网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
An enterprise has a web application running both HTTP and HTTPS. How many Clusters must becreated?()
A

1

B

2

C

3

D

4


参考答案

参考解析
解析: 暂无解析
更多 “单选题An enterprise has a web application running both HTTP and HTTPS. How many Clusters must becreated?()A 1B 2C 3D 4” 相关考题
考题 An enterprise has a web application running both HTTP and HTTPS. How many Clusters must becreated?() A.1B.2C.3D.4

考题 How many token buckets are needed to support a multi-actions policer that meters conforming, exceedingand violating traffic?()A、1B、2C、3D、4E、5F、6

考题 How many CallManager clusters can an IPCC Express cluster with High Availability communicate with? ()A、1B、2C、Depends upon the number of agentsD、Depends upon the locations of the CallManager clustersE、Depends upon how many nodes are in the CallManager clusters

考题 A retail customer has a database application that is accessed by a large number of people through a web interface from multiple remote locations. Which questions will provide the information necessary to design the best performing storage solution of the following?()A、How many web servers will be connected to the database?B、How many concurrent applications will run against the database?C、How many concurrent users will be accessing the database?D、What are the types of transactions run against the database?

考题 An enterprise has a web application running both HTTP and HTTPS. How many Clusters must becreated?()A、1B、2C、3D、4

考题 You are a systems administrator troubleshooting a problem with accessing a Web server running WindowsServer 2008. Previously, another administrator created and installed a server certificate on the computer.Users report that they are able to connect to the site using HTTP but that they receive a warning in InternetExplorer when trying to connect by HTTPS. You want to enable users to connect using both HTTP andHTTPS. You attempt to access the site by using an instance of Internet Explorer on the server itself, andyou receive the same warning message for HTTPS connections. How can you resolve this issue?()A、Change the site binding for the Web site to enable connections on port 443.B、Change the SSL settings for the Web site to enable the Require SSL option.C、Obtain and install an Internet Certificate on the Web server.D、Export and re import the existing security certificate.

考题 How many simultaneous Telnet sessions does a Cisco router support by default?()A、1B、2C、3D、4E、5F、6

考题 Which of the following describes how many VRM’s would be required in a system with quad Xeon CPU’s?()A、1B、2C、3D、4

考题 How many CCDs are located in a single pass duplex ADF?()A、OneB、2C、3D、4

考题 A system has a mirrored data volume group that has a filesystem /data of 10 logical partitions.  How many physical partitions will the filesystem have?()A、1B、2C、10D、20

考题 A customer has an LPAR with 4 dedicated cores on a POWER7 server with SMT4 enabled. How many logical processors are presented to an application running on this LPAR?()A、4B、8C、16D、32

考题 A customer has a database application that is accessed by a large number of people through a web interface from multiple remote locations.  Which of the following questions will provide the information necessary to design the best performing storage solution?()A、How many web servers will be connected to the database?B、Will the database be run on a Windows solution?C、How many concurrent users will be accessing the database?D、What are the types of transactions run against the database?

考题 A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()A、GetcreationtimeB、InvalidateafterC、GetlastaccessedtimeD、Getmaxinactiveinterval

考题 How many unique area addresses can the ISIS TLV 1 carry?()A、1B、2C、3D、4

考题 How many traffic classes are supported on the ERX Edge Router?()A、1B、2C、4D、8

考题 Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections. How many sessions exist between Host A and Host B?()A、1B、2C、3D、4

考题 How many strict-high priority forwarding classes can be applied to a given interface?()A、1B、2C、3D、4

考题 A metro Ethernet user is connected using a PPP over Ethernet service.How many Layer 2 headers are attached to each IP datagram?()A、1B、2C、3D、4

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.  You need to collect information about which users are connecting to the Web site by using HTTPS.   What should you do?()A、Check the application log on the Web server.B、Use Network Monitor to capture network traffic on the Web server.C、Review the log files created by IIS on the Web server.D、Configure a performance log to capture all Web service counters. Review the performance log data.

考题 You need to recommend a strategy for using managed service accounts on the Web servers.How many managed service accounts should you recommend?()A、1B、2C、3D、5

考题 单选题How many CallManager clusters can an IPCC Express cluster with High Availability communicate with? ()A 1B 2C Depends upon the number of agentsD Depends upon the locations of the CallManager clustersE Depends upon how many nodes are in the CallManager clusters

考题 单选题An enterprise has a web application running both HTTP and HTTPS. How many Clusters must becreated?()A 1B 2C 3D 4

考题 多选题You are a systems administrator responsible for managing a Windows Server 2008 Web Server Currently,there are no Web sites configured on the server. You need to configure the server to host two Web applications: Engineering App and Sales App. Both Web applications must be accessible by using HTTPport 80 without the use of host headers. Also, you must protect against problems in one Web applicationaffecting the performance or reliability of the other Web application. Which two steps should you take tomeet these requirements?()ACreate a single Web site that contains both Web applications.BCreate two Web sites, one for each Web application.CAssign both Web applications to the same application pool.DAssign each Web application to its own application pool.

考题 单选题Company.com has decided to implement virtual hosts in their web server. The current estimate is to create six virtual hosts with unique URL’s and IP addresses. The solution is going to use the IP aliasing faction in HACMP.  How many resource groups are required to support this configuration?()A  1B  2C  6D  7

考题 单选题A customer has an LPAR with 4 dedicated cores on a POWER7 server with SMT4 enabled. How many logical processors are presented to an application running on this LPAR?()A 4B 8C 16D 32

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.  You need to collect information about which users are connecting to the Web site by using HTTPS.   What should you do?()A Check the application log on the Web server.B Use Network Monitor to capture network traffic on the Web server.C Review the log files created by IIS on the Web server.D Configure a performance log to capture all Web service counters. Review the performance log data.

考题 单选题A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()A GetcreationtimeB InvalidateafterC GetlastaccessedtimeD Getmaxinactiveinterval

考题 单选题You are a systems administrator troubleshooting a problem with accessing a Web server running WindowsServer 2008. Previously, another administrator created and installed a server certificate on the computer.Users report that they are able to connect to the site using HTTP but that they receive a warning in InternetExplorer when trying to connect by HTTPS. You want to enable users to connect using both HTTP andHTTPS. You attempt to access the site by using an instance of Internet Explorer on the server itself, andyou receive the same warning message for HTTPS connections. How can you resolve this issue?()A Change the site binding for the Web site to enable connections on port 443.B Change the SSL settings for the Web site to enable the Require SSL option.C Obtain and install an Internet Certificate on the Web server.D Export and re import the existing security certificate.