网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A hosting company recently purchased an IBM p5-570 to use in their data center. The company intends to use the server to run several different client workloads. Which of the following features of the IBM p5 servers addresses the need for the isolation of workloads?()
A

Workload Manager

B

Support for AIX 5.3

C

Logical partitioning

D

64-bit or 32-bit kernel support


参考答案

参考解析
解析: 暂无解析
更多 “单选题A hosting company recently purchased an IBM p5-570 to use in their data center. The company intends to use the server to run several different client workloads. Which of the following features of the IBM p5 servers addresses the need for the isolation of workloads?()A Workload ManagerB Support for AIX 5.3C Logical partitioningD 64-bit or 32-bit kernel support” 相关考题
考题 The company has purchased one hundred and fifty new servers. The server administrator needs to build and deploy them as quickly as possible. Which of the following is the FASTEST method of building and deploying each server?()A、Build each server from the OS manufacturer’s build disk.B、Use an imaging system to manually deploy the build to the servers.C、Build each server with the manufacturer’s build disk.D、Give the company build disk to the server manufacturer.

考题 All servers on your company’s network run Windows Server 2008 R2. All client computers run Windows Vista.  The company is planning to virtualize an application that is CPU intensive and that runs only on Windows Vista and Windows 7. You need to recommend a virtualization solution that minimizes the use of CPU resources on the server.    Which technology should you recommend?()A、Remote Desktop Services (RDS)B、Microsoft Application Virtualization (App-V)C、Microsoft Virtual Desktop Infrastructure (VDI)D、Microsoft Enterprise Desktop Virtualization (MED-V)

考题 A Dell customer decided to use IBM Director and xSeries to manage their servers.  They purchased 10 IBM x336 servers and they already have 75 various Dell servers.  Which TWO steps need to be verified to be able to manage the mixed environment with IBM Director?()A、Verify that the Dell systems have TCP/IP enabledB、Verify that the systems are running the IBM Director AgentC、Verify that the managed systems are SMBIOS 2.1 and WfM 2.0 compliantD、Verify that the Dell systems have at least a 1GB of memory installedE、Install an SNMP agent on the Dell systems as IBM Director cannot manage Industry Standard non-IBM servers

考题 A customer has 15 IBM x365 servers in a rack environment and is using IBM Director for systems management.  They require the ability to restart any server independent of the operating system.  Which of the following is the most cost-effective solution?()A、Interconnect the service processors and use the IBM Director AgentB、Install RSA II in each server and chain together the systems management processorsC、Install the RSA II in the top server and chain together the service processor interconnectD、Install the IBM Director Agent on each server and use the remote control function to restart the servers

考题 A global container shipping company has a new application that they are going to deploy on a p5-570 at their corporate data center.  The Chief Information Officer indicates that, if the application is down for more than 36 hours, the cost of downtime is very high.  For the initial 36 hours of downtime, the company has a manual process they can execute without significant additional cost. Which of the following products best mitigates the major business risk to the company?()A、IBM Business Continuity ServicesB、HACMP and a second p5-570 for the data centerC、ServiceSuite Supportline with Account AdvocateD、ServiceSuite 9x5 next day Hardware Maintenance

考题 A customer has a large HP Intel infrastructure and is actively managing these servers with Insight Manager.  They recently purchased an IBM x346 server for a remote office database project.  They do not want to run additional systems management software but require to be notified of PFA and hardware alerting on critical hardware components.  Which of the following solutions would accomplish this?()A、Install an RSA II Slimline card on the IBM server and configure to send email alertsB、Enable the IBM management option in Insight ManagerC、Install and configure a Director agent on the IBM serverD、Configure the systems management processor on the IBM server

考题 A company has 20 remotely located Microsoft Windows 2000 xSeries servers which need to deploy a non-IBM software application from a Windows 2000 xSeries server.  How would they take advantage of IBM Director to be able to effectively deploy this application?()A、Use Remote Deployment Manager.B、Use the Update Assistant function of IBM Director.C、Use the Software Deployment Tool of the IBM Director.D、Use Software Distribution Premium Edition for IBM Director.

