网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
I guide users through the process of creating or extending a domain for their target environment: Identify me()
A

 Pack Tool

B

 Configuration Wizard

C

 Auditing Provider

D

 Node Manager


参考答案

参考解析
解析: 暂无解析
更多 “单选题I guide users through the process of creating or extending a domain for their target environment: Identify me()A  Pack ToolB  Configuration WizardC  Auditing ProviderD  Node Manager” 相关考题
考题 Which two tasks can be performed when WLST is in OFFLINE mode?()A、modifying the configuration of an online domainB、modifying the configuration of an offline domainC、viewing runtime performance data in ONLINE modeD、viewing runtime performance data in OFFLINE modeE、creating and extending domains

考题 Select the IBM resource designed for small-to-medium business segments that helps identify System x server and storage for customers’ specific needs:()A、IBM System Advisor ToolB、IBM System x and BladeCenter Business Partner GuidebookC、Standalone Solutions Configuration Tool (SSCT)D、Configuration  Options Guide (COG)

考题 What IBM resource will give you a picture of the possible plug types clearly labeled for those times your customer asks, "What plug type do I tell my electrician to use, and what does it look like? ()A、IBM Power Configurator ToolB、IBM xREF SheetsC、IBM Configuration  Options Guide COGD、IBM ServerProven

考题 You completed the development of a new application and want to create a new domain in a new environment for functional testing. You want to have the same settings for your new domain as your old domain, with the option of changing the configuration in the new target environment. Which two actions should you execute?()A、Use the introspect () command in WLST to gather the configuration information from the  original domain.B、Use pack/unpack to transfer the domain from one machine to another.C、Create a domain template from the original domain using the Domain Template Builder and use  the Configuration Wizard to create a new domain from the template.D、Use the Admin Console of the original domain to create a domain template from the original  domain and use the Configuration Wizard to create a new domain from the template.

考题 I guide users through the process of creating or extending a domain for their target environment: Identify me()A、 Pack ToolB、 Configuration WizardC、 Auditing ProviderD、 Node Manager

考题 Which option must you choose to configure Node Manager on a machine (server or zone)?()A、Configure one Node Manager per domain (for example, if there are two domains on one  machine, then you will need to configure two Node Managers).B、Configure one Node Manager per machine with any number of WebLogic instances running on it.C、Configure one Node Manager per machine for all WebLogic, OHS, and OEM running on the  same machine.D、Configure one Node Manager for every WebLogic instance.E、Configure two or more Node Managers for every WebLogic instance.

考题 You want to configure WebLogic so that Managed Servers are restarted when they are in a  FAILED state. Which three steps are necessary to accomplish this?()A、Configure Node Manager on the machines where WebLogic Managed Servers need to be  started/restarted.B、Enable "Auto Restart" in the Node Manager Configuration.C、Enable "Auto Kill if Failed" in the Node Manager Configuration.D、Enable "Auto Kill if Failed" for the Managed Server in question.E、Enable "Auto Restart" for the Managed Server in question.

考题 Which four actions can you perform using the WebLogic Admin Console?()A、Stop and start Managed Servers using the Node Manager.B、Stop and start Coherence Servers using the Node Manager.C、Create a WebLogic Domain Template.D、Create and target JDBC connection pools.E、Create and target WebLogic Diagnostic Framework Diagnostic Modules.F、Change Java command-line parameters at run time.

考题 To perform management activities, each domain requires its own()A、 Administration ServerB、 Configuration WizardC、 Ant TaskD、 Node Server

考题 Identify the two optional WebLogic security providers in an Oracle WebLogic security realm()A、 Authentication ProviderB、 Adjudication ProviderC、 Authorization ProviderD、 Auditing Provider

考题 You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 runs a custom application. Users report that the performance of Server1 has decreased significantly during the last 30 minutes. You need to identify the current processor and memory usage for each process running on Server1. Which tool should you use? ()A、Event ViewerB、Task ManagerC、Query ProcessD、System Configuration Utility

考题 Your network contains an Active Directory domain. The functional level of the domain is Windows Server 2008. The domain contains application servers that run either Windows Server 2003,Windows Server 2008, or Windows Server 2008 R2. The network contains 5,000 client computers that run Windows XP Service Pack 3 (SP3). Your company has a two-node failover cluster that runs Windows Server 2008 R2 Service Pack 1 (SP1). As part of a Virtual Desktop Infrastructure (VDI), the failover cluster hosts guest virtual machines (VMs) that run Windows 7. The company does not plan to purchase additional hardware for the existing servers. You need to recommend a solution to increase the number of VMs that can run on each host. What should you include in the recommendation?()A、Microsoft Software AssuranceB、RemoteFXC、mandatory profilesD、folder redirectionE、RemoteAppF、Microsoft System Center Configuration Manager 2007G、Dynamic MemoryH、Dynamic Host Configuration Protocol (DHCP)I、CPU Core ParkingJ、pass-through disksK、Microsoft System Center Virtual Machine Manager 2010L、Microsoft Application Virtualization (App-V)M、roaming profilesN、Microsoft Enterprise Desktop Virtualization (MED-V)

考题 Your network consists of a single Active Directory domain. You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent users from establishing multiple Remote Desktop connections to the server. What should you do? ()A、Install and configure Terminal Server Licensing.B、From Terminal Services Manager, modify the user sessions.C、From Terminal Services Configuration, modify the server settings.D、From Active Directory Users and Computers, modify the Sessions settings for each user account.

