网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are doing an environment assessment for a client that has invested in Oracle RAC for fault tolerance, load balancing, and scalability. The client also invested in clustered Oracle WebLogic Server. You notice that this client’s environment is not integrated for active-active high availability deployment of applications.  What will be your recommendation to achieve that ? ()

  • A、 MetaLink to RAC
  • B、 ClusterLink to RAC
  • C、 TopLink to RAC
  • D、 GridLink to RAC

参考答案

更多 “ You are doing an environment assessment for a client that has invested in Oracle RAC for fault tolerance, load balancing, and scalability. The client also invested in clustered Oracle WebLogic Server. You notice that this client’s environment is not integrated for active-active high availability deployment of applications.  What will be your recommendation to achieve that ? ()A、 MetaLink to RACB、 ClusterLink to RACC、 TopLink to RACD、 GridLink to RAC” 相关考题
考题 Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()A、 UrlScan Security ToolB、 Enterprise Scan Tool (EST)C、 Malicious Removal Tool (MRT)D、 Microsoft Baseline Security Analyzer (MBSA)

考题 A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service. You must ensure that the client application can interact with the WCF service. What should you do? ()A、 On the OperationContractAttribute, set the AsyncPattern property value to True.B、 On the OperationContractAttribute, set the ReplyAction property value to the endpoint address of the client. For interactive and self-paced preparation of exam 70-513, try our practice exams. Practice exams also include self assessment and reporting features!C、 On the client, create a proxy derived from DuplexClientBase(Of TChannel).D、 On the client, use GetCallbackChannel(Of T).

考题 Your company has an Active Directory forest named contoso.com.  You plan to deploy an Exchange Server 2010 organization that will contain two servers.  Each server will have the Client Access server role, the Hub Transport server role, and the Mailbox serverrole installed.  You plan to add both servers to a database availability group (DAG).  You need to recommend a high-availability solution for the Client Access server role.  Your solution must ensure that users are not prompted to authenticate if a Client Access server becomesunavailable.  What should you recommend?()A、Create and configure a Client Access server array,and then install a hardware load balancer.B、Create and configure a Client Access server array,and then install Windows Network Load Balancing on both servers.C、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006,and then implement DNS round robin.D、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006,and then install Windows Network Load Balancing.

考题 Which two statements are true about interoperating with Oracle AQ JMS with Oracle WebLogic server ?()A、 If you select a non-XA JDBC driver, you can use WebLogic AQ JMS in both local  global transactionsB、 Oracle WebLogic Server requires a JDBC driver to communicate with the Oracle AQ JMSC、 Oracle WebLogic AQ JMS stand-alone client automatically participate in global transactions managed by Oracle WebLogic ServerD、 If you select an XA JDBC driver, you can use WebLogic AQ JMS in both local and global transactions

考题 You want to migrate your application from the development environment to the production environment. While doing the task, you want the database objects owned by the user DEVUSER in the development environment to be moved to the user APPS in the production environment. Which option of Oracle Data Pump Import would you use to achieve this objective?()A、ownerB、touserC、includeD、schemasE、fromuserF、transformG、remap_schemaH、remap_datafileI、reuse_datafilesJ、remap_tablespace

考题 A customer is developing a custom application that involves a multistep provisioning process for a new account. There is a custom Java client application that is generating multiple JMS messages as part of the process and sending them to the WebLogic tier where they are processed.    Which three steps must you take to implement the solution to allow for scalability and parallel processing of multiple simultaneous provisioning requests while ensuring messages for an individual process are not delivered out of order?()A、Update the client application that is creating the JMS messages to use Unit of Work.B、Configure a WebLogic Cluster for Distributed JMS.C、Update the client application that is creating the JMS messages to use Unit of Order.D、Enable XA Transactions on the JMS Connection Factory used by the client application.E、Enable Load Balancing on the JMS connection factory used by the client application. 

考题 A client/server application has been configured to use local naming. The client and server run on separate machines. When the client tries to connect, it receives a TNS error. By carefully examining the environment, a tnsnames.ora is found only on the Oracle server machine, among other things. After copying this tnsnames.ora onto the client machine, the client is able to connect to the server.  Which statement is true?()A、tnsnames.ora must be on the client machine for local naming. B、tnsnames.ora must be removed from the server for the connection to work. C、tnsnames.ora must be on both the client and server machines for local naming. D、tnsnames.ora is not required for local naming; the problem was not fixed by copying the file to the client.

