网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which mechanism can you use to achieve sub-second failover for link failure detection when a switched Ethernet media is used and loss of signal is not supported by the link provider?()
A

OSPF standard hellos

B

Cisco Discovery Protocol link detection

C

Bidirectional Forwarding Detection

D

Fast Link Pulse

E

autonegotiation


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which mechanism can you use to achieve sub-second failover for link failure detection when a switched Ethernet media is used and loss of signal is not supported by the link provider?()A OSPF standard hellosB Cisco Discovery Protocol link detectionC Bidirectional Forwarding DetectionD Fast Link PulseE autonegotiation” 相关考题
考题 Which IGP should you use to achieve scalability in a large enterprise network using Juniperenterprise routers?() A.RIPB.BGPC.OSPFD.EIGRP

考题 You have configured your chassis cluster to include redundancy group 1. Node 0 is configured to be the primary node for this redundancy group. You need to verify that the redundancy group failover is successful.Which command do you use to manually test the failover?()A. request chassis cluster manual failover group 1 node 1B. request cluster failover redundancy-group 1 node 1C. request chassis cluster manual failover redundancy-group 1 node 1D. request chassis cluster failover redundancy-group 1 node 1

考题 What are the techniques which you can use to teach intonation in a meaningful way?

考题 Which of the following answer choices are correct characteristics of named access list?()A、You can delete individual statements in a named access listB、Named access lists require a numbered range from 1000 to 1099.C、Named access lists must be specified as standard or extended.D、You can use the ip access-list command to create named access lists.E、You cannot delete individual statements in a named access list.F、You can use the ip name-group command to apply named access lists.

考题 Which two are true about aggregate functions?()A、You can use aggregate functions in any clause of a SELECT statement.B、You can use aggregate functions only in the column list of the select clause and in the WHERE clause of a SELECT statement.C、You can mix single row columns with aggregate functions in the column list of a SELECT statement by grouping on the single row columns.D、You can pass column names, expressions, constants, or functions as parameter to an aggregate function.E、You can use aggregate functions on a table, only by grouping the whole table as one single group.F、You cannot group the rows of a table by more than one column while using aggregate functions.

考题 You are designing a NetBIOS naming strategy for the internal domain.  What are two possible NetBIOS domain names you can use to achieve your goal? ()A、 adB、 dallasC、 internalD、 externalE、 Research

考题 You are preparing for a new installation of SQL Server 2005. You need to select the protocols that client computers might use to connect to the server.  Which two protocols can you use to achieve this goal?()A、Named PipesB、TCP/IPC、Shared MemoryD、Virtual Interface Adapter (VIA)E、Multiprotocol

考题 Which mechanism can you use to achieve sub-second failover for link failure detection when a switched Ethernet media is used and loss of signal is not supported by the link provider?()A、OSPF standard hellosB、Cisco Discovery Protocol link detectionC、Bidirectional Forwarding DetectionD、Fast Link PulseE、autonegotiation

考题 Which of the following statements are true when creating NETBIOS names? ()A、 NETBIOS names can only use alphanumeric characters.B、 You can use a ’.’ in a NETBIOS name.C、 You can use an ’_’ (underscore) in a NETBIOS name.D、 NETBIOS names must be UPPERCASEE、 NETBIOS names can be a maximum of 32 characters

考题 Which two statements are correct regarding the Flashback Versions Query feature?()A、 You can use this feature to identify the committed versions of the rows, but not the uncommitted versions.B、 You can use this feature to identify the versions of V$ views.C、 You can use this feature to identify the inserts, deletes, and updates performed on a particular row but not the data definition language (DDL) operations performed on the table.D、 You can use this feature for a table only if row movement is enabled for the table.E、 You can use this feature to identify the versions of external and fixed tables.

考题 You want to configure and schedule offline database backups to run automatically.  Which tool or utilitywould you use to achieve this()A、the XML scriptB、the PL/SQL scriptC、the DBMS_SCHEDULER packageD、Enterprise Manager to schedule the backup

考题 You work as an application developer at Certkiller .com. You have recently created an application domain for Certkiller .com. A few weeks later you are asked to retrieve information from this application domain, which is the current application domain. What can you do to achieve this objective?()A、 Use the following code: AppDomain appInfo = ApplicationDomain.Current;B、 Use the following code: AppDomain appInfo = AppDomain.CurrentDomain ();C、 Use the following code: AppDomain appInfo = Thread.GetDomain ();D、 Use the following code: AppDomain appInfo = MainThread.GetDomain ();

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are two servers named FC01 and FC02 in your company. And WindowsServer 2008 Enterprise is run by the server. The Failover Clustering feature is installed on the server. Theserver is configured as a two-node cluster. An application named APP01 is run by the cluster. The company work time is from 09:00 to 17:00. You need to make sure that APP01 can be accessed duringthese hours. FC01 is configured as the preferred owner for APP01. And you are required to preventfailback of the cluster during business hours. Which action should be performed to achieve the goal?()A、To achieve the goal, the Prevent failback option should be enabled in the Failover properties.B、To achieve the goal, the If resource fails, attempt restart on current node policy should be enabled for all APP01 resources. And then, the Maximum restarts for specified period should be set to 0.C、To achieve the goal, the Period option should be set to 8 hours in the Failover properties.D、To achieve the goal, the Allow failback option should be set to allow failback between 17 and 9 hours in the Failover properties.

