网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A technician would like to ensure that when users connect to a web server in a server farm, they connect to the server with the lowest CPU utilization. Which of the following technologies would accomplish this?()
A

Load balancing

B

High availability

C

Virtual machine

D

Reverse proxy


参考答案

参考解析
解析: 暂无解析
更多 “单选题A technician would like to ensure that when users connect to a web server in a server farm, they connect to the server with the lowest CPU utilization. Which of the following technologies would accomplish this?()A Load balancingB High availabilityC Virtual machineD Reverse proxy” 相关考题
考题 55. What do we know about the character(个性) of my neighbor’s mother?A. She would like to buy expensive things.B. She would like to buy cheap things.C. She would like to help others when they’re in trouble.D. She would like to have her son pay for her shopping.

考题 I () his face when he opened the letter. A.should like you to seeB.would have liked you to be seenC.should like you to have seenD.would like you to see

考题 It was _____ he came bank from Africa that wear _________ he met the girl he would like to marry.A. when; thenB. not; untilC. not until; thatD. only; when

考题 A technician would like to load an operating system CD on startup. Which of the following settings would a technician change in the BIOS?() A. Enable TPMB. Enable BIOS passwordC. Disable TPMD. Boot sequence

考题 A technician needs to ensure that a specific application on a single home user‘s computerreceives Internet traffic reliably. The home network provides access to three other users and theapplication relies on a specific protocol.Which of the following should the technician use?()A. DHCPB. PATC. ProxyD. IPX

考题 An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()A.NATB.DynamicC.SubnettingD.Static

考题 Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall

考题 Which statement best describes the differences between Cisco SMARTnet and Cisco SMARTnet Onsite?()A、 CiscoSMARTNet Onsite includes all of the elements of Cisco SMARTnet with the additionalprovision of onsite technician to perform parts replacementB、 CiscoSMARTnet Onsite is primarily attractive to customers who do not need to replace theirhardware immediately, but would still like an onsite technician to install and replace hardwareC、 CiscoSMARTnet Onsite includes certification classes and live network consulting at thecustomer siteD、 CiscoSMARTnet Onsite provides network monitoring for small-to-medium sized businesses andprovides onsite technical resources when hardware problems are detecteD

考题 A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network. Which of the following is a probable cause?()A、Switching loop is occurring on the switch.B、Wrong subnet mask on the switch.C、Incorrect SNMP settings on the switch.D、Port is misconfigured on the switch.

考题 A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A、DHCPB、PATC、ProxyD、IPX

考题 A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()A、WPA TLSB、WPA PEAPC、64-bit WEPD、128-bit WEP

考题 A technician is installing new memory in a server. The technician would consult the HCL to ensure which of the following?()A、Memory and virtual memory compatibilityB、Memory and speed compatibilityC、Memory and HDD compatibilityD、ESD standards were followed

考题 A technician would like to ensure that when users connect to a web server in a server farm, they connect to the server with the lowest CPU utilization. Which of the following technologies would accomplish this?()A、Load balancingB、High availabilityC、Virtual machineD、Reverse proxy

考题 A technician would use a physical network diagram to determine:()A、the cause of routing errors.B、the number of switches on the network.C、the number of users on the network.D、where network latency will occur.

考题 A system without a monitor has crashed. The administrator would like to see the console output to determine a possible cause of the crash and ensure that there were no problems on reboot. Which command would be used?()A、alogB、swconsC、lsconsD、syslog

考题 In which situation would you use static database registration for a listener()A、when multiple databases are to be registered with the listenerB、when DBAs need to connect remotely to start up the database instanceC、when users need to connect the database instance using the host naming methodD、when the database instance that is to be registered with the listener is configured in shared server mode

考题 Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.

考题 单选题In Windows Vista, where would Mike, a technician, find User1 desktop files?()A C:/Documents and settings/User1/DesktopB C:/Users/User1/DesktopC C:/windows/System32D C:/Users/User1

考题 单选题You work as a database administrator for Supportcenter.cn. You find that users with DBA role are using more CPU resources than what is allocated in their profiles. Which action would you take to ensure that resources limits are imposed on these users?()A Assign the DEFAULT profile to the usersB Set the RESOURCE_LIMIT parameter to TRUE in the parameter fileC Create a new profile with CPU restrictions and assign it to the usersD Specify the users as members of the DEFAULT_CONSUMER_GROUPE Revoke the DBA role and grant CONNECT and RESOURCE role to the users

考题 单选题A technician with a Windows server would like to use Windows Software Update Services (WSUS)to deploy patches. Which of the following MUST the technician assign to the server to install WSUS?()A DHCPB IMAPC DNSD IIS

考题 单选题A technician would like to load an operating system CD on startup. Which of the following settings would a technician change in the BIOS?()A Enable TPMB Enable BIOS passwordC Disable TPMD Boot sequence

考题 单选题You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). The IP configuration for Server1 is shown in the following table.You replace the network card on Server1. You configure the new network card to use the existing IP configuration.Users reports that they receive a time-out error message when they connect to Server1. You need to ensure that users can immediately connect to Server1.  Which command should you instruct users to run?()A Arp –d 172.16.90.13 B Ipconfig /flushdns C Nbtstat –R D Netstat –r 172.16.90.13

考题 单选题Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()A Configure a Windows Connect Now Group Policy.B Configure a Wireless Network (IEEE 802.11) Policy.C Delete the rogue network from the Network and Sharing Center on each computer.D Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

考题 单选题You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication.  You decide to make use of Microsoft ASP.NET 3.5 in order to create the application. The followingmarkup is present on the page:      "  SelectCommand="GetUsers" SelectCommandType="StoredProcedure"  FilterExpression="Active=1 AND Name LIKE ’{0}%’"            The page is used to retrieve the Users from a company database. However, only the active usersare displayed. The TextBox control allows you to also filter users by status. You do not specify astatus when you click the Filter button. You notice that the page does not filter by active users andshows all the users that are retrieved from the database. You need to make the necessary settingsto ensure that only the active users are being displayed on the page when a status is notspecified.  What should you do?()A You should ensure that a default value for the Status property of the ControlParameter controlis set.B You should ensure that the PropertyName property of the ControlParameter control is set toText.C You should ensure that the ControlParameter control’s ConvertEmptyStringToNull property isset to false.D You should ensure that the {0} placeholder in the FilterExpression property is replaced with the(?) symbol.

考题 单选题From the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries and are consuming a lot of CPU time. This causes problems for you when you try to log on as the system user and perform small maintenance tasks. You would like to ensure that users SYS and SYSTEM get priority over all other users.   Which method would you use to achieve this objective?()A create a plan directive in the SYS_GROUPB create the pending area for the consumer groupC activate the provided SYSTEM_PLAN in Resource ManagerD set the TIMED_STATISTICS parameter to TRUE in the parameter fileE set the execution time limit for all users, except SYS and SYSTEM, in their profiles

考题 单选题You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D Configure the IP properties of the portable computers so that they have an alternate configuration. 

考题 单选题Your Network contains a single AD Site.You install 10 new Exchange Server 2010 CAS.All servers are configured to use a wildcard certificate.Users connect to their Mailboxes by using Windows Mobile 6.5 devices.All devices are configured to connect to cas.contoso.com.You need to ensure that users can connect to their Mailboxes by using mail.contoso.com. Which cmdlet should you run?()A set-activesyncdeviceaccessruleB set-activesyncmailboxpolicyC set-activesyncorganizationsettingD set-activesyncvirtualdirectory

考题 单选题An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?()A NATB DynamicC SubnettingD Static