网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
WhichIBMresourceisaWeb-baseddatarepositoryfortestedandsupportedhardware,applications,andmiddlewareforSystemxandBladeCenter?()
A.IBMSizingGuides
B.Configuration&OptionsGuideCOG
C.StandaloneSolutionsConfigurationTool(SSCT)
D.IBMServerProven
参考答案
更多 “ WhichIBMresourceisaWeb-baseddatarepositoryfortestedandsupportedhardware,applications,andmiddlewareforSystemxandBladeCenter?() A.IBMSizingGuidesB.ConfigurationOptionsGuideCOGC.StandaloneSolutionsConfigurationTool(SSCT)D.IBMServerProven ” 相关考题
考题
This passage implies that ______.A) buying a false degree is not moralB) personnel officers only consider applicants from famous schoolsC) most people lie on applications because they were dismissed from schoolD) society should be greatly responsible for lying on applications
考题
is the foundation on which applications are built.A.UserB.DisplayC.PrinterD.Operation system
考题
The heat generated by the operating system war between rivals IBM Corp. and Microsoft Corp. is(21).Windows 95 and OS/2 introduce a new(22). Both systems claim to multitask legacy DOS and 16-bit Windows applications. However, only OS/2 can provide full memory(crash) protection for these legacy applications because it is capable of running each DOS and Windows application within its full-protected memory address space.Windows 95 will run all current Windows applications in the same shared- memory address space, affording full memory protection only to the(23)32-bit Windows 95 applications. In other word, Windows 95 users will have to(24)their current Windows applications to Windows 95 version to match the memory protection OS/2 now delivers.While OS/2 does afford superior memory protection and multitasking for legacy DOS and Windows applications, it will not be able to run any Windows 95 applications. IBM may address this(25)in an update of the OS but has no present plans to do so.A.intensifyB.intensifiedC.intensifyingD.intensifies
考题
Rate your level of proficiency with deploying and managing a presentation virtualization environment,including preparing and managing remote applications, accessing published applications, and configuring client settings to access virtualized desktops.()A.Very HighB.HighC.ModerateD.LowE.Very Low
考题
Your network consists of a single Active Directory domain named contoso.com. All servers run WindowsServer 2003 Service Pack 2 (SP2). The domain contains a domain Distributed File System (DFS) root named DFSroot.The network contains the offices shown in the following table.Server1 and Server2 currently each host a share named Applications.You need to implement a solution to meet the following requirements:·Automatically redirect users to the Applications folder in their local site.·Ensure that the contents of the Applications shares on Server1 and Server2 are automatically synchronized.What should you do? ()A. In the DFS root, create one link named Applications that has \\server1\applications and \\server2\applications as targets.B. In the DFS root, create a root target that points to \\server1\applications. Create a second root target that points to \\server2\applications.C. In the DFS root, create one link named Applications1 that has \\server1\applications as its target. Create a second link named Applications2 that has \\server2\applications as its target.D. In the Main-office-computers OU, publish the \\server1\applications share. In the Branch-office-computers OU, publish the \\server2\applications share.
