网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

When trying to sell a security solution to an e-commerce business, which three business needs should you address?()

  • A、secure transactions
  • B、time to market
  • C、maximum uptime
  • D、database backups
  • E、revenue growth
  • F、scalability for future growth

参考答案

更多 “When trying to sell a security solution to an e-commerce business, which three business needs should you address?()A、secure transactionsB、time to marketC、maximum uptimeD、database backupsE、revenue growthF、scalability for future growth” 相关考题
考题 Principles of Marketing Marketing is the part of your business where money is made. In order to succeed in business, the following two principles of marketing should be kept in mind. First, customers are the mainstay of any business. Attracting customers to a business makes the difference between succeeding and failing. Therefore, the business needs to direct all activities towards satisfying the customers’ needs. If customers are satisfied, there is a chance that they will be retained for a long time and possibly permanently. Undoubtedly they are likely to talk to other potential customers. Another principle for a business is that profitable sales volume is more important than maximum sales volume. The profitable sales volume is the volume of sales that actually will earn a business the most profit. And the maximum sales volume simply refers to the biggest sum of retail sales. Since the aim of most businesses is to make as much profit as possible, businesses value profits more than the volume of sales. A large volume of sales may result in a low profit margin, therefore, it is important for marketers to focus on their profitable sales volume. Decide if each of the following statement is TRUE (T) or FALSE (F).1. In order to succeed in business, three principles of marketing should be kept in mind.()2. If customers are satisfied, they will be likely to encourage more people to buy the products or services.()3. The profitable sales volume is the volume of sales that will bring a business profit.()4. The maximum sales volume refers to the biggest sum of retail sales.()5. Profitable sales volume is as important as the maximum sales volume.()

考题 A network administrator needs to configure port security on a switch.which two statements are true? () A.The network administrator can apply port security to dynamic access portsB.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D.The network administrator can apply port security to EtherChannels.E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 Which three pre-sales Smart Design documents are available to help you implement and install a solution?()A、 Design GuideB、 Cisco Configuration AssistantC、 Implementation GuideD、 Small Business Product GuideE、 Solution ProfileF、 Application Notes

考题 Which three are the phases of the Cisco Smart Business Roadmap?()A、FinishedB、ImplementedC、FoundationD、BeginningE、OptimizedF、Growth

考题 Which two ways does an integrated security solution reduce TCO? ()A、by enabling business to leverage investments in the networkB、by spending less time addressing attacksC、by enforcing policy complianceD、through admission control

考题 Cisco Unified Communications 500 Series for Small Business, a critical part of the Cisco Smart Business Communications System, is a unified communications solution for small businesses that provides voice, data, voicemail. Which three features does the Cisco UC520 support?()A、 distributed routingB、 Cisco Unity ExpressC、 security, firewall and VPND、 analog devices

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 You are migrating a solution to Windows Azure.   The solution includes a web application and a business logic layer.  The web application runs on three dual-core servers.  The business logic layer runs on two quad-core servers.   The Windows Azure application must match or exceed the current hardware specifications.  You need to recommend role instance sizes that minimize cost.  What should you recommend?()A、 Small for the web application and Medium for the business logic layerB、 Small for the web application and Large for the business logic layerC、 Medium for the web application and Large for the business logic layerD、 Large for the web application and Extra Large for the business logic layer

考题 Which three post-sales Smart Design documents are available to help you better serve your customers? ()  A、 Quick Quoting ToolB、 Smart Business Communications SystemC、 Overview PresentationD、 Cisco Configuration AssistantE、 Solution ProfileF、 Small Business Product Guide

考题 When you enable port security on an interface that is also configured with a voice VLAN,  what is the maximum number of secure MAC addresses that should be set on the port?()A、No more than one secure MAC address should be set.B、The default will be set.C、The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D、No value is needed if the switchport priority extend command is configured. E、No more than two secure MAC addresses should be set.

考题 Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A、 the business knowledge of the IT staffB、 the technical knowledge of the IT staffC、 the company’s business objectivesD、 the company’s network topologyE、 the IT future directions

考题 You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

考题 The administrator of an AIX system needs to be more proactive and predictive at identifying and resolving problems before they affect the system. Which of the following options should the pSeries Sales Representative propose to address this management issue?()A、HACMPB、PM/AIXC、SmoothStartD、Business Continuity Services

考题 An enterprise has three nodes: -Node ’A’ is a production database, -Node ’B’ is a production  Application server, and -Node ’C’ is a test and development node. Node ’C’ is used by six programmers to develop and the production application as business critical and would like to make it highly available with HACMP. Application development and testing is not business critical.  Which of the following describes the best solution?()  A、 There is not an adequate solution because HACMP should not be configured in this environment without a dedicated standby node.B、 Nodes ’A’ and ’B’ should be configured in a cluster with mutual fallover of two cascading resource groups to provide both nodes will deliver acceptable response time with both resource groups.C、 Nodes ’A’ and ’C’ should be configured in one cluster, and Nodes ’B’ and ’C’ in another cluster to prevent both the database and application server from falling over to Node ’C’ at the same time.D、 Nodes ’A’, ’B’, and ’C’ should be configured in a cluster with Node ’C’ the hot standby for both the database and application server resource groups. Workload Manager (WLM) must be configured on database and application developers from over utilizing the CPU resources.

