网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which mode allows you to configure the B-ACD service provided in Cisco Unified CallManager Express?()
A

Tcl 

B

telephony 

C

application

D

IP-telephony 

E

telephony-service 


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which mode allows you to configure the B-ACD service provided in Cisco Unified CallManager Express?()A Tcl B telephony C applicationD IP-telephony E telephony-service ” 相关考题
考题 A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A. service Authentication ManagerB. service AuthorizationC. service CredentialsD. service Security Audit

考题 A Windows Communication Foundation (WCF) service interacts with the database of a workflow engine. Data access authorization is managed by the database, which raises security exceptions if a user is unauthorized to access it.You need to ensure that the application transmits the exceptions raised by the database to the client that is calling the service.Which behavior should you configure and apply to the service?()A.routingB.service DebugC.service Security AuditD.workflow Unhandled Exception

考题 On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()A. Sign-in PolicyB. Role Mapping RuleC. Role RestrictionsD. Trusted Server CA

考题 You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?() A. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.B. Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.C. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.D. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.

考题 You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?() A. Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.B. Configure a security policy that references the unified-access-control captive-portal service.C. Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.D. Configure a security policy that references the unified-access-control intranet-controller service.

考题 Which CLI mode allows you to make configuration changes?() A. enable modeB. configuration modeC. operational modeD. active mode

考题 Which two statements are true about the configure exclusive command?() A. It allows users to retain all uncommitted changes when exiting exclusive configuration mode.B. It allows multiple users to edit private copies of the configuration concurrently.C. It causes the loss of all uncommitted changes when exiting exclusive configuration mode.D. It excludes other users from editing the configuration.

考题 Assuming the default switch configuration,which approach should you use to configure the extended vlan range(1006 through 4094) on a cisco catalyst 3750 series switch?() A. Configure the switch to be in VTP client mode.B. Configure the switch to be in VTP domaint mode.C. Configure the switch to be in VTP transparent mode.D. Configure the switch to be in VTPv2.

考题 As an experienced technician, you are required to configure and verify SRM with SSO redundancy. In such a situation, you have to issue several commands in proper orders. Which of the following is correct?()A、show redundancy states, redundancy, mode ssoB、show redundancy states, mode sso, redundancyC、redundancy, mode sso, show redundancy statesD、mode sso, redundancy, show redundancy states

考题 Assuming the default switch configuration,which approach should you use to configure the extended vlan range(1006 through 4094) on a cisco catalyst 3750 series switch?()A、Configure the switch to be in VTP client mode.B、Configure the switch to be in VTP domaint mode.C、Configure the switch to be in VTP transparent mode.D、Configure the switch to be in VTPv2.

考题 Which mode allows you to configure the B-ACD service provided in Cisco Unified CallManager Express?()A、Tcl B、telephony C、applicationD、IP-telephony E、telephony-service 

考题 Which three of these statements about PPPoE are true?()A、PPPoE can provide a host with access to a destination over Ethernet. You can have only one  PPPoE session per PVCB、You must install PPPoE client software on all hosts that connect to the Ethernet segment. This means that the access provider must maintain a CPEC、You cannot use PPPoE with Cisco Service Selection GatewayD、PPPoE implementation is susceptible to broadcast storms and possible denial-of-service attacksE、Per-session accounting is possible, which allows the service provider to charge the subscriber based on session time for various services offered. The service provider can also require a minimum access charge

考题 You have just finished aligning a Cisco Aironet 1400 Series Wireless Bridge link using installation mode.When you set the link back to operational mode you loose association to the root bridge. Which action willcorrect the problem?()A、Configure the proper channel.B、Enable passwords on both bridges.C、Configure the distance parameter value.D、Configure the bridge to force infrastructure devices to associate only to the SSID parameter.

考题 You are creating a Window Commnunication Foundation (WCF) service application. The application needs to service many clients and requests simultaneously. The application also needs to ensure subsequent individual client requests provide a stateful conversation. You need to configure the service to support these requirements. Which attribute should you add to the class that is implementing the service?()A、[ServiceBehavior(lnstanceContextMode = lnstanceContextMode.PerSession, ConcurrencyMode = ConcurrencyMode.Single)]B、[ServiceBehavior(lnstanceContextMode = lnstanceContextMode.PerCall, ConcurrencyMode = ConcurrencyMode.Reentrant)]C、[ServiceBehavior(InstanceContextMode = lnstanceContextMode.PerSession, ConcurrencyMode = ConcurrencyMode.Multiple)]D、[ServiceBehavior(lnstanceContextMode = lnstanceContextMode.PerCall, ConcurrencyMode = ConcurrencyMode.Multiple)]

