网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()
A
Transfer Object
B
Front Controller
C
Service Locator
D
Intercepting Filter
E
Business Delegate
F
Model-View-Controller
参考答案
参考解析
解析:
暂无解析
更多 “单选题The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()A Transfer ObjectB Front ControllerC Service LocatorD Intercepting FilterE Business DelegateF Model-View-Controller” 相关考题
考题
It has been decided that to be lawful merchandise, goods loaded under the charter-party must not only be such as can be loaded without breach of the law in force at the port of loading, but must also be such as can lawfully be carried and discharged at the ________ .A.port of dischargeB.port of sailingC.port of flagD.port of departure
考题
___________where the sound laboratory9A.Has it decided; will build
B.Will it be decided; will be built
C.Has it been decided; will be built
D.Is it decided; is built
考题
The voice VLAN feature has been enabled on a new Company Catalyst switch port. What is the effect of this? ()A、The CoS is trusted for 802.1P or 802.1Q tagged traffic.B、PortFast is disabled on the port.C、Port Security is automatically enabled on a voice VLAN port.D、Untagged traffic is sent according to the default CoS priority of the port.E、None of the other alternatives apply
考题
EJB分为()三种类型A、会话bean、实体bean、Web serviceB、会话bean、实体bean、消息驱动beanC、Jsp、servlet、jsfD、实现类、Home接口类、Object接口类
考题
A Company.com developer is designing the presentation tier for a web application that relies on a complex session bean. The session bean is still being developed and the APIs for are NOT finalized. Any changes to the session bean API directly impacts the development of the presentation tier. Which design pattern provides a means to manage the uncertainty in the API?()A、 View HelperB、 Front ControllerC、 Composite ViewD、 Intercepting FilterE、 Business DelegateF、 Chain of Responsibility
考题
Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system. Which pattern can the developer use to solve this problem?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Business Delegate
考题
Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall
考题
Company.com has decided to implement virtual hosts in their web server. The current estimate is to create six virtual hosts with unique URL’s and IP addresses. The solution is going to use the IP aliasing faction in HACMP. How many resource groups are required to support this configuration?()A、 1B、 2C、 6D、 7
考题
The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()A、Transfer ObjectB、Front ControllerC、Service LocatorD、Intercepting FilterE、Business DelegateF、Model-View-Controller
考题
Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
考题
Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.
考题
单选题EJB分为()三种类型A
会话bean、实体bean、Web serviceB
会话bean、实体bean、消息驱动beanC
Jsp、servlet、jsfD
实现类、Home接口类、Object接口类
考题
单选题Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance. Which J2EE pattern can help with this performance issue?()A
Transfer ObjectB
Service LocatorC
Intercepting FilterD
Model-View-Controller
考题
单选题A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()A
Update the antivirus applicationB
Install critical update security patchesC
Adjust the software firewall settingsD
Replace the current antivirus program
考题
单选题The company has decided to sponsor the exhibition, ______ helps to promote its image.A
thatB
whoC
whatD
which
考题
单选题Recently traffic to the company web server has more than doubled, resulting in slower response times from the server. An administrator has decided to add a second, identical 10/100/1000 NIC to the server. The server is presently connected to a 10/100/1000 switch, with four open ports on the switch. Which of the following is the BEST solution to speed up web traffic?()A
Free up more ports on the switchB
Enable server load balancingC
Move the second network adapter to a new subnetD
Enable network adapter teaming
考题
单选题The voice VLAN feature has been enabled on a new Company Catalyst switch port. What is the effect of this? ()A
The CoS is trusted for 802.1P or 802.1Q tagged traffic.B
PortFast is disabled on the port.C
Port Security is automatically enabled on a voice VLAN port.D
Untagged traffic is sent according to the default CoS priority of the port.E
None of the other alternatives apply
考题
多选题Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()ALog on to one of the cluster nodes and run the wlbs disable all command.BOpen the Network Load Balancing Clusters console and delete the default port rules.COpen the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.DOpen the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
考题
单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system. Which pattern can the developer use to solve this problem?()A
Transfer ObjectB
Service LocatorC
Intercepting FilterD
Business Delegate
考题
多选题The Company administrator has issue the "show vlan id 5" command. What will this command display? ()APorts in VLAN 5BUtilizationCVLAN information on port 0/5DFiltersEMTU and type
考题
单选题Company.com has decided to implement virtual hosts in their web server. The current estimate is to create six virtual hosts with unique URL’s and IP addresses. The solution is going to use the IP aliasing faction in HACMP. How many resource groups are required to support this configuration?()A
1B
2C
6D
7
考题
单选题The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()A
Transfer ObjectB
Front ControllerC
Service LocatorD
Intercepting FilterE
Business DelegateF
Model-View-Controller
考题
单选题Companycom wants to reduce the number of copper, Ethernet adapters on their 4 way p5 570 running AIX 5.3 used in each of the four LPARs. Companycom has one database LPAR, two application LPARs, and one web LPAR. Only the Web LPAR needs to communicate with the outside world. What is the minimum number of Ethernet adapters that should be provided to ensure redundancy and no single point of failure?()A
One single port Ethernet adapterB
Four dual port Ethernet adaptersC
Two single port Ethernet adaptersD
Eight single port Ethernet adapters
考题
单选题A Company.com developer is designing the presentation tier for a web application that relies on a complex session bean. The session bean is still being developed and the APIs for are NOT finalized. Any changes to the session bean API directly impacts the development of the presentation tier. Which design pattern provides a means to manage the uncertainty in the API?()A
View HelperB
Front ControllerC
Composite ViewD
Intercepting FilterE
Business DelegateF
Chain of Responsibility
考题
单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly,the consultant created several dozen JSP pages that directly communicate with the database. The Squeakybusiness team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the newsystem. Which pattern can the developer use to solve this problem?()A
Transfer ObjectB
Service LocatorC
Intercepting FilterD
Business Delegate
考题
单选题A company needs to connect seven of their Windows-based servers to a DS4000 storage server. The DS4000 only has two host-side connections, and each server has two HBAs. Which of the following is the lowest cost solution to provide no single points of failure?()A
Implement two 8-port switches design with ISLsB
Implement two 16-port switches design with ISLsC
Implement two 8-port switches design without ISLsD
Implement two 16-port switches design without ISLs
考题
多选题Your company named Contoso, Ltd. has a Network Load Balancing cluster named nlb.contoso.com. The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenly distributes HTTP traffic between both hosts. You need to configure WEB2 to handle all HTTPS traffic for nlb.contoso.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2. Which two actions should you perform?()AIn the properties for WEB2, change the Handling priority option for the TCP 443 port rule to the value of1.BIn the properties for WEB1, change the Handling priority option for the TCP 443 port rule to the value of 0.CIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering mode option set to Single host.DIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering mode option set to Multiple host and the Affinity option set to the value of Single.
考题
多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. Your company has a Network Load Balancing cluster named nlb.wiikigo.com.The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenlydistributes HTTP traffic between both hosts. WEB2 needs to be configured to handle all HTTPS traffic fornlb.wiikigo.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2. What should you do to achieve this?()AIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Single host.BIn the properties for WEB2, the Handling priority option for the TCP 443 port rule should be changed tothe value of 1.CIn the properties for WEB1, the Handling priority option for the TCP 443 port rule should be changed tothe value of 0.DIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Multiple host and the Affinity option set to the value of Single.
热门标签
最新试卷