考题 In which situation would you use the Oracle Shared Server configuration?()A、when performing export and import using Oracle Data PumpB、when performing backup and recovery operations using Oracle Recovery ManagerC、when performing batch processing and bulk loading operation in a data warehouse environment D、in an online transaction processing (OLTP) system where large number of client sessions are idle most of the time

考题 Which server stack communication layer corresponds to the client application layer in a distributed environment?()A、RDBMSB、ApplicationC、Oracle Net foundationD、Network ProtocolE、Presentation

考题 You have an Exchange Server 2010 organization.  You need to recommend a client access solution that meets the following requirements: .Reduces the time required for users to reconnect to user mailboxes if a single Client Access server fails .Prevents users from being prompted for authentication if a single Client Access server fails What should you recommend?()A、Client Access server array and hardware load-balancerB、database availability group (DAG) and hardware load-balancerC、failover clustering and database availability group (DAG)D、Windows Network Load Balancing and failover clustering

考题 Your network has a single domain with 1,000 client computers that run Windows Vista. All client computers are members of the domain.   You are planning to deploy Windows 7.   You need to create a report that shows hardware and device compatibility on all client computers.    You need to perform this action without installing any additional software on the client computers.   Which tool should you use?()A、System Center Capacity PlannerB、System Center Configuration ManagerC、Microsoft Assessment and Planning ToolkitD、Windows Performance Monitor Data Collector Sets

考题 Your company has an Active Directory forest named contoso.com.  You plan to deploy an Exchange Server 2010 organization that will contain two servers.  Each server will have the Client Access server role, the Hub Transport server role, and the Mailbox serverrole installed.  You plan to add both servers to a database availability group (DAG).  You need to recommend a high-availability solution for the Client Access server role.  Your solution must ensure that users are not prompted to authenticate if a Client Access server becomesunavailable.  What should you recommend?()A、Create and configure a Client Access server array, and then install a hardware load balancer.B、Create and configure a Client Access server array, and then install Windows Network Load  Balancingon both servers.C、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006,and then implement DNS round robin.D、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006,and then install Windows network Load Balancing.

考题 You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()A、Configure a Client Access server array.B、Deploy a second ISA server and create an ISA server array.C、Implement Windows Network Load Balancing for the Client Access servers.D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

考题 You have an Exchange Server 2010 organization.  The organization contains two servers named Server1 and Server2.  Server1 and Server2 have the Mailbox server role and the Hub Transport server role installed. Server 1 and Server2 are members of a database availability group (DAG).  You need to plan the deployment of Client Access servers to meet the following requirements: .Users must be able to access their mailboxes if a single server fails .Users must not attempt to connect to a failed server  What should you include in your plan?()A、On Server1 and Server2, install the Client Access server role. Implement failover clustering.B、On Server1 and Server2, install the Client Access server role. Configure network interface card (NIC) teaming on each server.C、Deploy two new Client Access servers. Implement load balancing by using DNS round robin.Create a Client Access server array.D、Deploy two new Client Access servers. Implement load balancing by using a Windows Network Load Balancing cluster. Create a Client Access server array.

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you arelocated. You are responsible for managing the Exchange network for TestKing.com. The Exchange organization contains two Client Access Servers. You are in the process of deploying aMicrosoft Internet Security and Acceleration (ISA) server. During the course of day you receive aninstruction from the CIO to recommend a high availability solution for the Client Access servers formanagment. Management wants OWA connections to be available in the event of one Client Access Server failing as well as ensuring that the client access services is accessible in a fail on the Client AccessServer. What should you do?()A、You should recommend the deployment of Windows Network Load Balancing.B、You should recommend publishing every Client Access server in a separate publishing rule.C、You should recommend publishing the two Client Access servers in a single publishing rule as a Web server farm.D、You should recommend the deployment of a hardware load balancer.

考题 Your company has a single Active Directory directory service domain. Servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create an internal centrally managed security update infrastructure for client computers. You need to choose a security update management tool that supports all the client computers.  Which tool should you choose? ()A、 Microsoft Assessment and Planning (MAP) ToolkitB、 Microsoft Baseline Security AnalyzerC、 Microsoft System Center Operations ManagerD、 Windows Server Update Services (WSUS)

考题 All servers in your environment run Windows Server 2003. Your companys network includes multiple network segments and multiple routers. A member server that has the Routing and Remote Access service (RRAS) installed provides Internet connectivity for all client computers. The RRAS server is located in a perimeter network (also known as DMZ). A client computer named Client1 is unable to connect to the Internet. The RRAS server is able to connect to the Internet. You need to pinpoint the location of the network issue.  What should you do?()A、 Use the nbtstat command-line tool on Client1.B、 Use the pathping command-line tool on Client1.C、 Run the nbtstat -r command on the RRAS server.D、 Run the ping -a Client1 command on the RRAS server.

