网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()

  • A、Check the server.xml on the IMS Server.
  • B、Check the database table IMSSyncDataType.
  • C、Check the System policies in the AccessAdmin.
  • D、Check the IMS Server settings of the IMS Configuration Utility.

参考答案

更多 “How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()A、Check the server.xml on the IMS Server.B、Check the database table IMSSyncDataType.C、Check the System policies in the AccessAdmin.D、Check the IMS Server settings of the IMS Configuration Utility.” 相关考题
考题 要在页面中设置复选框,可将type属性设置为()。A.radioB.optionC.check boxD.check

考题 Examine the section of the Health Check report given below:Which two statements are true regarding the Health Check report?() A. Health Check was performed manually.B. Health Check was performed to check the disk image block corruptions.C. Health Check was performed to check interblock and intersegment corruption.D. Health Check was performed to verify the integrity of database files and report failures.E. Health Check was performed by the Health Monitor automatically in response to a critical error.

考题 Regarding fast path processing, when does the system perform the policy check?() A. The policy is determined after the SCREEN options check.B. The policy is determined only during the first packet path, not during fast path.C. The policy is determined after the zone check.D. The policy is determined after the SYN TCP flag.

考题 You are the administrator of a SQL Server 2000 computer named SQL1. You want to perform. ad hoc distribution queries against a database that is stored on a SQL Server 2000 computer named SQL2. SQL2 contains several databases, and each of these databases uses a different collation.You want to ensure that comparisons in distributed queries are evaluated correctly. You also want to minimize administrative overhead.How should you configure SQL1?A.Use the ALTER DATABASE statement to change the collation of the databases on SQL1.B.Add SQL2 as remote server.C.Add SQL2 as a linked server. Select the Use Remote Collation check box, and do not specify a collation name.D.Add SQL2 as a linked server. Select the Use Remote Collation check box, and specify a collation name. Repeat this process once for each database on SQL2.

考题 Which of the following can be used to determine the amount of physical memory installed in a laptop? ()A、Check Device Manager Snap-in.B、Type WINVER in the command prompt.C、Check the BIOS.D、Check System Information in the Accessibility folder.E、Check System Information.

考题 下列的HTML中哪个可以产生复选框?()A、input type="check"  B、checkbox  C、input type="checkbox"  D、check

考题 The Business Partner technical specialist is called to check if the addition of host ports on an IBM System Storage DS8000 system has improved users’ response times for an IBM System p server running SAP.  How can the improvement be verified()A、check the output of the vmstat command on AIXB、check the performance reports via TotalStorage Productivity Center for DataC、check the performance reports via TotalStorage Productivity Center for DiskD、check the improvement through the TotalStorage Expert report

考题 复选框的type属性值是()A、checkboxB、radioC、selectD、check

考题 The Business Partner technical specialist is called to determine if the addition of host ports on an IBM System Storage DS8700 has improved users’ response times for an IBM System p server running SAP.  How can the improvement be verified()A、check the output of the "vmstat" command on LINUXB、check the performance reports via Tivoli Storage Productivity Center for DataC、check the performance reports via Tivoli Storage Productivity Center for DiskD、check the output of the "iostat" command on AIX

考题 A basic TCP/IP configuration on the system has just been completed. A remote system can be pinged by IP address but not by hostname. Which of the following actions should be performed next in an effort to successfully ping using the hostname?()A、Check routingB、Check inetd.confC、Check /etc/resolv.confD、Check interface with ifconfig

考题 System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()A、written by the Administrators on the INI filesB、propagated only with the Active Directory network serviceC、propagated to the clients on the next Administrator accessD、propagated to clients the next time AccessAgent synchronizes with the IMS Server

考题 A customer has a development environment that uses the auto-deployment feature. The customer  claims the application is not redeployed even if the new version is copied to an application  subdirectory. Which two parameters of the configuration should you check?()A、Check if archive file in the compressed version has a new REDEPLOY file.  B、If server was started in the Development Mode. Auto-deployment is not supported in production  mode.  C、If the application includes an EJB 3 module. Auto-deployment is not supported for EJBs.D、You change JVM from HotSpot to JRockit. Auto-deployment is not supported in HotSpot auto  deployment.  E、If the domain is a single-server domain. Auto-deployment is not supported in multiserver  domains.

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a text file which is named SQL01.log on the E: drive. A SQL Server Agent job executes every 2 minutes and logs information to the text file. You get a report from users saying that the sever doesn't make response. As the technical support, you check and find that the SQL Server Agent service does not run and the SQL Server Agent job no longer functions. You have to identify the reason why the SQL Server Agent service is unresponsive. In the options below, which log should you check?()  A、You should check SQL1.logB、You should check SQLAGENT.OUTC、You should check log_xx.trcD、You should check ERRORLOG

考题 You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005.You work as a database administrator for your company. A SQL Server 2005 database is utilized in your company. And a table named Inventory is contained by the database. A column named Price is included by the table. According to the company policy, you cannot reduce more than 10 percent the value in the Price column in any single database operation. Through many kinds of method, the company makes updates to the Price column. For instance, the utilization of ad hoc queries is one of the methods. Since you are the database administrator, you should confirm that this company policy takes its effect. Which action should be performed?()A、A stored procedure should be created, and changes are disallowed by the procedure to the Price column that violates company policy.B、On the Price column, a check constraint should be created, and a specified minimum value is required by the check constraint.C、A trigger should be created, and changes are rolled back by the trigger to the Price column that violates company policy.D、On the Price column, a foreign key constraint is created to a table that valid prices are included.

