题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2024-05-02 06:32:34

[单项选择] Companycom has plans to deploy a large database solution. Their primary requirement is minimal user access downtime. They are comparing a single server implementation with a two server deployment. What solution would they use to avoid downtime for OS software maintenance?()
A. Apply OS updates once a year
B. Utilize a GPFS cluster solution
C. Implement a two server deployment with HACMP
D. Install a single server implementation with HACMP failover to a second LPAR

更多"Companycom has plans&ensp"的相关试题:

[多项选择]在Linux环境下,进行全网时钟同步的设置时OMM要修改ums-svr/deploy/deploy-default.properties中的哪些配置项()
A. userdefined-uep-psl-clocksync.port
B. userdefined-uep-psl-clocksync.url01
C. userdefined-uep-psl-clocksync.url02
D. userdefined-uep-psl-ftpserver.port
[单项选择] An administrator wants to deploy a complex LPARenvironment on a 595. What is the most current tool available for documenting the proposed LPAR configuration and determining if there are adequate IO resources?()
A. LPAR Planning Tool.
B. System Planning Tool.
C. LPAR Validation Tool.
D. System Validation Tool.
[单项选择]A customer wants to deploy a centralized storage system to support a new database. Which of the following factors should the storage specialist consider first?()
A. disaster recovery strategy
B. the number of IOPS required
C. the capacity of each hard drive
D. how the database will be backed up
[单项选择]You deploy a windows server 2008 VPN server behind a firewall. Remote uses connect to the VPN by using portable computers that run windows vista with the latest service pack. The firewall is configured to allows only secured web communications. You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall. What should you do?()
A. Create an IPsec tunnel.
B. Create an SSTP VPN connection.
C. Create a PPTP VPN connection.
D. Create a L2tp VPN connection.
[单项选择]You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use? ()
A.
B.
C.
D.
[单项选择] You are working with a client to deploy QoS on their Frame Relay WAN. They would like to be able to allow packets to cross the Frame Relay WAN but have them marked as discard eligible if they exceed the QoS policy. How would you accomplish this task?()
A. Configure a class map that sets the DE bit so that the policy map can correctly apply a violate-action if the policy is exceeded.
B. Configure a service policy that sets the DE bit and apply it to the serial interface connected to the Frame Relay WAN.
C. Configure a policy map that has a burst-max action of setting the DE bit if the policy is exceeded.
D. Configure a policy map that has a violate-action to change the DE bit from 0 to 1.
[单项选择] You deploy a Windows Server 2008 R2 VPN server behind a firewall. Remote users connect to theVPN by using portable computers that run Windows 7. The firewall is configured to allow only secured Web communications.You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall. What should you do?()
A. Create an IPsec tunnel.
B. Create an SSTP VPN connection.
C. Create a PPTP VPN connection.
D. Create an L2TP VPN connection.
[单项选择] Companycom wants to deploy WebSphere in an HACMP environment, running on two servers in LPARs. These servers will also host the test and dev LPARs. The customer would like to use the test and dev resources to support an HACMP failover. What is the best way to accomplish this task?()
A. Run the test and dev LPARs in an uncapped mode
B. Activate COD resources if a failover should occur
C. Use DLPAR to move resources between the test and dev and the HACMP LPAR
D. Stop the test and dev environments, bring up new profile for HACMP failover
[单项选择] You deploy two different applications to the WebLogic container. One application use Xerces parser version A and the other application uses Xerces parser version B. Both these versions are different from the parser version that the WebLogic server uses internally. You want to use the Filtering Classloader feature to solve this problem. What action would you take to generate proper filtering Classloader entries?() 
A. Modify the applications to use the same version that WebLogic uses internally.
B. Based on available examples of Filtering Classloader entries, try to modify get the proper  entries.
C. Deploy and use the Classloader Analyzing Tool to resolve all conflicts with conflicting libraries.  This tool will generate all proper entries.
D. Split the application into separate WebLogic containers and use different WLS versions of  Xerces but identical that applications require.
E. Look for a WebLogic release that uses the same version of Xerces that the applications use.
[多项选择] You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()
A. Select L2TP/IPSec on each Windows Mobilebased device.
B. Obtain and install a certificate on each Windows Mobilebased device.
C. Configure the appropriate pre-shared key on each Windows Mobilebased device.
D. Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.
[单项选择] You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack.   The messaging infrastructure is configured to support the remote wipe feature.   When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message.   You need to ensure that the administrator is authorized to perform remote wipes only.   What should you do?()
A. Grant the administrator membership in the Domain Administrators group.
B. Grant the administrator membership in the Exchange Administrators group.
C. Add the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.
D. Select the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码