网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

An administrator named Admin1 plans to implement the planned App-V deployment. You need to recommend which protocol to use for the App-V deployment. Which protocol should you recommend?()

  • A、SMB
  • B、HTTPS
  • C、CIFS
  • D、RTSPS

参考答案

更多 “ An administrator named Admin1 plans to implement the planned App-V deployment. You need to recommend which protocol to use for the App-V deployment. Which protocol should you recommend?()A、SMBB、HTTPSC、CIFSD、RTSPS” 相关考题
考题 When configuring a DHCP server, which of the following can the administrator define for DHCP users?() A. Database serverB. NTP serverC. DHCP serverD. SQLServerE. DNS serverF. Domain name

考题 An administrator needs to know the workstation name of a user who called in for support in orderto remotely manage it. After calling the user and having the user open a command prompt, whichof the following commands would the administrator ask the user to type?()A. NetstatB. IfconfigC. HostnameD. Ping

考题 Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A. net viewB. ipconfigC. digD. ifconfig

考题 html语言中,创建一个位于文档内部的靶位的标记是?()A、name="NAME" B、name="NAME"/name C、a name="NAME"/a D、a name="NAME"

考题 An administrator mistakenly shutdown production after a fallover because the service IP address  Was shifted from the normal production node to the standby node.  What can be done to avoid this type of mistake in the future?()  A、 Include the service IP address in the administrator’s PS1 promptB、 Alias the service IP address to the hostname in the /etc/host fileC、 Define a persistent IP address with HACMP and make it a practice to use the persistent address for administration workD、 Add a DNS entry to map the standby node name to the service IP address so telnet connections will be to the correct node

考题 An administrator needs to know the workstation name of a user who called in for support in orderto remotely manage it. After calling the user and having the user open a command prompt, whichof the following commands would the administrator ask the user to type?()A、NetstatB、IfconfigC、HostnameD、Ping

考题 When configuring a DHCP server, which of the following can the administrator define for DHCPusers?()A、 Database serverB、 NTP serverC、 DHCP serverD、 SQL serverE、 DNS serverF、 Domain name

考题 Which of the following commands should the administrator run to check if the SMTP services are still active?()A、 Telnet Server name  25B、 Ping Server name C、 net send Server name test mailD、 nbtstat a Server name 

考题 An administrator would like to know the name of the workstation that is being repaired. Which ofthe following commands, without parameters, will provide this information?()A、HostnameB、IpconfigC、NetstatD、Ping

考题 Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address.  Which of the following tools would allow the administrator to test name resolution?()A、 net viewB、 ipconfigC、 digD、 ifconfig

考题 Which command should the administrator use to display the IPL progress/LED code of the partition?()A、lsled -m System -r lpar B、lsrefcode -m System -r lpar C、lshwinfo -m System -r led_code D、lssyscfg -m System -r sys -F lpar_name,led_code

考题 While configuring a new adapter using cfgmgr, an administrator receives a warning message indicating that some device packages are not installed. Additionally, the adapter displays in the Defined state. Which command will resolve the issue and make the adapter available?()A、shutdown -FrB、cfgmgr -i lpp_sourceC、mkdev -l device_nameD、mknode /dev/device_name

考题 The IP address of POWER6 595 is showing up in the HMC instead of the server name. Next to the IP address is the status, which shows ailedThe IP address of POWER6 595 is showing up in the HMC instead of the server name. Next to the IP address is the status, which shows ailed Authentication The system administrator needs to enter a password. Which password is needed to restore connection for the POWER6 595 to the HMC?()  A、The hscroot user password.B、The CE password.C、The HMC password.D、The ASM admin password.

考题 When an emulated error notification method is complete, an administrator can view the error log  By typing the errpt command to be sure the emulation took place.  To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?()  A、 A user defined Resource NameB、 A cluster defined Resource NameC、 An error daemon specific Resource NameD、 A Resource Name generated by Automatic Error Notification

考题 You recently took over as the Exchange 2010 Server Administrator for Xxx .The previous administrator allowed users to pick the email addresses of their choice.This caused much confusion, as each user wanted a different email address.You want to standardize the emails addressed across the entire organization.You have determined that the naming convention will be the first letter in their first name and then their last name.For example, the e-mail address for John Smith would be jsmith@Xxx .What should you do to enforce this standard?()A、Make sure all administrators manually change the e-mail addresses to comply with standards.B、Instruct Active Directory administrators to change all e-mail addresses to comply with this standard.C、Create an e-mail address policy.D、Create a transport rule.

