网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which registry variable should be set to keep the buffer pools in memory on AIX and Linux?()

  • A、DB2_KEEP_BP  
  • B、DB2_PINNED_BP  
  • C、DB2MEMDISCLAIM  
  • D、DB2MEMMAXFREE

参考答案

更多 “Which registry variable should be set to keep the buffer pools in memory on AIX and Linux?()A、DB2_KEEP_BP  B、DB2_PINNED_BP  C、DB2MEMDISCLAIM  D、DB2MEMMAXFREE” 相关考题
考题 下列属于恢复系统镜像的是( ) A.PartitionMagicB. Registry MedicC.GhostD.Realplayer

考题 You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?A.Configure an ADM template and add the template to the GPO.B.Configure an INF policy and add the policy to the GPO.C.Configure a Microsoft Windows installer package and add the package to the GPO.D.Configure RIS to include the registry entry.

考题 Bob, a support technician, is trying to locate a particular registry key using REGEDIT.EXE, on aWindows 2000 PC. Which of the following is the BEST method of doing this?() A. Use the import function from the File menu.B. Use the find function in the Edit menu.C. Use the display binary data function in the View menu.D. Navigate through the registry sub-trees.

考题 Ezonexam is migrating to a private IP addressing scheme. Which of the following describe the use of private IP addresses? (Choose two)A.Addresses chosen by Ezonexam.com to communicate with the Internet.B.Addresses that cannot be routed through the public Internet.C.Addresses that can be routed through the public Internet.D.A scheme to conserve public addresses.E.Addresses licensed to enterprise or ISPs by an Internet registry organization.

考题 Window98中注册表编辑器的名称是( )。A.Regedt32.exeB.Registry editor.exeC.Regedit.exeD.Registry.exe

考题 Which of the following describe private IP addresses?() A. addresses chosen by a company to communicate with the InternetB. addresses that cannot be routed through the public InternetC. addresses that can be routed through the public InternetD. a scheme to conserve public addressesE. addresses licensed to enterprises or ISPs by an Internet registry organization

考题 Which document lists all the lifesaving equipment required for a vessel?A.Certificate of InspectionB.American Bureau of Shipping Classification CertificateC.International Convention for the Safety of Life at Sea CertificateD.Certificate of Registry

考题 Please (填写)()this visitor’s registry book.A、fill withB、fill inC、fill awayD、fill up

考题 The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

考题 During the startup of a Windows XP Professional workstation, a message appears stating a service failed to start. Which of the following administrative areas will show what service failed?()A、Registry utilityB、MSCONFIG utilityC、Control PanelD、Event Viewer

考题 Please fill in this visitor’s ().A、registry bookB、exercise bookC、seaman’s bookD、record book

考题 Which of the following describe private IP addresses? (Choose two.)()A、addresses chosen by a company to communicate with the InternetB、addresses that cannot be routed through the public InternetC、addresses that can be routed through the public InternetD、a scheme to conserve public addressesE、addresses licensed to enterprises or ISPs by an Internet registry organization

考题 Which of the following describe private IP addresses?()A、addresses chosen by a company to communicate with the InternetB、addresses that cannot be routed through the public InternetC、addresses that can be routed through the public InternetD、a scheme to conserve public addressesE、addresses licensed to enterprises or ISPs by an Internet registry organization

考题 An ISP has assigned prefix 3000:1234:5678::/48 to Company1. Which of the following terms would typically be used to describe this type of public IPv6 prefix?()A、Subnet prefixB、ISP prefixC、Global routing prefixD、Registry prefix

考题 Which of the following describe private IP addresses?()A、Addresses chosen by a company to communicate with the Internet.B、Addresses that cannot be routed through the public Internet.C、Addresses that can be routed through the public Internet.D、A scheme to conserve public addresses.E、Addresses licensed to enterprise or ISPs by an Internet registry organization.

考题 Which of the following is MOST likely to improve the performance of SOAP-based Web services?()A、 Use message level securityB、 Use fine-grained Web servicesC、 Use document/literal instead of RPC/encodedD、 Avoid stale data in the UDDI registry by turning off caching

考题 After making changes to shipping charges, which Registry entry needs to be updated to reflect those changes?()A、Unified Business FlowB、CalculationC、Business PolicyD、Command Execution TriggersE、Quantity Manager

考题 You need to configure Microsoft Windows Firewall to allow technicians to remotely control your computer.  Which exception should you enable? ()A、Remote Registry ServiceB、Remote AssistanceC、Remote AdministrationD、Remote Service Management

考题 单选题Which of the following is MOST likely to improve the performance of SOAP-based Web services?()A  Use message level securityB  Use fine-grained Web servicesC  Use document/literal instead of RPC/encodedD  Avoid stale data in the UDDI registry by turning off caching

考题 单选题Each lifebuoy shall be marked in block capitals of the Roman alphabet with()of the ship.A the call sign and nameB the official number and nameC the port of registry and nameD the port of registry and official number

考题 单选题Fire fighting equipment requirements for a particular vessel may be found on the().A Certificate of InspectionB Certificate of SeaworthinessC Classification CertificateD Certificate of Registry

考题 单选题Bob, a support technician, is trying to locate a particular registry key using REGEDIT.EXE, on aWindows 2000 PC. Which of the following is the BEST method of doing this?()A Use the import function from the File menu.B Use the find function in the Edit menu.C Use the display binary data function in the View menu.D Navigate through the registry sub-trees.

考题 多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()AIsolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.BIdentify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.CSelect the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.DIsolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.

考题 单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB On all client computers, implement logon auditing for all user account logonsC On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD On all domain controllers, implement logon auditing for all user account logons

考题 单选题What()your registry port, over.A areB isC wereD was

考题 单选题After making changes to shipping charges, which Registry entry needs to be updated to reflect those changes?()A Unified Business FlowB CalculationC Business PolicyD Command Execution TriggersE Quantity Manager

考题 单选题What’s your port()registry?A onB ofC inD to