考题 You are a professional level SQL Sever 2008 Database Administrator in an international  corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. SQL Server 2008 instances at five sites are managed by you.A mission-critical database is shared by the five sites. According to the business requirements, the users at each site should be enabled to access and change data on all sites with minimal latency.In addition, data loss should be minimized if a server fails. A high-availability solution should be designed, and the business requirements should be satisfied.    Which action should be included in your solution?()A、Failover clustering should be included. B、Asynchronous database mirroring without a witness server should be included.C、Peer-to-Peer replication should be included. D、Log shipping to servers at two of the sites to offer read-only replications of data should be included.

考题 You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. There is a database in the instance, and the day-to-day business of your company requires the database. When reports are executed, slow response time will be experienced by Users. A performance monitoring strategy will be implemented by you so as to have three aspects of data captured and stored: Blocking and deadlock information,  Executed Transact-SQL statements  Query activity and Counters for disk, CPU, and memory. You are required to utilize the least amount of administrative effort to implement the monitoring process.     Which action will you perform to finish the task?()A、To finish the task, the client-side profiler trace should be utilized. B、To finish the task, the dynamic management views should be utilized.C、To finish the task, the data collector should be utilized. D、To finish the task, the System Monitor counter log trace should be utilized.

考题 You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 database solution is managed by you. All data changes are implemented through stored procedures, and only the INSERT, UPDATE, or DELETE statements are utilized by the procedures. A backup strategy should be implemented. The business requirements listed below should be satisfied. Point-in-time recovery for failure is supported by the backup strategy at any time of day. In addition, the least amount of disk space should be utilized by the transaction log.  Which action should you perform to finish the task?()A、To finish the task, hourly database snapshots should be utilized. B、To finish the task, the full-recovery model along with transaction log backups should be utilized.C、To finish the task, the full-recovery model along with differential backups should be utilized.D、To finish the task, the simple-recovery model along with differential backups should be utilized. 

考题 You are designing a forest and domain structure to address the concerns of Contoso, Ltd., and to meet the business and technical requirements. You want to use the minimum number of domains and forests that are required.  Which domain structure should you use?()A、One forest and two domains.B、One forest and three domains.C、One forest and four domains.D、Two forests and three domains.E、Two forests and four domains.

考题 You are designing a DHCP solution to meet the business and technical requirements. What should you do?()A、Increase the default lease time on all DHCP servers.B、Split all address ranges across multiple DHCP servers.C、Configure duplicate scopes on at least two DHCP servers.  D、Force client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).

考题 单选题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 database solution is managed by you. All data changes are implemented through stored procedures, and only the INSERT, UPDATE, or DELETE statements are utilized by the procedures. A backup strategy should be implemented. The business requirements listed below should be satisfied. Point-in-time recovery for failure is supported by the backup strategy at any time of day. In addition, the least amount of disk space should be utilized by the transaction log.  Which action should you perform to finish the task?()A To finish the task, hourly database snapshots should be utilized. B To finish the task, the full-recovery model along with transaction log backups should be utilized.C To finish the task, the full-recovery model along with differential backups should be utilized.D To finish the task, the simple-recovery model along with differential backups should be utilized. 

考题 多选题Which three pre-sales Smart Design documents are available to help you implement and install a solution?()ADesign GuideBCisco Configuration AssistantCImplementation GuideDSmall Business Product GuideESolution ProfileFApplication Notes

考题 多选题When trying to sell a security solution to an e-commerce business, which three business needs should you address?()Asecure transactionsBtime to marketCmaximum uptimeDdatabase backupsErevenue growthFscalability for future growth

考题 单选题When you enable port security on an interface that is also configured with a voice VLAN,  what is the maximum number of secure MAC addresses that should be set on the port?()A No more than one secure MAC address should be set.B The default will be set.C The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D No value is needed if the switchport priority extend command is configured. E No more than two secure MAC addresses should be set.

考题 单选题You are designing a DHCP solution to meet the business and technical requirements.  What should you do?()A  Increase the default lease time on all DHCP servers.B  Split all address ranges across multiple DHCP servers.C  Configure duplicate scopes on at least two DHCP servers.D  Force client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).

考题 多选题Which two ways does an integrated security solution reduce TCO? ()Aby enabling business to leverage investments in the networkBby spending less time addressing attacksCby enforcing policy complianceDthrough admission control

考题 单选题You are migrating a solution to Windows Azure.   The solution includes a web application and a business logic layer.  The web application runs on three dual-core servers.  The business logic layer runs on two quad-core servers.   The Windows Azure application must match or exceed the current hardware specifications.  You need to recommend role instance sizes that minimize cost.  What should you recommend?()A  Small for the web application and Medium for the business logic layerB  Small for the web application and Large for the business logic layerC  Medium for the web application and Large for the business logic layerD  Large for the web application and Extra Large for the business logic layer

考题 单选题Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A  the business knowledge of the IT staffB  the technical knowledge of the IT staffC  the company’s business objectivesD  the company’s network topologyE  the IT future directions