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network has two Mailbox servers named XXX-EX01 and XXX-EX02.During the course of the week you receive an instruction from the CIO to determine the amount of time it takes for the delivery of messages between XXX-EX01 and XXX-EX02.Which of the following commands can be used to achieve this goal?()A、You must use the Test-ServiceHealth cmdlet.B、You must use the Test-Mailflow cmdlet.C、You must use the Get-MailboxStatistics.D、You must use the Get-MailboxDatabase.

考题 You use Hyper-V Server 2008 R2 and failover clustering to host several virtual machines (VMs). You plan to perform a Volume Shadow Copy (VSS) backup of a Cluster Shared Volume (CSV). You need to ensure that resources can continue to use the CSV during the VSS backup. What should you do?()A、Turn on redirected access for the CSV.B、Turn on maintenance mode for the CSV.C、Use Failover Cluster Manager to remove dependencies from your disk resources.D、Configure your VSS-aware backup utility as a generic application in failover clustering.

考题 Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to select a digital certificate for signing Remote Desktop Protocol (.rdp) files. Which two certificate types can you use to achieve this goal?()A、Trusted third party SSL certificateB、Authenticated SessionC、Workstation AuthenticationD、Remote Desktop Protocol (RDP) Signing

考题 You are preparing for a new installation of SQL Server 2005. You need to select the protocols that client computers might use to connect to the server. Which two protocols can you use to achieve this goal?()A、 Named Pipes B、 TCP/IP C、 Shared Memory D、 Virtual Interface Adapter (VIA) E、 Multiprotocol 

考题 单选题Which IGP should you use to achieve scalability in a large enterprise network using Juniperenterprise routers?()A RIPB BGPC OSPFD EIGRP

考题 单选题While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior  administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore.  How can you determine which files are already marked for extraction and restore? ()A  You can use the ls subcommand of ufsrestore.B  You can use the add subcommand of ufsrestore.C  You can use the select subcommand of ufsrestore.D  You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.

考题 单选题You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()A OSPFB RIPC BGPD static

考题 单选题You are working on a debug build of an application.You need to find the line of code that caused an exception to be thrown. Which property of the Exception class should you use to achieve this goal?()A DataB MessageC Stack TraceD Source

考题 多选题You are preparing for a new installation of SQL Server 2005. You need to select the protocols that client computers might use to connect to the server. Which two protocols can you use to achieve this goal?()ANamed PipesBTCP/IPCShared MemoryDVirtual Interface Adapter (VIA)EMultiprotocol

考题 单选题You use Hyper-V Server 2008 R2 and failover clustering to host several virtual machines (VMs). You plan to perform a Volume Shadow Copy (VSS) backup of a Cluster Shared Volume (CSV). You need to ensure that resources can continue to use the CSV during the VSS backup. What should you do?()A Turn on redirected access for the CSV.B Turn on maintenance mode for the CSV.C Use Failover Cluster Manager to remove dependencies from your disk resources.D Configure your VSS-aware backup utility as a generic application in failover clustering.

考题 多选题Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to select a digita l certificate for signing Remote Desktop Protocol (.rdp) files. Which two certificate types can you use to achieve this goal?()ATrusted third party SSL certificateBAuthenticated SessionCWo rkstation AuthenticationDRemote Desktop Protocol (RDP) Signing

考题 问答题What are the techniques which you can use to teach intonation in a meaningful way?

考题 多选题You are designing a NetBIOS naming strategy for the internal domain. What are two possible NetBIOS domain names you can use to achieve your goal?()AadBdallasCinternalDexternalEResearch

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are two servers named FC01 and FC02 in your company. And WindowsServer 2008 Enterprise is run by the server. The Failover Clustering feature is installed on the server. Theserver is configured as a two-node cluster. An application named APP01 is run by the cluster. The company work time is from 09:00 to 17:00. You need to make sure that APP01 can be accessed duringthese hours. FC01 is configured as the preferred owner for APP01. And you are required to preventfailback of the cluster during business hours. Which action should be performed to achieve the goal?()A To achieve the goal, the Prevent failback option should be enabled in the Failover properties.B To achieve the goal, the If resource fails, attempt restart on current node policy should be enabled for all APP01 resources. And then, the Maximum restarts for specified period should be set to 0.C To achieve the goal, the Period option should be set to 8 hours in the Failover properties.D To achieve the goal, the Allow failback option should be set to allow failback between 17 and 9 hours in the Failover properties.