网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()
A

Citrix workstation

B

personal workstation

C

shared workstation, private desktop

D

shared workstation, shared desktop


参考答案

参考解析
解析: 暂无解析
更多 “单选题In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()A Citrix workstationB personal workstationC shared workstation, private desktopD shared workstation, shared desktop” 相关考题
考题 When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?() A. PCs will attempt to use the last address assigned to themB. PCs will pull from a static address poolC. PCs will use APIPAD. PCs will prompt the user for an address

考题 What is the most important one among the realities listed?[A] New vulnerabilities will be introduced into your environment every day.[B] If employees disregard warnings about the hazards of opening questionable email attachments, the manager should educate them about properly configuring firewalls and intrusion detection systems for their PCs.[C] Managers have more responsibility than ever.[D] Security managers are asked to support increasing degrees of network availability and access.

考题 Your customer has deployed a Cisco Wireless Location Appliance within its warehouseenvironment. However, employees there have been experiencing problems when tracking objects using activeRFID tags. You use an access point scan to determine if the Location Appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct theproblem?()A、ensure channels are deployed such that they do not overlapB、allow for the automatic containment of rogue access pointsC、ensure each area is covered by a minimum of three access pointsD、ensure a minimum RSSI value of -50

考题 Your customer has deployed a Cisco Wireless Location Appliance within its warehouseenvironment. However, employees there have been experiencing problems when tracking objects using activeRFID tags.The RFID tag data is not being collected. On which device would you verify that RFIDs have been enabled?()A、access pointB、location managerC、wireless controllerD、Cisco WCS

考题 Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment. However,employees there have been experiencing problems when tracking objects using active RFIDtags. The RFID beacon rate is 10 seconds and you have discovered an issue with the RFID timeout value. Where and how should the RFID value be changed?()A、on the Cisco WCS, to 95 secondsB、on the Cisco WCS, to 45 secondsC、on the wireless controller, to 95 secondsD、on the wireless controller, to 45 seconds

考题 When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?()A、PCs will attempt to use the last address assigned to themB、PCs will pull from a static address poolC、PCs will use APIPAD、PCs will prompt the user for an address

考题 You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()A、Require employees to access e-mail only over connections that use SSLB、Place Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the storesC、Use the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mailD、Use the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them

考题 You are the network administrator for Company.  Five of Company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity. You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building.  You need to configure the portable computers to always allow the employees to choose which network environment to use when they start their portable computers.   What should you do?()A、Configure three different hardware profiles on each portable computer.B、Configure a single hardware profile and rename it to Universal Profile.C、Configure the wireless PC Card network adapters to use Automatic Private IP Addressing      (APIPA) when they cannot detect a DHCP server.D、Instruct each employee to unplug the wireless PC Card network adapter whenever the      portable computer is attached to a network-enabled docking station.E、Configure the hardware profiles selection to wait until a hardware profile is selected.F、Configure the hardware profiles selection to select the first profile listed and set the wait time to zero seconds.G、 Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.

考题 A new floor has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, a few desktop PCs have limited corporate access but not Internet access. Most other desktop PCs, all laptops, and IP phones are working correctly. Additional information indicates that the desktop PCs are obtaining IP host addresses from the DHCP server, which is intended for only the IP phones.  Where should troubleshooting about this connectivity issue be focused?()A、DNSB、first-hop redundancy protocolC、DHCP server and optionsD、VLAN mappingE、client network configurationF、routing protocols

考题 Your customer has deployed a cisco wireless location appliance within its warehouse  environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. you use an access point scan to determine if the location appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct the problem?()A、ensure channels are deployed such that they do not overlapB、allow for the automatic containment of rogue access pointsC、ensure each area is covered by a minimum of three access pointsD、ensure a minimum rssi value of -50

考题 Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment. However,employees there have been experiencing problems when tracking objects using active RFIDtags. The RFID tag data is not being collected. On which device would you verify that RFIDs have beenenabled?()A、Cisco WCSB、access pointC、location managerD、wireless controller

考题 Yours truly,customer has deployed a cisco wireless location appliance within its warehouse  environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. the rfid tag data is not being collected. On which device would you verify  that rfids have been enabled?()A、access pointB、location managerC、wireless controllerD、cisco wcs

考题 In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()A、Citrix workstationB、personal workstationC、shared workstation, private desktopD、shared workstation, shared desktop