考题 You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()A、the Authorization Manager snap-in on Node1 and Node2B、the Authorization Manager snap-in on the VMsC、the Network Configuration Operators local group on each VMD、the Network Configuration Operators local group on Node1 and Node2

考题 Your company has file servers located in an organizational unit named Payroll. The file servers  contain payroll files located in a folder named Payroll.    You create a GPO.   You need to track which employees access the Payroll files on the file servers.  What should you do()A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file  servers, configure Auditing for the Everyone group in the Payroll folder.B、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers,  configure Auditing for the Authenticated Users group in the Payroll folder.C、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit.  On the file servers, configure Auditing for the Authenticated Users group in the Payroll folder.D、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file  servers, configure Auditing for the Everyone group in the Payroll folder.

考题 单选题Your company has file servers located in an organizational unit named Payroll. The file servers  contain payroll files located in a folder named Payroll.    You create a GPO.   You need to track which employees access the Payroll files on the file servers.  What should you do()A Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file  servers, configure Auditing for the Everyone group in the Payroll folder.B Enable the Audit object access option. Link the GPO to the domain. On the domain controllers,  configure Auditing for the Authenticated Users group in the Payroll folder.C Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit.  On the file servers, configure Auditing for the Authenticated Users group in the Payroll folder.D Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file  servers, configure Auditing for the Everyone group in the Payroll folder.

考题 单选题Your network contains an Active Directory domain. The functional level of the domain is Windows Server 2008. The domain contains application servers that run either Windows Server 2003,Windows Server 2008, or Windows Server 2008 R2. The network contains 5,000 client computers that run Windows XP Service Pack 3 (SP3). Your company has a two-node failover cluster that runs Windows Server 2008 R2 Service Pack 1 (SP1). As part of a Virtual Desktop Infrastructure (VDI), the failover cluster hosts guest virtual machines (VMs) that run Windows 7. The company does not plan to purchase additional hardware for the existing servers. You need to recommend a solution to increase the number of VMs that can run on each host. What should you include in the recommendation?()A Microsoft Software AssuranceB RemoteFXC mandatory profilesD folder redirectionE RemoteAppF Microsoft System Center Configuration Manager 2007G Dynamic MemoryH Dynamic Host Configuration Protocol (DHCP)I CPU Core ParkingJ pass-through disksK Microsoft System Center Virtual Machine Manager 2010L Microsoft Application Virtualization (App-V)M roaming profilesN Microsoft Enterprise Desktop Virtualization (MED-V)

考题 单选题Which option must you choose to configure Node Manager on a machine (server or zone)?()A Configure one Node Manager per domain (for example, if there are two domains on one  machine, then you will need to configure two Node Managers).B Configure one Node Manager per machine with any number of WebLogic instances running on it.C Configure one Node Manager per machine for all WebLogic, OHS, and OEM running on the  same machine.D Configure one Node Manager for every WebLogic instance.E Configure two or more Node Managers for every WebLogic instance.

考题 单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).You need to provide a user named User1 the required permissions to reset passwords in the domain. What should you do?()A Install and run the Security Configuration Wizard (SCW).B From the Authorization Manager snap-in, modify the authorization store type.C From Active Directory Sites and Services, run the Delegation of Control Wizard.D From Active Directory Users and Computers, run the Delegation of Control Wizard.

考题 单选题You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()A the Authorization Manager snap-in on Node1 and Node2B the Authorization Manager snap-in on the VMsC the Network Configuration Operators local group on each VMD the Network Configuration Operators local group on Node1 and Node2

考题 单选题Your network consists of a single Active Directory domain that contains two domain controllers. Both domain controllers run Windows Server 2003 Service Pack 2 (SP2). Auditing of successful account logon events is enabled on all computers in the domain. You need to identify the last time a specific user logged on to the domain. What should you do? ()A Examine the System Event Log on the user’s computer.B Examine the System Event Log on both domain controllers.C Examine the Security Event Log on both domain controllers.D Examine the Application Event Log on the user’s computer.

考题 单选题Your network consists of a single Active Directory domain that contains two domain controllers. Both domain controllers run Windows Server 2003 Service Pack 2 (SP2). Auditing of successful account logon events is enabled on all computers in the domain. You need to identify the last time a specific user logged on to the domain. What should you do?()A Examine the System Event Log on the user’s computer.B Examine the System Event Log on both domain controllers.C Examine the Security Event Log on both domain controllers.D Examine the Application Event Log on the user’s computer.

考题 单选题You completed the development of a new application and want to create a new domain in a new environment for functional testing. You want to have the same settings for your new domain as your old domain, with the option of changing the configuration in the new target environment. Which two actions should you execute?()A Use the introspect () command in WLST to gather the configuration information from the  original domain.B Use pack/unpack to transfer the domain from one machine to another.C Create a domain template from the original domain using the Domain Template Builder and use  the Configuration Wizard to create a new domain from the template.D Use the Admin Console of the original domain to create a domain template from the original  domain and use the Configuration Wizard to create a new domain from the template.

考题 单选题You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 runs a custom application. Users report that the performance of Server1 has decreased significantly during the last 30 minutes. You need to identify the current processor and memory usage for each process running on Server1. Which tool should you use? ()A Event ViewerB Task ManagerC Query ProcessD System Configuration Utility

考题 单选题In a typical production environment, which server(s) hosts the application ?()A  Node ServerB  Administration ServerC  Managed ServerD  Configuration Server

考题 单选题Your network consists of a single Active Directory domain. You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent users from establishing multiple Remote Desktop connections to the server. What should you do? ()A Install and configure Terminal Server Licensing.B From Terminal Services Manager, modify the user sessions.C From Terminal Services Configuration, modify the server settings.D From Active Directory Users and Computers, modify the Sessions settings for each user account.

考题 单选题To perform management activities, each domain requires its own()A  Administration ServerB  Configuration WizardC  Ant TaskD  Node Server