考题 You need to ensure that only authorized personnel are able to modify student grades. Which desktop environment or environments should you use?()A、Windows XP ProfessionalB、Windows 2000 Professional  C、Windows 98 with Active Directory client installed  D、Windows NT Workstation 4.0 with the latest service pack and Active Directory client installed

考题 单选题You want to migrate your application from the development environment to the production environment. While doing the task, you want the database objects owned by the user DEVUSER in the development environment to be moved to the user APPS in the production environment. Which option of Oracle Data Pump Import would you use to achieve this objective?()A ownerB touserC includeD schemasE fromuserF transformG remap_schemaH remap_datafileI reuse_datafilesJ remap_tablespace

考题 多选题You need to ensure that only authorized personnel are able to modify student grades. Which desktop environment or environments should you use?()AWindows XP ProfessionalBWindows 2000 ProfessionalCWindows 98 with Active Directory client installedDWindows NT Workstation 4.0 with the latest service pack and Active Directory client installed

考题 单选题A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service. You must ensure that the client application can interact with the WCF service. What should you do? ()A  On the OperationContractAttribute, set the AsyncPattern property value to True.B  On the OperationContractAttribute, set the ReplyAction property value to the endpoint address of the client. For interactive and self-paced preparation of exam 70-513, try our practice exams. Practice exams also include self assessment and reporting features!C  On the client, create a proxy derived from DuplexClientBase(Of TChannel).D  On the client, use GetCallbackChannel(Of T).

考题 单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you arelocated. You are responsible for managing the Exchange network for TestKing.com. The Exchange organization contains two Client Access Servers. You are in the process of deploying aMicrosoft Internet Security and Acceleration (ISA) server. During the course of day you receive aninstruction from the CIO to recommend a high availability solution for the Client Access servers formanagment. Management wants OWA connections to be available in the event of one Client Access Server failing as well as ensuring that the client access services is accessible in a fail on the Client AccessServer. What should you do?()A You should recommend the deployment of Windows Network Load Balancing.B You should recommend publishing every Client Access server in a separate publishing rule.C You should recommend publishing the two Client Access servers in a single publishing rule as a Web server farm.D You should recommend the deployment of a hardware load balancer.

考题 单选题You have an Exchange Server 2010 organization.  You need to recommend a client access solution that meets the following requirements: .Reduces the time required for users to reconnect to user mailboxes if a single Client Access server fails .Prevents users from being prompted for authentication if a single Client Access server fails What should you recommend?()A Client Access server array and hardware load-balancerB database availability group (DAG) and hardware load-balancerC failover clustering and database availability group (DAG)D Windows Network Load Balancing and failover clustering

考题 多选题Which two statements are true about interoperating with Oracle AQ JMS with Oracle WebLogic server ?()AIf you select a non-XA JDBC driver, you can use WebLogic AQ JMS in both local  global transactionsBOracle WebLogic Server requires a JDBC driver to communicate with the Oracle AQ JMSCOracle WebLogic AQ JMS stand-alone client automatically participate in global transactions managed by Oracle WebLogic ServerDIf you select an XA JDBC driver, you can use WebLogic AQ JMS in both local and global transactions

考题 单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()A  UrlScan Security ToolB  Enterprise Scan Tool (EST)C  Malicious Removal Tool (MRT)D  Microsoft Baseline Security Analyzer (MBSA)

考题 单选题You are doing an environment assessment for a client that has invested in Oracle RAC for fault tolerance, load balancing, and scalability. The client also invested in clustered Oracle WebLogic Server. You notice that this client’s environment is not integrated for active-active high availability deployment of applications.  What will be your recommendation to achieve that ? ()A  MetaLink to RACB  ClusterLink to RACC  TopLink to RACD  GridLink to RAC

考题 单选题Your company has a single Active Directory directory service domain. Servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create an internal centrally managed security update infrastructure for client computers. You need to choose a security update management tool that supports all the client computers.  Which tool should you choose? ()A  Microsoft Assessment and Planning (MAP) ToolkitB  Microsoft Baseline Security AnalyzerC  Microsoft System Center Operations ManagerD  Windows Server Update Services (WSUS)