网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
Which of the following technologies can be used to remotely gain access to a server console?()
A
PS/2 KVM
B
LDAP
C
VNC
D
Remote desktop
E
VPN
参考答案
参考解析
解析:
暂无解析
更多 “多选题Which of the following technologies can be used to remotely gain access to a server console?()APS/2 KVMBLDAPCVNCDRemote desktopEVPN” 相关考题
考题
Which of the following Windows Server 2003 technologies can help with making backups of open files?()
A. Differential backupB. SnapshotC. VSSD. Incremental backup
考题
Which of the following technologies can save server space and cooling requirements?()A、Energy star ratingsB、Active solar panelsC、Network storage arrayD、Blade servers
考题
Which of the following can be used to manage a servers BIOS remotely? ()A、 Remote desktop softwareB、 Dedicated management cardC、 Telnet sessionD、 IP KVME、 VPN
考题
Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN
考题
Which of the following commands can be used to gain root privileges and profile without initially logging in as root?()A、 su B、 su root C、 su - root D、 su -c "root"
考题
Which of the following products and utilities can be used to update all encrypted data as well as the merchant key in a WebSphere Commerce database for a given instance?()A、The Database Update Tool found in Configuration ManagerB、The LDAP ServerC、The WebSphere Application Server Administrative ConsoleD、The WebSphere Commerce SecurityUpdate CommandE、The WebSphere Commerce Administration Console
考题
Which of the following is a best practice that can be used to ensure consistency when building systems?()A、Server build checklistB、Server baselining toolsC、Architecture diagramsD、Hardware compatibility list
考题
An administrator does not have console access to a Windows Server. Which of the following command line utilities should the administrator use to reboot the system remotely?()A、rebootB、pkillC、shutdownD、kill
考题
Which of the following Windows Server 2003 technologies can help with making backups of open files?()A、Differential backupB、SnapshotC、VSSD、Incremental backup
考题
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning
考题
User 1 has a printer connected to a PC. User 2 is requesting the ability to print large documents to that printer. Which of the following is the BEST way for User 2 to gain access to the printer?()A、Use infrared to print remotely.B、Unplug the printer and install it on the new pc.C、Share the Printer in Windows.D、Update universal drivers to allow printing.
考题
An administrator needs to configure a server to restrict mail traffic to an application server for security reasons. Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking
考题
Which tasks can NOT be performed at the management console if the Client ID is being used?()A、Reboot the HMCB、Access the storage managerC、Shut down the consoleD、Access the storage system diagnostics
考题
Which of the following can be used to re-deploy a system configuration in a disaster recovery scenario?()A、System planB、System profileC、Critical console dataD、VIO server partition profile
考题
A system administrator is deploying a new POWER5 server. The application requires AIX 5L V5.2. Which of the following virtualization technologies can be used?()A、DLPARB、Micro-PartitioningC、Virtual StorageD、Virtual Ethernet
考题
Which of the following methods can be used to detect block corruption?() A、 ANALYZE operationsB、 dbvC、 SQL queries that access the potentially corrupt blockD、 RMANE、 All of the above
考题
单选题A system administrator has a server that is performing poorly. The vmstat command identifies that high CPU usage is the problem. Which of the following commands can be used to identify the eight most active processes running on the server?()A
ps -ef -t8B
sar -u -p 8C
vmstat -t 8D
topas -p8 -n0 -d0
考题
单选题Which of the following Windows Server 2003 technologies can help with making backups of open files?()A
Differential backupB
SnapshotC
VSSD
Incremental backup
考题
多选题Which of the following are storage technologies that can be hot swappable?()ASCSIBSASCATADIDEECMOS
考题
多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP
考题
多选题Which of the following can be used to manage a servers BIOS remotely? ()ARemote desktop softwareBDedicated management cardCTelnet sessionDIP KVMEVPN
考题
单选题Which of the following is a best practice that can be used to ensure consistency when building systems?()A
Server build checklistB
Server baselining toolsC
Architecture diagramsD
Hardware compatibility list
考题
多选题Which of the following interfaces in Windows server can be used to add a new volume for storage?()AComputer ManagementBSystem PropertiesCDevice ManagerDDisk ManagementEMy Computer
考题
多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.
考题
单选题Which of the following products and utilities can be used to update all encrypted data as well as the merchant key in a WebSphere Commerce database for a given instance?()A
The Database Update Tool found in Configuration ManagerB
The LDAP ServerC
The WebSphere Application Server Administrative ConsoleD
The WebSphere Commerce SecurityUpdate CommandE
The WebSphere Commerce Administration Console
考题
多选题When executing the massload command to load catalog data into a WebSphere Commerce database on a remote DB2 server,which of the following can be used as valid values for the -method command line parameter?()AcreateBimportCloadDsqlimportEupdate
考题
多选题Which of the following technologies can be used to remotely gain access to a server console?()APS/2 KVMBLDAPCVNCDRemote desktopEVPN
考题
单选题Which of the following commands can be used to gain root privileges and profile without initially logging in as root?()A
su B
su root C
su - root D
su -c root
热门标签
最新试卷