网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which registry variable should be set to keep the buffer pools in memory on AIX and Linux?()
- A、DB2_KEEP_BP
- B、DB2_PINNED_BP
- C、DB2MEMDISCLAIM
- D、DB2MEMMAXFREE
参考答案
更多 “Which registry variable should be set to keep the buffer pools in memory on AIX and Linux?()A、DB2_KEEP_BP B、DB2_PINNED_BP C、DB2MEMDISCLAIM D、DB2MEMMAXFREE” 相关考题
考题
You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?A.Configure an ADM template and add the template to the GPO.B.Configure an INF policy and add the policy to the GPO.C.Configure a Microsoft Windows installer package and add the package to the GPO.D.Configure RIS to include the registry entry.
考题
Bob, a support technician, is trying to locate a particular registry key using REGEDIT.EXE, on aWindows 2000 PC. Which of the following is the BEST method of doing this?()
A. Use the import function from the File menu.B. Use the find function in the Edit menu.C. Use the display binary data function in the View menu.D. Navigate through the registry sub-trees.
考题
Ezonexam is migrating to a private IP addressing scheme. Which of the following describe the use of private IP addresses? (Choose two)A.Addresses chosen by Ezonexam.com to communicate with the Internet.B.Addresses that cannot be routed through the public Internet.C.Addresses that can be routed through the public Internet.D.A scheme to conserve public addresses.E.Addresses licensed to enterprise or ISPs by an Internet registry organization.
考题
Which of the following describe private IP addresses?()
A. addresses chosen by a company to communicate with the InternetB. addresses that cannot be routed through the public InternetC. addresses that can be routed through the public InternetD. a scheme to conserve public addressesE. addresses licensed to enterprises or ISPs by an Internet registry organization
考题
Which document lists all the lifesaving equipment required for a vessel?A.Certificate of InspectionB.American Bureau of Shipping Classification CertificateC.International Convention for the Safety of Life at Sea CertificateD.Certificate of Registry
考题
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons
考题
During the startup of a Windows XP Professional workstation, a message appears stating a service failed to start. Which of the following administrative areas will show what service failed?()A、Registry utilityB、MSCONFIG utilityC、Control PanelD、Event Viewer
考题
Which of the following describe private IP addresses? (Choose two.)()A、addresses chosen by a company to communicate with the InternetB、addresses that cannot be routed through the public InternetC、addresses that can be routed through the public InternetD、a scheme to conserve public addressesE、addresses licensed to enterprises or ISPs by an Internet registry organization
考题
Which of the following describe private IP addresses?()A、addresses chosen by a company to communicate with the InternetB、addresses that cannot be routed through the public InternetC、addresses that can be routed through the public InternetD、a scheme to conserve public addressesE、addresses licensed to enterprises or ISPs by an Internet registry organization
考题
An ISP has assigned prefix 3000:1234:5678::/48 to Company1. Which of the following terms would typically be used to describe this type of public IPv6 prefix?()A、Subnet prefixB、ISP prefixC、Global routing prefixD、Registry prefix
考题
Which of the following describe private IP addresses?()A、Addresses chosen by a company to communicate with the Internet.B、Addresses that cannot be routed through the public Internet.C、Addresses that can be routed through the public Internet.D、A scheme to conserve public addresses.E、Addresses licensed to enterprise or ISPs by an Internet registry organization.
考题
Which of the following is MOST likely to improve the performance of SOAP-based Web services?()A、 Use message level securityB、 Use fine-grained Web servicesC、 Use document/literal instead of RPC/encodedD、 Avoid stale data in the UDDI registry by turning off caching
考题
After making changes to shipping charges, which Registry entry needs to be updated to reflect those changes?()A、Unified Business FlowB、CalculationC、Business PolicyD、Command Execution TriggersE、Quantity Manager
考题
You need to configure Microsoft Windows Firewall to allow technicians to remotely control your computer. Which exception should you enable? ()A、Remote Registry ServiceB、Remote AssistanceC、Remote AdministrationD、Remote Service Management
考题
单选题Which of the following is MOST likely to improve the performance of SOAP-based Web services?()A
Use message level securityB
Use fine-grained Web servicesC
Use document/literal instead of RPC/encodedD
Avoid stale data in the UDDI registry by turning off caching
考题
单选题Each lifebuoy shall be marked in block capitals of the Roman alphabet with()of the ship.A
the call sign and nameB
the official number and nameC
the port of registry and nameD
the port of registry and official number
考题
单选题Fire fighting equipment requirements for a particular vessel may be found on the().A
Certificate of InspectionB
Certificate of SeaworthinessC
Classification CertificateD
Certificate of Registry
考题
单选题Bob, a support technician, is trying to locate a particular registry key using REGEDIT.EXE, on aWindows 2000 PC. Which of the following is the BEST method of doing this?()A
Use the import function from the File menu.B
Use the find function in the Edit menu.C
Use the display binary data function in the View menu.D
Navigate through the registry sub-trees.
考题
多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()AIsolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.BIdentify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.CSelect the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.DIsolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.
考题
单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A
On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB
On all client computers, implement logon auditing for all user account logonsC
On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD
On all domain controllers, implement logon auditing for all user account logons
考题
单选题After making changes to shipping charges, which Registry entry needs to be updated to reflect those changes?()A
Unified Business FlowB
CalculationC
Business PolicyD
Command Execution TriggersE
Quantity Manager
考题
单选题What’s your port()registry?A
onB
ofC
inD
to
热门标签
最新试卷