网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Certkiller .com has a remote data center with servers connected to a local datacenter through a high-speed network. Which of the following methods is the most convenient to use to install and upgrade the servers in the remote center using locally managed install images?()
A

NIM

B

HAGEO/HACMP

C

NFS

D

ftp, rsh and rexec


参考答案

参考解析
解析: 暂无解析
更多 “单选题Certkiller .com has a remote data center with servers connected to a local datacenter through a high-speed network. Which of the following methods is the most convenient to use to install and upgrade the servers in the remote center using locally managed install images?()A NIMB HAGEO/HACMPC NFSD ftp, rsh and rexec” 相关考题
考题 Certkiller.com has given you the task of serializing an object and writing it to a data file using binary serialization.You need to ensure that you meet these requirements.What should you do?() A.B.C.D.

考题 Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem.Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A. dig company.com nsB. ipconfig/allC. ifconfig-aD. dig company.com mx

考题 Certkiller .com has a remote data center with servers connected to a local datacenter through a high-speed network. Which of the following methods is the most convenient to use to install and upgrade the servers in the remote center using locally managed install images?()A.NIMB.HAGEO/HACMPC.NFSD.ftp, rsh and rexec

考题 Certkiller .com has a file server named Certkiller -SR07 that stores old inventory files. Certkiller .com has given you the task of creating an application to archive these old inventory files.The inventory files have to be compressed prior to being uploaded to Certkiller .com‘s Web server.You are currently writing a method that will receive a byte array and compress it into a new file.You need to ensure that a data corruption check takes place during the decompression process.What should you do?()A.B.C.D.

考题 You work as an application developer at Certkiller .com. You are currently in the process of creating a new application for Certkiller .com. You are required to read compressed data files that has been sent by Certkiller .com‘s sales offices.These data files are less than 4 GB in size, but was compressed without cyclic redundancy. You want to write a method that receives the compressed files and return the uncompressed data as a byte array.What should you do?()A.B.C.D.

考题 Certkiller .com has asked you to create a file management application to monitor the hosts file.Certkiller .com has instructed you to change the hosts file if it has been changed.You, therefore, need to display the size and whether the hosts file is set to read-only.What should you do?()A.B.C.D.

考题 Certkiller .com has asked you to develop an application that displays the properties for all Certkiller.com‘s network drives.The information generated by this application will be utilized by Certkiller .com‘s network administrators to verify client setups.You need to ensure that these requirements are fully satisfied.What should you do?()A.B.C.D.

考题 You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application that monitors and controls the activities of a Windows service.You need to use the appropriate class to meet Certkiller .com’s requirements. What should you do?()A、 Use the ServiceBase class.B、 Use the ServiceInstaller class.C、 Use the ServiceManager class.D、 Use the ServiceController class.

考题 The current data center has run out of space. A room that is located next to the existing data center is then used to house two racks containing six servers. Six months later, physical housekeeping is performed as part of a mid-year maintenance plan. Which environmental condition discovered in the room is LEAST critical?()A、 There are discolored ceiling tiles near the middle of the room.B、 Large amounts of dust have accumulated in the corners of the room.C、 The anti-static carpet has been removed resulting in a bare painted concrete floor.D、 A wet pipe water-based sprinkler system has been installed above the racks.

考题 An Cisco Unified Contact Center Express 4.0 deployment requires support for 20 concurrently logged-in agents. The agents are split across two remote sites, and the high-availability Cisco CRS Engine, Database Server, VoIP Monitoring, and Recording server processes run at a central data center. The agents will be using CAD with Cisco Unified IP Phone 7960G and end-point monitoring. Very little recording and silent monitoring will be performed, and no historical reporting will be done during call center open hours. Assume the minimum number of servers is desired.   How many Cisco Unified Contact Center Express hardware servers would be required for this Cisco Unified Contact Center Express deployment?( ) A、1  B、2  C、3  D、4  E、5

考题 Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A、dig company.com nsB、ipconfig/allC、ifconfig-aD、dig company.com mx

考题 Company.com has four pSeries servers in their data center and wants to deploy multiple Micro-Partitions.  Which of the following data center servers can be used for this purpose?()A、p5-520 running Virtual I/O ServerB、p690 running AIX 5L V5.3C、p5-510 running AIX 5L V5.2D、p5-520 running two dedicated processor partitions

考题 IBM remote support for hardware maintenance is required for several mission critical Power 595 servers. The data center is very security conscious and does not allow internet access. How should an administrator configure outbound connectivity of Electronic Service Agent?()A、VPNB、ModemC、Private LAND、Pass-through systems

考题 Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You discover that the Reliability Monitor has no data, and that the system stablitiy chare has never been updated. You nede to configure the server to collect the reliability monitor data.  What should you do()?  A、Run the perfmon.exe /sys command on the serverB、Configure the Task schduler service to start automaticallyC、configuyre the Remote Registry serice to start automaticallyD、configure the Secondary Login service to start automatically.