考题 Your company has an Active Directory Rights Management Services (AD RMS) server. Users  have Windows Vista computers. An Active Directory domain is configured at the Windows Server  2003 functional level.     You need to configure AD RMS so that users are able to protect their documents.     What should you do()A、Install the AD RMS client 2.0 on each client computer.B、Add the RMS service account to the local administrators group on the AD RMS server.C、Establish an e-mail account in Active Directory Domain Services (AD DS) for each RMS user.D、Upgrade the Active Directory domain to the functional level of Windows Server 2008.

考题 You have a Windows Server 2008 R2 Hyper-V server with a single network adapter that is connected to a virtual network. The virtual network is configured as External. Virtual machines (VMs) running on the server are not able to communicate with the host server over the network. You need to ensure that VMs running on the server are able to communicate with the host server over the network. In Virtual Network Manager,what should you do?()A、Select the Internal only connection type.B、Select the Private virtual machine network connection type.C、Select the Allow management operating system to share this network adapter check box.D、Clear the Allow management operating system to share this network adapter check box.

考题 Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers.  You are planning to deploy a custom application.   You need to schedule the deployment to occur outside of business hours and without user interaction.   Which deployment method should you choose?()A、software installation with Group PolicyB、Microsoft Application Virtualization (App-V)C、Lite Touch InstallationD、software deployment with Microsoft System Center Configuration Manager 2007

考题 Your network contains two servers named Server1 and Server2 that run Windows Server 2008  R2. Server1 has Active Directory Federation Services (AD FS) 2.0 installed. Server1 is a member  of an AD FS farm.     The AD FS farm is configured to use a configuration database that is stored on a separate  Microsoft SQL Server.   You install AD FS 2.0 on Server2.     You need to add Server2 to the existing AD FS farm.     What should you do()A、On Server1, run fsconfig.exe.B、On Server1, run fsconfigwizard.exe.C、On Server2, run fsconfig.exe.D、On Server2, run fsconfigwizard.exe.

考题 Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 has the Active Directory Federation Services (AD FS) role installed.   You have an application named App1 that is configured to use Server1 for AD FS authentication. You deploy a new server named Server2. Server2 is configured as an AD FS 2.0 server.  You need to ensure that App1 can use Server2 for authentication.   What should you do on Server2()A、Add an attribute store.B、Create a relying party trust.C、Create a claims provider trust.D、Create a relaying provider trust.

考题 Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

考题 You had installed an Active Directory Federation Services (AD FS) role on a Windows server 2008 in your organization. Now you need to test the connectivity of clients in the network to ensure that they can successfully reach the new Federation server and Federation server is operational. What should you do()A、Go to Services tab, and check if Active Directory Federation Services is runningB、In the event viewer, Applications, Event ID column look for event ID 674.C、Open a browser window, and then type the Federation Service URL for the new federation server. D、None of the above

考题 Your network contains an Active Directory forest. All domain controllers run Windows Server  2008 Standard. The functional level of the domain is Windows Server 2003. You have a  certification authority (CA).   The relevant servers in the domain are configured as shown in the following table:     Server name  Operating system  Server role   Server1  Windows Server 2003  Enterprise root CA  Server2  Windows Server 2008  Enterprise subordinate CA  Server3  Windows Server 2008 R2  Web Server   You need to ensure that you can install the Active Directory Certificate Services (AD CS)  Certificate Enrollment Web Service on the network.     What should you do()A、Upgrade Server1 to Windows Server 2008 R2.B、Upgrade Server2 to Windows Server 2008 R2.C、Raise the functional level of the domain to Windows Server 2008.D、Install the Windows Server 2008 R2 Active Directory Schema updates.

考题 Your company has a server that runs Windows Server 2008 R2. Active Directory Certificate Services  (AD CS) is configured as a standalone Certification Authority (CA) on the server. You need to audit changes to the CA configuration settings and the CA security settings. Which two tasks should you perform()A、Configure auditing in the Certification Authority snap-in.B、 Enable  auditing  of  successful  and  failed  attempts  to  change  permissions  on  files  in  the %SYSTEM32%/CertSrv directory.C、Enable auditing of successful and failed attempts to write to files in the %SYSTEM32%/CertLog directory.D、Enable the Audit object access setting in the Local Security Policy for the Active Directory Certificate  Services (AD CS) server.

考题 单选题While overhauling a jerk-type fuel pump it is necessary to replace the pump plungerWhich of the parts listed below must also be replaced?()A Delivery check valveB Pump barrelC Tubing to the injectorD Cam follower

考题 单选题Regarding fast path processing, when does the system perform the policy check?()A The policy is determined after the SCREEN options check.B The policy is determined only during the first packet path, not during fast path.C The policy is determined after the zone check.D The policy is determined after the SYN TCP flag.

考题 多选题A customer has a development environment that uses the auto-deployment feature. The customer  claims the application is not redeployed even if the new version is copied to an application  subdirectory. Which two parameters of the configuration should you check?()ACheck if archive file in the compressed version has a new REDEPLOY file.BIf server was started in the Development Mode. Auto-deployment is not supported in production  mode.CIf the application includes an EJB 3 module. Auto-deployment is not supported for EJBs.DYou change JVM from HotSpot to JRockit. Auto-deployment is not supported in HotSpot auto  deployment.EIf the domain is a single-server domain. Auto-deployment is not supported in multiserver  domains.

考题 单选题How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()A Check the server.xml on the IMS Server.B Check the database table IMSSyncDataType.C Check the System policies in the AccessAdmin.D Check the IMS Server settings of the IMS Configuration Utility.