考题 You work as an Exchange Administrator for TechWorld Inc.The company has a Windows 2008 Active Directory-based contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG at that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of t you use to accomplish the task?()A、Add-AttachmentFilterEntry -Name image/jpeg -Type FileNameB、Add-AttachmentFilterEntry -Name *.exe -Type FileNameC、Add-AttachmentFilterEntry -Name image/jpeg -Type ContentTypeD、Add-AttachmentFilterEntry -Name ".jpeg -Type ContentType

考题 You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()A、In the Web.config file, enable impersonation.B、In IIS, enable anonymous access.C、In IIS, disable anonymous access.D、In the Web.config file, set the authentication mode to Windows.

考题 单选题When an emulated error notification method is complete, an administrator can view the error log  By typing the errpt command to be sure the emulation took place.  To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?()A  A user defined Resource NameB  A cluster defined Resource NameC  An error daemon specific Resource NameD  A Resource Name generated by Automatic Error Notification

考题 单选题Which of the following commands should the administrator run to check if the SMTP services are still active?()A  Telnet Server name  25B  Ping Server name C  net send Server name test mailD  nbtstat a Server name 

考题 单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address.  Which of the following tools would allow the administrator to test name resolution?()A  net viewB  ipconfigC  digD  ifconfig

考题 多选题You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()AIn the Web.config file, enable impersonation.BIn IIS, enable anonymous access.CIn IIS, disable anonymous access.DIn the Web.config file, set the authentication mode to Windows.

考题 多选题When configuring a DHCP server, which of the following can the administrator define for DHCPusers?()ADatabase serverBNTP serverCDHCP serverDSQL serverEDNS serverFDomain name

考题 多选题You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name "CONTOSO/Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()AIn the Web.config file, enable impersonation.BIn IIS, enable anonymous access.CIn IIS, disable anonymous access.DIn the Web.config file, set the authentication mode to Windows.

考题 单选题You work as an Exchange Administrator for Xxx Inc.The company has a Windows 2008 Active Directorybased network.The network contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG attachments be filtered so that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of the following commands will you use to accomplish the task?()A Add-AttachmentFilterEntry -Name *.jpeg -Type ContentTypeB Add-AttachmentFilterEntry -Name *.exe -Type FileNameC Add-AttachmentFilterEntry -Name image/jpeg -Type ContentTypeD Add-AttachmentFilterEntry -Name image/jpeg -Type FileName

考题 单选题ou are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. One of the servers, Server01 has the Web Server (IIS) role installed on it. Which of the following commands would you choose to create a virtual directory on the company website www.Cer-tech .com/sl for the Sales department?()A appcmd add site /name:sl /physicalPath:c:/websites/slB appcmd set vdir /vdir.name:sl /path:/sl /physicalPath:c:/websites/slC appcmd add app /app.name: Cer-tech /path:/sl /physicalPath:c:/websites/slD appcmd add vdir /app.name: Cer-tech /path:/sl /physicalPath:c:/websites/slE None of the above

考题 单选题An administrator mistakenly shutdown production after a fallover because the service IP address  Was shifted from the normal production node to the standby node.  What can be done to avoid this type of mistake in the future?()A  Include the service IP address in the administrator’s PS1 promptB  Alias the service IP address to the hostname in the /etc/host fileC  Define a persistent IP address with HACMP and make it a practice to use the persistent address for administration workD  Add a DNS entry to map the standby node name to the service IP address so telnet connections will be to the correct node

考题 判断题在administrator用户下,对于注册表需要设置Default User Name、Default Password、Auto Admin Logon、Force Auto Logon。A 对B 错

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. According to the company requirement, the names of all user-defined stored procedures must contain the prefix usp_ on all instances. Besides this, you must make sure that stored procedures that do not contain this prefix cannot be created by you. What should you do?()A A policy should be created. The policy targets the name of the stored procedure that is evaluated on demand. B A policy should be created. The policy targets the name of the stored procedure that is evaluated on change. C A condition should be created. The condition targets the name of the stored procedure that is evaluated on change D A condition should be created. The condition targets the name of stored procedure that is evaluated on demand.