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You intend to configure FILESTREAM data, enabling FILESTREAM for file I/O streaming access and allowing remote client computers to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. In the options below, which service should you configure? () A、You should configure Distributed File SystemB、You should configure SQL ServerC、You should configure SQL Server Full TextD、You should configure SQL Server VSS Writer

考题 A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A、service Authentication ManagerB、service AuthorizationC、service CredentialsD、service Security Audit

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2002 instance. You upgrade this instance to SQL Server 2008. You configure the Agent service to use the LocalSystem account. There is a file named Orderdata on a remote network share. A job accesses this Orderdata file by using a CMDExec step. The job step fails to complete execution after the upgrade. You must make sure that the job can complete execution, so you have to configure the job step. What action should you perform? () A、You should configure a certificate B、You should configure the SQL Server Agent service to use the NetworkService account.C、You should configure the job step to use a proxy account D、You should configure the SQL Server Agent service to use a local Windows account

考题 You have a self-hosted Windows Communication Foundation (WCF) service. You need to configure the service to provide an X509 certificate during authentication. What should you use to configure the service?()A、the Certificate property of the X509 Certificate lnitiator Service Credential classB、the SetCertificate method of the X509 Certificate Initiator Service Credential classC、the SetCertificate method of the X509 Certificate Recipient Service Credential classD、the TrustedStoreLocation property of the X509 Certificate Recipient Service Credential class

考题 A Windows Communication Foundation (WCF) service interacts with the database of a workflow engine. Data access authorization is managed by the database, which raises security exceptions if a user is unauthorized to access it.You need to ensure that the application transmits the exceptions raised by the database to the client that is calling the service.Which behavior should you configure and apply to the service?()A、routingB、service DebugC、service Security AuditD、workflow Unhandled Exception

考题 单选题Which CLI mode allows you to make configuration changes?()A enable modeB configuration modeC operational modeD active mode

考题 多选题Which three of these statements about PPPoP are true?()AYou must install PPPoP client software on all hosts that connects to the Ethernet segment this means that the access provider must maintain a CPEBPPPoP can provide a host with access to a destination over Ethernet. You can have only one PPPoPsession per PVCCPPPoP implementation is susceptible to broadcast storms and possible denial-of-service attacksDYou cannot use PPPoP with Cisco Service Selection GatewayEPer-session accounting is possible, which allows the service provider to charge the subscribe based onsession time for various services offered. The service provider can also require a minimum access change

考题 单选题You are creating a Window Commnunication Foundation (WCF) service application. The application needs to service many clients and requests simultaneously. The application also needs to ensure subsequent individual client requests provide a stateful conversation. You need to configure the service to support these requirements. Which attribute should you add to the class that is implementing the service?()A [ServiceBehavior(lnstanceContextMode = lnstanceContextMode.PerSession, ConcurrencyMode = ConcurrencyMode.Single)]B [ServiceBehavior(lnstanceContextMode = lnstanceContextMode.PerCall, ConcurrencyMode = ConcurrencyMode.Reentrant)]C [ServiceBehavior(InstanceContextMode = lnstanceContextMode.PerSession, ConcurrencyMode = ConcurrencyMode.Multiple)]D [ServiceBehavior(lnstanceContextMode = lnstanceContextMode.PerCall, ConcurrencyMode = ConcurrencyMode.Multiple)]

考题 单选题You have a self-hosted Windows Communication Foundation (WCF) service. You need to configure the service to provide an X509 certificate during authentication. What should you use to configure the service?()A the Certificate property of the X509 Certificate lnitiator Service Credential classB the SetCertificate method of the X509 Certificate Initiator Service Credential classC the SetCertificate method of the X509 Certificate Recipient Service Credential classD the TrustedStoreLocation property of the X509 Certificate Recipient Service Credential class

考题 多选题On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()ASign-in PolicyBRole Mapping RuleCRole RestrictionsDTrusted Server CA

考题 单选题Which class-of-service component allows you to define the bandwidth allocated to different traffic types?()A classificationB rewrite markingC schedulingD queuing

考题 单选题A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A service Authentication ManagerB service AuthorizationC service CredentialsD service Security Audit

考题 多选题You are developing a Windows Communication Foundation (WCF) service to provide shopping cart support. ASP.NET compatibility mode is not enabled. The shopping cart information must be retained across user visits to the store until the user explicitly empties the cart or submits the cart contents to order.You need to implement the service as a DurableService.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)AUse basicHttpBinding for both the client application and the service.BCreate the persistence provider database and configure the persistenceProvider element of the service behavior to point to that database.CUse wsHttpContextBinding for both the client application and the service.DIn the method to add an item to the shopping cart, serialize the shopping cart contents after adding the current item and storing it in a Session variable.