考题 An architectural design company with 45 employees has their office located within 5 kilometers oftheir disaster recovery center. They have an IBM System Storage N6040 installed at bothlocations. In this customer environment what protocol would be used for disaster recovery?()A、NFSB、CIFSC、iFCPD、iSCSI

考题 A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()A、SSLB、PGPC、File encryption programD、Public key encryption

考题 Five of your company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network-enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity.   You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building.   You need to configure the portable computers for optimum performance in all of the working environments. What should you do? ()A、Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.B、Configure three different hardware profiles on each portable computer.C、Configure the wireless PC Card network adapters to use Automatic Private IP Addressing (APIPA) when they cannot detect a DHCP server.D、Instruct each employee to unplug the wireless PC Card network adapter whenever the portable computer is attached to a network-enabled.

考题 单选题Your customer has deployed a Cisco Wireless Location Appliance within its warehouseenvironment. However, employees there have been experiencing problems when tracking objects using activeRFID tags. You use an access point scan to determine if the Location Appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct theproblem?()A ensure channels are deployed such that they do not overlapB allow for the automatic containment of rogue access pointsC ensure each area is covered by a minimum of three access pointsD ensure a minimum RSSI value of -50

考题 单选题An architectural design company with 45 employees has their office located within 5 kilometers oftheir disaster recovery center. They have an IBM System Storage N6040 installed at bothlocations. In this customer environment what protocol would be used for disaster recovery?()A NFSB CIFSC iFCPD iSCSI

考题 单选题Your customer has deployed a cisco wireless location appliance within its warehouse  environment. however,employees there have been experiencing problems when tracking objects using active rfid tags. the rfid beacon rate is 10 seconds and you have discovered an issue with the rfid timeout value. Where and how should the rfid value be changed?()A on the cisco wcs, to 95 secondsB on the wireless controller, to 45 secondsC on the wireless controller, to 95 secondsD on the cisco wcs, to 45 seconds

考题 单选题Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment.However, employees there have been experiencing problems when tracking objects using active RFIDtags. You use an access point scan to determine if the Location Appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct the problem?()A allow for the automatic containment of rogue access pointsB ensure each area is covered by a minimum of three access pointsC ensure channels are deployed such that they do not overlapD ensure a minimum RSSI value of -50

考题 单选题Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment. However,employees there have been experiencing problems when tracking objects using active RFIDtags. The RFID tag data is not being collected. On which device would you verify that RFIDs have beenenabled?()A Cisco WCSB access pointC location managerD wireless controller

考题 单选题Yours truly,customer has deployed a cisco wireless location appliance within its warehouse  environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. the rfid tag data is not being collected. On which device would you verify  that rfids have been enabled?()A access pointB location managerC wireless controllerD cisco wcs

考题 单选题A new floor has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, a few desktop PCs have limited corporate access but not Internet access. Most other desktop PCs, all laptops, and IP phones are working correctly. Additional information indicates that the desktop PCs are obtaining IP host addresses from the DHCP server, which is intended for only the IP phones.  Where should troubleshooting about this connectivity issue be focused?()A DNSB first-hop redundancy protocolC DHCP server and optionsD VLAN mappingE client network configurationF routing protocols

考题 单选题A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()A SSLB PGPC File encryption programD Public key encryption

考题 单选题Your customer has deployed a Cisco Wireless Location Appliance within its warehouseenvironment. However, employees there have been experiencing problems when tracking objects using activeRFID tags.The RFID tag data is not being collected. On which device would you verify that RFIDs have been enabled?()A access pointB location managerC wireless controllerD Cisco WCS

考题 单选题Five of your company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network-enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity.   You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building.   You need to configure the portable computers for optimum performance in all of the working environments. What should you do? ()A Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.B Configure three different hardware profiles on each portable computer.C Configure the wireless PC Card network adapters to use Automatic Private IP Addressing (APIPA) when they cannot detect a DHCP server.D Instruct each employee to unplug the wireless PC Card network adapter whenever the portable computer is attached to a network-enabled.

考题 单选题In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()A Citrix workstationB personal workstationC shared workstation, private desktopD shared workstation, shared desktop

考题 单选题You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()A Require employees to access e-mail only over connections that use SSLB Place Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the storesC Use the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mailD Use the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them