHIVELOG mode must be enabled
B.  Row Movement must be enabled for the table
C.  FLASHBACK must be set to ON for the database
D.  The UNDO_MANAGEMENT parameter must be set to AUTO
E.  The UNDO_RETENTION parameter must be set appropriately
[单项选择] int x = 3;  int y = 1;  if (x = y) {  System.out.println(“x = “ + x);  }  What is the result? ()
A. x=1
B. x=3
C. Compilation fails.
D. The code runs with no output. 
E. An exception is thrown at runtime.
[单项选择] int x = 1, y =6;  while (y--) {  x++;  }  System.out.println(“x =” + x + “y =” +y); What is the result?()  
A.  x = 6 y = 0
B.  x = 7 y = 0
C.  x = 6 y = -1
D.  x = 7 y = -1
E.  Compilation fails.
[单项选择] Upon starting your database, you receive the following error:   SQL> startup ORACLE instance started.  Total System Global Area 171581440 bytes Fixed Size 1298640 bytes Variable Size 146804528 bytes Database Buffers 20971520 bytes Redo Buffers 2506752 bytes Database mounted.  ORA-00313: open failed for members of log group 1 of thread 1  ORA-00312: online log 1 thread 1: ’/oracle01/oradata/orcl/redo01.log’ ORA-00312: online log 1 thread 1: ’/oracle01/oradata/orcl/redo01a.log’   You can choose from the following steps:   a. Restore the database datafiles.  b. Issue the alter database clear unarchived logfile group 1 command. c. Issue the alter database open command.  d. Issue the alter database open resetlogs command.  e. Recover the database using point-in-time recovery. f. Issue the Startup Mount command to mount the database.  g. Back up the database.  Which is the correct order of these steps in this case?()
A. a, f, e, d, g
B. f, e, d
C. f, b, c, g
D. a, f, c
E. The database cannot be recovered.
[多项选择] In your production database, you have observed that the database server performance degrades whenever there is a switch between the log groups. On further investigation, you find that the database is running in ARCHIVELOG mode and the archived log files are being written to the same disk that is used to store the redo log members.  Which two actions would you take to improve the performance of the database server?()
A. increase the size of the redo log buffer
B. increase the number of redo log groups
C. increase the number of log writer processes
D. increase the number of ARCn processes
E. change the appropriate LOG_ARCHIVE_DEST_n parameter to place the archived log files in a separate location
[单项选择] int x=0;  int y 10;  do {  y--;  ++x;  } while (x < 5);  System.out.print(x + “,“ + y);  What is the result?() 
A.  5,6
B.  5,5
C.  6,5
D.  6,6
[单项选择] 下列程序段中,循环体执行的次数为()。 y=2  Do While y<=8  y=y+y  Loop
A. 2
B. 16
C. 4
D. 3
[多项选择]                         下列解释正确的是()
A. out_applet.java中一定有一个参数是“display_string” 
B. 具有两个属性“name”和“value” 
C. value是参数的名称 
D. “good morning”通过 标记传递给“Our_Applet.class”
[简答题] 设有两个十进制数,x = -0.875 × 21,y = 0.625 × 22:  (1)将x、y的尾数转换为二进制补码形式。  (2)设阶码2位,阶符1位,数符1位,尾数3位,通过补码运算规则求出z = x–y的二进制浮点规格化结果。
[简答题] 一般程序如下:                ORG  2000H      ARY      DW   --4,3,--2,1   CNT      DW   $--ARY   VAR      DW   ARY,$+4          ┆           MOV  AX,ARY              MOV  BX,OFFSET VAR               MOV  CX,CNT               MOV  DX,VAR+2              LEA  SI,ARY            ┆   此程序段执行后,寄存器AX,BX,CX,DX与SI中的内容各是多少? 

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码