网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()

  • A、Caching engines
  • B、QoS
  • C、Traffic shaping
  • D、Load balancing

参考答案

更多 “An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing” 相关考题
考题 ABC Corp. is implementing 11i Oracle Applications. The company has two local administrators in separate locations. They need to ensure that only a relevant set of users is visible to each of these local administrators.Which action will meet the requirement?()A.create a separate role for each local administratorB.specify user administration privileges in Oracle User ManagementC.use Data Security to provide relevant access to each local administratorD.use Function Security to provide relevant access to each local administrator

考题 An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?() A. Caching enginesB. QoSC. Traffic shapingD. Load balancing

考题 An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA

考题 An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()A、 Awareness of company policy requirementsB、 Differentiating between archiving and backup processesC、 Awareness of potential legal requirementsD、 Ensuring that the backups for the retention program cover key business areas

考题 What’s the steps of implementing MQC?

考题 You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information  What should you recommend?()A、Creating cross-forest trustsB、Implementing Federated SharingC、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007D、Running the Microsoft Exchange Inter-Organization Replication tool

考题 Which two statements are true about the implementation of QoS? ()A、 Implementing DiffServ involves the configuration of RSVP.B、 Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.C、 Implementing IntServ involves the utilization of RSVP.D、 Traffic should be classified and marked by the core network devices.E、 Traffic should be classified and marked as close to the edge of the network as possible.

考题 It is a violation of the "separation of duties" principle when which of the fol-lowing individuals access the software on systems implementing security? 下列哪项个人访问对系统安全软件,是违反了“职责分离原则?()A、systems auditor 系统审计员B、systems programmer 系统程序员C、security analyst 安全分析员D、security administrator 安全管理员

考题 An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again.  Which of the following is the MOST likely reason for this?()A、 The administrator improperly configured the virtual memory settings on the server.B、 The administrator is using incorrect patch switches for the install.C、 The administrator is trying to install security patches for software that is not installed.D、 The administrator is trying to install patches that require hard drive encryption on the server.

考题 An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA

考题 An administrator is investigating an incident where an unauthorized user gained access to a servera nd modified HR files.The administrator has a tested theory as to how the user accomplished this.Which of the following actions should the administrator take NEXT?()A、Perform a root cause analysis.B、Implement a change to the servers.C、Establish a plan of action to resolve the issue.D、Question users prior to implementing the solution.

考题 An administrator is interested in implementing multiple shared processor pools on a new Power 595. How many user-customizable multiple shared processor pools are available?()A、 63 B、 64 C、 254 D、 255

考题 An administrator is interested in implementing multiple shared processor pools on a new Power 595.  How many user-customizable multiple shared processor pools are available?()A、 63B、 64C、 254D、 255

考题 How can you create a listener class that receives events when the mouse is moved?()  A、 By extending MouseListener.B、 By implementing MouseListener.C、 By extending MouseMotionListener.D、 By implementing MouseMotionListener.E、 Either by extending MouseMotionListener or extending MouseListener.F、 Either by implementing MouseMotion Listener or implementing MouseListener.

考题 You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information What should you recommend?()A、Creating cross-forest trustsB、Implementing Federated SharingC、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007D、Running the Microsoft Exchange Inter-Organization Replication tool

考题 You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. You utilize the SP:Recompile event class to run SQL Server Profiler. You find that a great amount of recompiles occurring. The possible causes of the large number of recompiles should be identified.  From the flowing four options, which one is the most possible cause of the problem?()A、The sp_executesql batches are not being recovered from the procedure cache.B、A database administrator executed UPDATE STATISTICS statements on all tables, and the most common stored procedures reference all the tables.C、One new stored procedure is created by a database administrator.D、Ad hoc batches are not being recovered from the procedure cache.

考题 You work as a system administrator at Certkiller.com. You are in the process of creating anASP.NET application using Microsoft .NET Framework v3.5.  You receive an instruction from management to create a custom-templated server control. Toensure productivity you need to make sure that the child controls of the newly created servercontrol are identified within the hierarchy of the page. You thus need to identify the interface thatwill accomplish this.  What should you do?()A、You should consider implementing the IRequiresSessionState interface.B、You should consider implementing the ITemplatable interface.C、You should consider implementing the IPostBackDataHandler interface.D、You should consider implementing the INamingContainer interface

考题 Which of the following lists of items all require an HMC to function with POWER5?()A、Running AIX 5.3 Implementing HACMP Implementing Static LPARB、Implementing Advanced POWER Virtualization Running Linux Attaching RIO drawersC、Implementing VIO Server Implementing Dynamic LPAR Running with SMT turned "On"D、Running AIX and Linux on the same system Implementing CoD Implementing Micro-Partitioning

考题 多选题What are three factors a network administrator must consider before implementing Netflow in the network?()ACPU utilizationBwhere Netflow data will be sentCnumber of devices exporting Netflow dataDport availabilityESNMP versionFWAN encapsulation

考题 单选题Which of the following lists of items all require an HMC to function with POWER5?()A Running AIX 5.3 Implementing HACMP Implementing Static LPARB Implementing Advanced POWER Virtualization Running Linux Attaching RIO drawersC Implementing VIO Server Implementing Dynamic LPAR Running with SMT turned OnD Running AIX and Linux on the same system Implementing CoD Implementing Micro-Partitioning

考题 单选题ABC Corp. is implementing 11i Oracle Applications. The company has two local administrators in separate locations. They need to ensure that only a relevant set of users is visible to each of these local administrators. Which action will meet the requirement?()A create a separate role for each local administratorB specify user administration privileges in Oracle User ManagementC use Data Security to provide relevant access to each local administratorD use Function Security to provide relevant access to each local administrator

考题 单选题An administrator is interested in implementing multiple shared processor pools on a new Power 595.  How many user-customizable multiple shared processor pools are available?()A  63B  64C  254D  255

考题 单选题How can you create a listener class that receives events when the mouse is moved?()A  By extending MouseListener.B  By implementing MouseListener.C  By extending MouseMotionListener.D  By implementing MouseMotionListener.E  Either by extending MouseMotionListener or extending MouseListener.F  Either by implementing MouseMotion Listener or implementing MouseListener.

考题 单选题An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()A  Awareness of company policy requirementsB  Differentiating between archiving and backup processesC  Awareness of potential legal requirementsD  Ensuring that the backups for the retention program cover key business areas

考题 单选题A system administrator is implementing a new 2-way POWER5 server with APV that is to be divided into three partitions. The application groups have requested the following CPU entitlements for the partitions:  Partition 1: min = 1.0, max = 2.0, desired = 1.5  Partition 2: min = 1.0, max = 2.0, desired = 1.0  Partition 3: min = 0.1, max = 1.0, desired = 0.8  The administrator immediately finds that the three partitions cannot be started in order to run concurrently.  What changes can be made to entitlement configuration to allow all three partitions to be started in order?()A Change the max on Partition 1 to 1.5.B Change the desired on Partition 1 to 1.0.C Change the max and desired on Partition 1 and 2 to 1.0.D Change the min and desired on Partition 1 and 2 to 0.9.

考题 单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. You utilize the SP:Recompile event class to run SQL Server Profiler. You find that a great amount of recompiles occurring. The possible causes of the large number of recompiles should be identified.  From the flowing four options, which one is the most possible cause of the problem?()A The sp_executesql batches are not being recovered from the procedure cache.B A database administrator executed UPDATE STATISTICS statements on all tables, and the most common stored procedures reference all the tables.C One new stored procedure is created by a database administrator.D Ad hoc batches are not being recovered from the procedure cache.

考题 问答题What’s the steps of implementing MQC?