考题 A company is consolidating four IBM System x servers. Each server has 500 GB of disk storage and each will grow to 2 TB within the next year. Additionally, the company will implement a SAN over the next year and must include connectivity and storage for its existing IBM System z and two IBM System p servers.    Which storage solution meets the company requirements()A、IBM System Storage DS3400B、IBM System Storage DS8100C、IBM System Storage N series N7800D、IBM System Storage DS4700

考题 A hosting company recently purchased an IBM p5-570 to use in their data center. The company intends to use the server to run several different client workloads. Which of the following features of the IBM p5 servers addresses the need for the isolation of workloads?()A、Workload ManagerB、Support for AIX 5.3C、Logical partitioningD、64-bit or 32-bit kernel support

考题 A customer is running a number of non-IBM servers purchased two years ago and has settled on one of the new IBM xSeries servers as a migration path.  From the following options, which is the preferred migration path?()A、Copy the image of the non-IBM servers and copy that image to the IBM servers, then reboot the IBM servers.B、Copy the image from the non-IBM servers with RDM and install them with IBM Director to the new IBM servers. Reboot the IBM servers.C、Install a fresh operating system using ServerGuide, and then install the applications and copy the data from the old servers.D、Install a fresh operating system on the IBM servers and then run ServerGuide on the IBM servers to migrate the applications and data to the IBM servers.

考题 Your company has 10 servers that run Windows Server 2008. The servers have Remote Desktop Protocol (RDP) enabled for server administration. RDP is configured to use default security settings. All administrators’ computers run Windows Vista. You need to ensure the RDP connections are as secure as possible.Which two actions should you perform? ()A、Set the security layer for each server to the RDP Security Layer.B、Configure the firewall on each server to block port 3389.C、Acquire user certificates from the internal certification authority.D、Configure each server to allow connections only to Remote Desktop client computers that use Network Level Authentication.

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server. Which account type should you use? () A、You should use local Service accountB、You should use network Service accountC、You should use domain accountD、You should use local System account

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()A、The best option is to use an A record for FederatedSharing.Company.com.B、The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.C、The best option is to use an A record for autodiscover.Company.com.D、The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain.  The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP.   The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server.  You need to choose a secure authentication method.   What should you do? ()A、 Use the authentication method of the default IPSec policies.B、 Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.C、 Create a custom IPSec policy and use certificate-based authentication.D、 Create a custom IPSec policy and use preshared key authentication.E、 Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.

考题 Your company has an Active Directory forest. The company has servers that run Windows Server  2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.     Your partner company has an Active Directory forest that contains a single domain. The company  has servers that run Windows Server 2008 R2 and client computers that run Windows 7.     You need to configure your partner company’s domain to use the approved set of administrative  templates.   What should you do()A、Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPB、Copy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PC、Copy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PD、Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server. Which account type should you use? ()A You should use local Service accountB You should use network Service accountC You should use domain accountD You should use local System account

考题 单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. All domain controllers run Active DirectoryCintegrated DNS. You create several static host (A) resource records. You need to verify that the DNS server is sending the correct host records to all client computers.  Which command-line tool should you use?()A  netshB  tracertC  ntdsutilD  nslookup

考题 单选题Which information element will the client use if the client intends to use a different PHY rate than the nominal PHY rate advertised?()A TSPEC IEB TSRS IEC WMM IED TSM IE

考题 单选题A hosting company recently purchased an IBM p5-570 to use in their data center. The company intends to use the server to run several different client workloads. Which of the following features of the IBM p5 servers addresses the need for the isolation of workloads?()A Workload ManagerB Support for AIX 5.3C Logical partitioningD 64-bit or 32-bit kernel support

考题 单选题You are one of the network administrators for your company. All network servers run Windows Server 2003. Your company operates a total of four offices. The office where you work has 15 servers. You are responsible for supporting and maintaining all of these servers. You need to design a monitoring plan that will achieve the following goals: Track all performance changes on the servers. Record performance data to anticipate the need for future upgrades. What should you do? ()A On each server in your office, use Performance Logs and Alers to create a baseline log. Configure the log tocollect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.B From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.C On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.D From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()A The best option is to use an A record for FederatedSharing.Company.com.B The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.C The best option is to use an A record for autodiscover.Company.com.D The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.

