网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

●A management domain typically contains a large amount of management information. Each individual item of( 71)information is an instance of a managed object type. The definition of a related set of managed (72) types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB( 73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domain

(71) A.rotation

B.switch

C.management

D.transmission

(72) A.path

B.object

C.route

D.packet

(73) A.connection

B.window

C.module

D.destination

(74) A.packets

B.searches

C.states

D.instances

(75) A.device

B.state

C.type

D.packet


参考答案

更多 “ ●A management domain typically contains a large amount of management information. Each individual item of( 71)information is an instance of a managed object type. The definition of a related set of managed (72) types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB( 73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domain(71) A.rotationB.switchC.managementD.transmission(72) A.pathB.objectC.routeD.packet(73) A.connectionB.windowC.moduleD.destination(74) A.packetsB.searchesC.statesD.instances(75) A.deviceB.stateC.typeD.packet ” 相关考题
考题 The principles of risk management should be followed only for:A complex projectsB simple projectsC large projectsD A and CE All of the above.

考题 Which three elements must be used when you configure a router interface for vlan trunking?() A. one IP network or subnetwork for each subinterfaceB. subinterface numbering that matches vlan tagesC. subinterface encapsulation identifiers that match vlan tagsD. a management domain for each subinterfaceE. one physical interface for each subinterfaceF. one subinterface per vlan

考题 A management domain typically contains a large amount of management information. Each individual item of(71) information is an instance of a managed object type. The definition of a related set of managed (72)types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB (73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple () of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domainA.packets B.searches C.states D.instances

考题 A management domain typically contains a large amount of management information. Each individual item of() information is an instance of a managed object type. The definition of a related set of managed (72)types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB (73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domainA.rotation B.switch C.management D.transmission

考题 A management domain typically contains a large amount of management information. Each individual item of(71) information is an instance of a managed object type. The definition of a related set of managed (72)types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB (73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object () within a management domainA.device B.state C.type D.packet

考题 What action should you execute if you wanted to enable VTP pruning on your entire management  domain?()A、 Enable VTP pruning on any client switch in the management domain.B、 Enable VTP pruning on any switch in the management domain.C、 Enable VTP pruning on every switch in the management domain.D、 Enable VTP pruning on a VTP server in the management domain.E、 Disable VTP pruning on a VTP server in the management domain.

考题 Which three elements must be used when you configure a router interface for vlan trunking?()A、one IP network or subnetwork for each subinterfaceB、subinterface numbering that matches vlan tagesC、subinterface encapsulation identifiers that match vlan tagsD、a management domain for each subinterfaceE、one physical interface for each subinterfaceF、one subinterface per vlan

考题 RBTelco is a large multinational company that outsources health care benefit management to RBBenefits. RBTelco employees access RBBenefits resources through an authenticate-able account at each company. RBBenefit and RBTelco will use SAML V1.0. Which IBM Tivoli Access Manager for e-business (ITAMeb) and IBM Tivoli Federated Identity Manager (ITFIM) components are required to be installed at RBTelco?()A、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console B、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit C、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit D、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, ITFIM Demonstration Scenarios, WebSEAL Application Developer Kit

考题 To perform management activities, each domain requires its own()A、 Administration ServerB、 Configuration WizardC、 Ant TaskD、 Node Server

考题 You have an Exchange Server 2010 that contains five mailbox servers.Mailbox server Server1 host a mailbox database named DB1.DB1 contains 300 user mailboxes.You create a new public folder database named Public2 on Server1.You need to ensure that all users that have mailboxes in DB1 store new public folders in Public2. What should you do?()A、From Exchange Management Console, modify the propierties of DB1.B、From Exchange Management Console, modify the propierties of Public.C、From Exchange Management Console, modify the propierties of Server1.D、From Exchange Management Shell, modify the propierties of each mailbox.

考题 Your network contains an Active Directory domain that contains five domain controllers. You have  a management computer that runs Windows 7.   From the Windows 7 computer, you need to view all account logon failures that occur in the  domain.     The information must be consolidated on one list.   Which command should you run on each domain controller()A、Wecutil.exe qcB、Wevtutil.exe gliC、Winrm.exe quickconfigD、Winrshost.exe

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization that contains a number of Hub Transport servers. During the course of day you receive an instruction form management to recommend a messaging hygiene solution. Your recommendation should ensure that servers known to send spam is blocked andthat the administrative efforts are reduced. What should you do?()A、You should recommend to management recipient filtering.B、You should recommend to management an IP Block list.C、You should recommend to management IP Block list providers.D、You should recommend to management sender filtering.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 mailbox server named -ex20 that contains a mailbox database.a Company.com manager wants the see the last logon time of the employees at Company.com. What should you do?()A、The best option is to run the Get-MailboxDatabase from the Exchange Management Shell.B、The best option is to run the Get-MailboxStatistics from the Exchange Management Shell.C、The best option is to create and export a filter from the Exchange Management Console.D、The best option is to run the Remote Connectivity Analyzer from the Exchange Management Console.