考题
查看全网整体告警的操作是()
A.Applications-Ericsson-Alarm-ViewAlarms-AlarmStatusMatrixB.OthersC.Applications-Ericsson-Alarm-ViewAlarms-AlarmLogBrowerD.Applications-Ericsson-Alarm-ViewAlarms-AlarmListViewer
考题
You are an experienced network administrator in an international corporation. During your working hours, you are asked to deploy the Cisco SSL VPN AIM module in a Cisco 1800 Series Router. The beneficial reason for that deployment is to:()A. improve performance up to 300% for both IPsec and SSL VPN applicationsB. improve performance for both IPsec and SSL VPN applications with IPsec encryption taking place in hardwareC. improve performance up to 300% for both IPsec and SSL VPN applications with SSL encryption taking place in hardwareD. improve performance up to 200% for both IPsec and SSL VPN applications with encryption taking place in hardwareE. improve performance exclusively for SSL VPN applications
考题
Cisco Clean Access ensures that computers connecting to your network have which of the following?()A、 No vulnerable applications or operating systemsB、 No viruses or wormsC、 Appropriate security applications and patch levelsD、 Current IPS signaturesE、 Cisco Security Agent
考题
Which of the following actions will enable 64-bit applications on a system with 32-bit kernel()A、Use "smit load64bit" to enable the 64-bit applications.B、Re-install all applications with 64-bit versions.C、Re-install the OS with 64-bit kernel enabled.D、Change the kernel to 64bit, reboot, and then use the following command: chdev -l sys0 -a "applications=64_bit"
考题
You are an experienced network administrator in an international corporation. During your working hours, you are asked to deploy the Cisco SSL VPN AIM module in a Cisco 1800 Series Router. The beneficial reason for that deployment is to:()A、improve performance up to 300% for both IPsec and SSL VPN applicationsB、improve performance for both IPsec and SSL VPN applications with IPsec encryption taking place in hardwareC、improve performance up to 300% for both IPsec and SSL VPN applications with SSL encryption taking place in hardwareD、improve performance up to 200% for both IPsec and SSL VPN applications with encryption taking place in hardwareE、improve performance exclusively for SSL VPN applications
考题
You are using NBAR to get a statistical baseline for the applications running on your network butdiscover that some applications are not being recognized. Which of the following are possiblesolutions?(Choose all that apply.)()A、Use the ip nbar pdlm command to allow NBAR to reference a new PDLM in flash memoryB、If NBAR doesn’t recognize certain applications you must contact Cisco and ask them to emailyou a new PDLM for that applicationC、Use the ip nbar port-map command to allow NBAR to recognize certain applications with anev/port numberD、The applications not being recognized can be rerouted to an NBAR collector, which has a morecomplete list of applicationsE、Use the copy nbar flash: command to download a new PDLM file to flashF、Use the ip nbar pdlm command to download a new NBAR reference file from the Cisco website
考题
Which three statements are true about the appliance of QoS models?()A、the DiffServ model requires applications to signal the network with QoS requirementsB、the DiffServ model can be used to deliver QoS based upon IP precedence, or source and destination addressesC、the DiffServ model requires RSVPD、the best effort model is suitable for applications such as file transfer and e-mailE、the IntServ model requires applications to signal the network with QoS requirementsF、the IntServ model model attempts to deliver a level of service based on the QoS specified by each packet
考题
Which of the following protocols define the rules and processes used to transmit and receive block storage applications over TCP/IP?()A、iSCSIB、VoIPC、Distributed Applications over IPD、HTTPS
考题
Which of the following actions will enable 64-bit applications on a system with a 32-bit kernel?()A、change the kernel to 64bit, reboot, and then use the following command:chdev -l sys0 -a applications=64_bitB、Re-install the OS with 64-bit kernel enabledC、Re-install all applications with 64-bit versionsD、Use smit to enable the 64-bit applications
考题
Companycom is planning to do server consolidation on POWER5. The customer has a test environment, a QA environment and a production environment for two applications. Both the test and QA environments are very small and are only utilized when new releases are being developed and tested. They require less than 1 CPU each. Both production applications require 2 CPUs for day-to-day operation and can require up to an additional 2 CPUs each during abrupt peak requirements. What is the best design for the LPARs?()A、Use micropartitioning for test and QA environments, and DLPAR for the production applications B、Use micropartitioning for test and QA environment, and CPU pooling for the production applications C、Create standard LPARs for all test, QA, and production applications to keep all partitions separate and isolated. D、Create DLPAR partitions for all test, QA, and production applications to keep test from disturbing production environment.
考题
A company wants to run multiple applications on an x445 to serve their user base. OS and application licensing cost is a factor. Which TWO questions will help the specialist decide on the operating environment and the number of processors per server?()A、What are the applications’ scaling (multi-threading) capabilities?B、How does L3 cache size impact application performance?C、How many servers are running the applications today?D、What is the expected size of the data attached to the server in GB’s?E、Will the applications disable the Hyperthreading on the Xeon processor?