考题 单选题All servers on your company’s network run Windows Server 2008 R2. All client computers run Windows Vista.  The company is planning to virtualize an application that is CPU intensive and that runs only on Windows Vista and Windows 7. You need to recommend a virtualization solution that minimizes the use of CPU resources on the server.    Which technology should you recommend?()A Remote Desktop Services (RDS)B Microsoft Application Virtualization (App-V)C Microsoft Virtual Desktop Infrastructure (VDI)D Microsoft Enterprise Desktop Virtualization (MED-V)

考题 单选题A customer has 15 IBM x365 servers in a rack environment and is using IBM Director for systems management.  They require the ability to restart any server independent of the operating system.  Which of the following is the most cost-effective solution?()A Interconnect the service processors and use the IBM Director AgentB Install RSA II in each server and chain together the systems management processorsC Install the RSA II in the top server and chain together the service processor interconnectD Install the IBM Director Agent on each server and use the remote control function to restart the servers

考题 单选题A hosting company recently purchased an IBM p5-570 to use in their data center. The company intends to use the server to run several different client workloads. Which of the following features of the IBM p5 servers addresses the need for the isolation of workloads?()A Workload ManagerB Support for AIX 5.3C Logical partitioningD 64-bit or 32-bit kernel support

考题 单选题A customer has a large HP Intel infrastructure and is actively managing these servers with Insight Manager.  They recently purchased an IBM x346 server for a remote office database project.  They do not want to run additional systems management software but require to be notified of PFA and hardware alerting on critical hardware components.  Which of the following solutions would accomplish this?()A Install an RSA II Slimline card on the IBM server and configure to send email alertsB Enable the IBM management option in Insight ManagerC Install and configure a Director agent on the IBM serverD Configure the systems management processor on the IBM server

考题 单选题A customer is running a number of non-IBM servers purchased two years ago and has settled on one of the new IBM xSeries servers as a migration path.  From the following options, which is the preferred migration path?()A Copy the image of the non-IBM servers and copy that image to the IBM servers, then reboot the IBM servers.B Copy the image from the non-IBM servers with RDM and install them with IBM Director to the new IBM servers. Reboot the IBM servers.C Install a fresh operating system using ServerGuide, and then install the applications and copy the data from the old servers.D Install a fresh operating system on the IBM servers and then run ServerGuide on the IBM servers to migrate the applications and data to the IBM servers.

考题 单选题You are a security administrator for your company. The network consists of a single Active  Directory domain. All servers run Windows Server 2003. All client computers run Windows 2000 Professional.   You manage a Windows Server 2003 computer named Server1 that is a domain member server. You use IIS on Server1 to host an Internet Web site. Approximately 4,000 employees of your company connect over the lnternet to access company confidential data on Server1. You control access to data on Server1 by using NTFS file permissions assigned to groups. Different groups are assigned access to different files. Employees must have access only to files that they are assigned access to based on their membership in a group. You enable SSL on Server1 to protect confidential data while it is in transit. You issue each employee an Authenticated Session certificate and store a copy of that certificate with their user account in the Active Directory domain.    You need to ensure that Server1 authenticates users based on possession of their certificate.  What should you do?()A  Request a Web server certificate from a commercial certification authority (CA).B  Configure access restrictions based on employee ip address.C  Enable Digest authentication for Windows domain servers.D  Configure client certificate mapping.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain.  The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP.   The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server.  You need to choose a secure authentication method.   What should you do? ()A  Use the authentication method of the default IPSec policies.B  Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.C  Create a custom IPSec policy and use certificate-based authentication.D  Create a custom IPSec policy and use preshared key authentication.E  Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.