考题 Your network contains an Active Directory domain named contoso.com. The network contains  client computers that run either Windows Vista or Windows 7. Active Directory Rights  Management Services (AD RMS) is deployed on the network.     You create a new AD RMS template that is distributed by using the AD RMS pipeline. The  template is updated every month.   You need to ensure that all the computers can use the most up-to-date version of the AD RMS  template. You want to achieve this goal by using the minimum amount of administrative effort.     What should you do()A、Upgrade all of the Windows Vista computers to Windows 7.B、Upgrade all of the Windows Vista computers to Windows Vista Service Pack 2 (SP2).C、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all users by usinD、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all computers by

考题 Your network consists of a single Active Directory forest that contains a root domain and two child domains. All servers run Windows Server 2008 R2.  A corporate policy has the following requirements:   èAll local guest accounts must be renamed and disabled. èAll local administrator accounts must be renamed.   You need to recommend a solution that meets the requirements of the corporate policy. What should you recommend?()A、Implement a Group Policy object(GPO) for each domain.B、Implement a Group Policy object(GPO) for the root domain.C、Deploy Network Policy and Access Services(NPAS)on all domain controllers in each domain. D、Deploy Active Directory Rights Management Services(AD RMS)on the root domain controllers.

考题 Your company has a main office and a branch office. All branch office administrators are members of a custom management role group.The role group is configured to allow members to manage recipients.The branch office administrators are also members of The Domain Admins security group. The organization contains one Exchange Server 2010 server. You discover that the branch office administrators can manage recipients in both offices. You need to ensure that the branch office administrators can manage recipients in their assigned branch office only.What should you do?()A、Create a new management role entry for the role group.B、Create a management role assignment policy and associate the policy to the role group.C、Create a management scope and associate the scope to the role group.Set a recipient filter for the management scope.D、Remove the branch office administrators from the Domain Admins group.Add the branch office recipients to the role group.

考题 单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1. Which tool should you use?()A File Server Resource Manager (FSRM)B New-StoragePoolC DiskpartD Share and Storage Management

考题 单选题An Organization has Exchange 2010 with 50 Hub Transport Servers.Minimize amount of disk space used on Hub Transport Servers to store shadow copies of messages.What should you do?()A From the Exchange Management Shell, run set-transportconfig cmdletB From the Exchange Management Shell, run set-transportservers cmdletC From the Exchange Management Console (EMC), modify transport settingsD From the Exchange Management Console (EMC), modify properties of Hub Transport Servers

考题 单选题You have an Exchange Server 2010 organization that contains five Mailbox servers and five Client Access servers.All users in the organization connect to their mailboxes by using Outlook Anywhere.You create a Client Access server array.You need to ensure that all users can connect to the Client Access server array.What should you do?()A From the Exchange Management Shell, run the Set-Mailbox cmdletB From the Exchange Management Shell, run the Set-MailboxDatabase cmdletC From the Exchange Management Console (EMC), modify the properties of each mailbox databaseD From the Exchange Management Console (EMC), modify the properties of each Client Access server object

考题 单选题What action should you execute if you wanted to enable VTP pruning on your entire management  domain?()A  Enable VTP pruning on any client switch in the management domain.B  Enable VTP pruning on any switch in the management domain.C  Enable VTP pruning on every switch in the management domain.D  Enable VTP pruning on a VTP server in the management domain.E  Disable VTP pruning on a VTP server in the management domain.

考题 单选题Your network consists of a single Active Directory domain. The domain contains a server that runs Windows Server 2008. The server has the Windows SharePoint Services (WSS) server role installed.You need to allow users to create distribution lists from a SharePoint site. What should you do on the WSS server?()A Set the outgoing mail character set to 1200(Unicode).B Enable the SharePoint Directory Management Service.C Configure the site to accept messages from authenticated users only.D Configure the site to use the default Rights Management server in Active Directory Domain Services.

考题 单选题To perform management activities, each domain requires its own()A  Administration ServerB  Configuration WizardC  Ant TaskD  Node Server

考题 多选题You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()ADelegate the password management controls to the help desk staff.BDelegate the password management controls to the Domain Users group.CConfigure the Default Domain Policy to enforce password expiration settings.DConfigure the Default Domain Controller Policy to enforce password expiration settings.

考题 单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()A You should recommend that management make use of DAG network encryption.B You should recommend that management make use of Encrypted File System (EFS)C You should recommend that management make use of Windows BitLocker Drive Encryption.D You should recommend that management make use of Rights Management Service RMS.

考题 多选题What are two important guidelines to follow when implementing VTP?()ACDPmust be enabled on all switches in theVTP management domain.BAll switches in the VTPdomain must run the same version of VTP.CWhen using secure mode VTP, only configure management domain passwords onVTP servers.DEnablingVTP pruning on a server willenable the feature for the entire management domain.EUse of theVTPmulti-domain feature should be restricted to migration and temporary implementation.

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 mailbox server named -ex20 that contains a mailbox database.a Company.com manager wants the see the last logon time of the employees at Company.com. What should you do?()A The best option is to run the Get-MailboxDatabase from the Exchange Management Shell.B The best option is to run the Get-MailboxStatistics from the Exchange Management Shell.C The best option is to create and export a filter from the Exchange Management Console.D The best option is to run the Remote Connectivity Analyzer from the Exchange Management Console.

考题 多选题Which three elements must be used when you configure a router interface for vlan trunking?()Aone IP network or subnetwork for each subinterfaceBsubinterface numbering that matches vlan tagesCsubinterface encapsulation identifiers that match vlan tagsDa management domain for each subinterfaceEone physical interface for each subinterfaceFone subinterface per vlan