考题
You need to recommend a solution to provision new applications on the VMs for the planned virtual desktop pool deployment. What should you recommend?()A、Deploy the applications to the VMs by using App-V streaming.B、Deploy the applications to the VMs by using Group Policy Software Installation.C、Deploy a MED-V workspace to each VM. Deploy the applications to the workspace.D、Deploy the applications by using RemoteApp.Create a RemoteApp and Desktop Connection for each VM.
考题
Rate your level of proficiency with deploying and managing a presentation virtualization environment, including preparing and managing remote applications, accessing published applications, and configuring client settings to access virtualized desktops.()A、Very HighB、HighC、ModerateD、LowE、Very Low
考题
You need to enhance performance of foreground and background applications. How can you configure Windows 2000 Professional to process both foreground and background applications at the same priority? ()A、By selecting the applications options in the performance options dialog box.B、By selecting the application services option in the performance options dialog box.C、By selecting the background option in the performance options dialog box.D、By selecting the background services option in the performance options dialog box.
考题
单选题During system startup, many applications are starting that are not needed. Which of the following can be used to evaluate all startup applications?()A
Computer Management UtilityB
Add/Remove ProgramsC
Autoexec.bat fileD
MSCONFIG
考题
单选题Recently three new applications were installed on all the desktops in a company branch. One of the applications causes Windows to crash on startup, but the technician is unable to find out which application it is. Without removing all three applications, which of the following is the BEST way to determine the cause of the crash?()A
Launch REGEDIT and remove the offending applications from the Run key.B
Start the computer in Safe Mode and check Event Viewer.C
Put in the ERD and when the window pops up select the option for Repair Broken Links and Applications.D
Hit the F6 key as Windows loads and run Repair Broken Links and Applications.
考题
单选题A customer has successfully upgraded their System x servers. Now the are very concerned about their applications. They have a historical collection of various applications that do not interact. Which of the following should the sales professional suggest?()A
Rewrite applications using Linux to limit licensing feesB
Port applications toanAIX or UNIX server to conserve energy and floor spaceC
SAP or similar all encompassing applicationsD
Webenable all applications
考题
单选题Rate your level of proficiency with deploying and managing a presentation virtualization environment, including preparing and managing remote applications, accessing published applications, and configuring client settings to access virtualized desktops.()A
Very HighB
HighC
ModerateD
LowE
Very Low
考题
单选题If DB2 detects a deadlock between application A and application B (each waiting for a lock held by the other one), what action will DB2 take?()A
Rollback the transaction in both applications.B
Rollback the transaction in one of the two applications.C
Decrease the lock timeout value for both applications, thereby causing a lock timeout situation.D
Send a message to let the administrator know of the situation and decide which application or applications should be terminated.
考题
单选题Which of the following actions will enable 64-bit applications on a system with a 32-bit kernel?()A
change the kernel to 64bit, reboot, and then use the following command:chdev -l sys0 -a applications=64_bitB
Re-install the OS with 64-bit kernel enabledC
Re-install all applications with 64-bit versionsD
Use smit to enable the 64-bit applications
考题
单选题You are the administrator of a Windows XP Professional computer. You run five 16-bit applications on the computer. You want to monitor the performance of the computer when all five applications run at the same time. You use System Monitor to collect the performance data. The performance counters you want to include in your analysis are IO Read Bytes/sec, IO Write Bytes/sec, and Page Faults/sec. You want to ensure that you can collect these counters for each application. What should you do?()A
Run the five 16-bit applications in one process. Monitor each thread of Ntvdm.exe. B
Run each of the five 16-bit applications in its own memory space. Monitor each instance of Ntvdm.exe. C
Run the five 16-bit applications in Windows 95 compatibility mode. Monitor each instance of the applications. D
Start the five 16-bit applications by using the Start /normal command. Monitor each instance of the applications.
热门标签
最新试卷