考题 Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003.  You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()A、Execute an attended installation of AD DSB、Execute an unattended installation of AD DSC、Execute RODC through AD DSD、Execute AD DS by using deploying the image of AD DSE、none of the above

考题 Certkiller .com has organizational units in the Active Directory domain. There are 10 servers in the organizational unit called Security. As an administrator at Certkiller .com, you generate a Group Policy Object (GPO) and link it to the Security organizational unit. What should you do to monitor the network connections to the servers in Security organizational unit()A、Start the Audit Object Access optionB、Start the Audit System Events optionC、Start the Audit Logon Events optionD、Start the Audit process tracking optionE、All of the above

考题 Certkiller.com has an active directory forest on a single domain.  Certkiller needs a distributed application that employs a custom application. The application is directory partition software named PARDAT. You need to implement this application for data replication.  Which two tools should you use to achieve this task()A、Dnscmd.B、Ntdsutil.C、IpconfigD、DnsutilE、All of the above

考题 Certkiller .com has a network that consists of a single Active Directory domain. A technician has accidently deleted an Organizational unit (OU) on the domain controller. As an administrator of Certkiller .com, you are in process of restoring the OU. You need to execute a non-authoritative restore before an authoritative restore of the OU. Which backup should you use to perform non-authoritative restore of Active Directory Domain Services (AD DS) without disturbing other data stored on domain controller()A、Critical volume backupB、Backup of all the volumesC、Backup of the volume that hosts Operating systemD、Backup of AD DS foldersE、all of the above

考题 Your network contains two data centers named Datacenter1 and Datacenter2. An Active Directory site exists for each data center.  The data centers connect to the Internet by using a direct link.  The data centers connect to each other by using a high-speed WAN link.  You plan to deploy Exchange Server 2010 Mailbox servers in both data centers. You need to plan message routing to meet the following requirements:.Ensure outbound delivery of e-mail messages if a single server fails .Automatically load balance the Hub Transport server in each site .Deploy the minimum number of servers What should you include in the plan?()A、In each data center, deploy one Hub Transport server. Create and configure one Send connector.B、In each data center, deploy two Hub Transport servers. Create and configure one Send connector.C、In each data center, deploy one Edge Transport server. Create and configure two Send connectors.D、In each data center, deploy two Edge Transport servers. Create and configure two Send connectors.

考题 You work as the application developer at Certkiller .com. Certkiller .com uses Visual Studio.NET 2005 as its application development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you well not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()A、 The System.Collections.Generic.SortedList class should be usedB、 The System.Collections.HashTable class should be usedC、 The System.Collections.Generic.SortedDictionary class should be usedD、 The System.Collections.SortedList class should be used

考题 单选题A medical customer has a rack with four BladeCenter H chassis that have been operating normally for several months. After installing a new rack of servers in the data center, the system administrator notices the blowers in the BladeCenters have increased their speed. Which of the following caused this problem? ()A The room temperature has reached 23C (73.4F). B A Blade within the chassis has been shut down. C The ambient temperature in the data center has increased D One of the additional System X servers in the BladeCenter rack has failed.

考题 多选题Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.  Certkiller .com requires every server in the company to access Internet.  Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.  Which two actions should you perform to achieve this task()ATrigger the Virtual DHCP server for the external virtual network and run  ipconfig/renew command on each virtual serverBOn CKT’s physical network interface, activate the Internet Connection Sharing (ICS)CUse Certkiller .com intranet IP addresses on all virtual servers on CKT.DAdd and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.ENone of the above

考题 多选题Certkiller.com has an active directory forest on a single domain.  Certkiller needs a distributed application that employs a custom application. The application is directory partition software named PARDAT. You need to implement this application for data replication.  Which two tools should you use to achieve this task()ADnscmd.BNtdsutil.CIpconfigDDnsutilEAll of the above

考题 单选题Certkiller .com has a network that consists of a single Active Directory domain. A technician has accidently deleted an Organizational unit (OU) on the domain controller. As an administrator of Certkiller .com, you are in process of restoring the OU. You need to execute a non-authoritative restore before an authoritative restore of the OU. Which backup should you use to perform non-authoritative restore of Active Directory Domain Services (AD DS) without disturbing other data stored on domain controller()A Critical volume backupB Backup of all the volumesC Backup of the volume that hosts Operating systemD Backup of AD DS foldersE all of the above

考题 单选题A customer has an IBM System Storage Enterprise Storage Server and several EMC CX3 systems installed in a data center, attached to IBM System p servers. As a step toward data consolidation, they intend to put all data on a new DS8700.  What would be the most important data migration factors to consider()A sector size and the amount of production dataB existing RAID levels and the disk drive speedC sector size and existing RAID levelsD amount of production data and the disk drive speed

考题 单选题Certkiller has an Active Directory forest with six domains. The company has 5 sites. The company requires a new distributed application that uses a custom application directory partition named ResData for data replication.  The application is installed on one member server in five sites.  You need to configure the five member servers to receive the ResData application directory partition for data replication. What should you do()A Run the Dcpromo utility on the five member servers.B Run the Regsvr32 command on the five member serversC Run the Webadmin command on the five member serversD Run the RacAgent utility on the five member servers

考题 单选题You are an administrator at Certkiller .com. Certkiller has a network of 5 member servers acting as file servers. It has an Active Directory domain. You have installed a software application on the servers. As soon as the application is installed, one of the member servers shuts down itself. To trace and rectify the problem, you create a Group Policy Object (GPO). You need to change the domain security settings to trace the shutdowns and identify the cause of it. What should you do to perform this task()A Link the GPO to the domain and enable System Events optionB Link the GPO to the domain and enable Audit Object Access optionC Link the GPO to the Domain Controllers and enable Audit Object Access optionD Link the GPO to the Domain Controllers and enable Audit Process tracking optionE Perform all of the above actions