网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()
A
set security zones management interfaces ge-0/0/0.0
B
set zones functional-zone management interfaces ge-0/0/0.0
C
set security zones functional-zone management interfaces ge-0/0/0.0
D
set security zones functional-zone out-of-band interfaces ge-0/0/0.0
参考答案
参考解析
解析:
暂无解析
更多 “单选题You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A set security zones management interfaces ge-0/0/0.0B set zones functional-zone management interfaces ge-0/0/0.0C set security zones functional-zone management interfaces ge-0/0/0.0D set security zones functional-zone out-of-band interfaces ge-0/0/0.0” 相关考题
考题
Your network contains an Active Directory forest.The forest contains three domain trees.Each domain tree contains multiple domains.You have an Active Directory-integrated DNS zone.You install a Web server named Web1. All of the users in the company will use Web1.You need to ensure that the users can access Web1 by using the URL http://web1. You want to achieve this goal by using the minimum amount of administrative effort.What should you do?()A. Configure a GlobalNames zone and add a Host (A) resource record for Web1.B. Create an Alias (CNAME) resource record for Web1 in the forest root domain zone.C. Create a reverse lookup zone and add an Alias (CNAME) resource record for Web1.D. Create a Host Information (HINFO) resource record for Web1 in the forest root domain zone.
考题
You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()
A. set security zones management interfaces ge-0/0/0.0B. set zones functional-zone management interfaces ge-0/0/0.0C. set security zones functional-zone management interfaces ge-0/0/0.0D. set security zones functional-zone out-of-band interfaces ge-0/0/0.0
考题
You are the network administrator for All network servers run Windows Server 2003. All client computers run Windows XP Professional.You create a folder on thet network and share it as TestKingDocs. You want users to be able to read, create, and modify documents that are stored in the shared folder. You also want users to be able to delete the folders and the files that they create.A user reports that another used deleted a folder that she created. You discover that the Everyone group ias assigned the Allow - Full Control NTFS permission for the folder. You remove all assigned permissions for the Everyone group.You need to configure permission for the TestKingDocs shared folder to meet your requirements. You also need to ensure that users cannot delete the folders and files that other users create.Which two actions should you perform ()(Each correct answer presents part of the solution. Choose two.)A. Assign the Authenticated Users group the Allow - Read Execute permission.B. Assign the Anonymous group the Allow - Modify permission.C. Assign the Creator Owner group the Allow - Modify permission.D. Assign the Creator Owner group the Allow - Full Control permission
考题
You want to create a policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in theUntrust zone. How do you do create this policy? ()A、Specify the IP address (172.19.1.1/32) as the destination address in the policy.B、Specify the DNS entry (hostb.example.com.) as the destination address in the policy.C、Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.D、Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.
考题
You are designing DNS implemetation Strategy for the new Infrastruce. Which two actions should you perform?()A、Create a Stub Zone in each domain of the root zone. B、Create a _msdcs subdomain in a new zone on the root domain. C、Replicate the _msdcs subdomain across the roor domain. D、Replicate the _msdcs subdomain to the ForestDNS zone applciation partition. E、Configure a zone transfer of the _msdcs subdomain to secondary zone on all DNS servers in the forest.
考题
You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()A、[edit security policies from-zone HR to-zone HR]B、[edit security zones functional-zone management protocols]C、[edit security zones protocol-zone HR host-inbound-traffic]D、[edit security zones security-zone HR host-inbound-traffic protocols]
考题
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()A、You should assign the network 172.16.0.0/16.B、You should assign the network 172.16.0.0/17.C、You should assign the network 172.16.0.0/18.D、You should assign the network 172.16.0.0/19.E、You should assign the network 172.16.0.0/20.F、You should assign the network 172.16.0.0/22.
考题
If an existing script is uploaded to the CRS, what does it ask?()A、Do you want to debug the script? B、Do you want to refresh the script? C、Do you want to save the application? D、Do you want to return to Script Management?
考题
Regarding zone types, which statement is true?()A、You cannot assign an interface to a functional zone.B、You can specifiy a functional zone in a security policy.C、Security zones must have a scheduler applied.D、You can use a security zone for traffic destined for the device itself.
考题
You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?()A、Use the CREATE DATABASE .. command to create the database with Oracle-managed files. B、Use the Database Configuration Assistant (DBCA) to create the database with Oracle-managed files. C、Use Enterprise Manager to create a new database with the Online Transaction Processing (OLTP) option. D、Use Database Configuration Assistant (DBCA) to create the database with Transaction Processing template. E、Use the CREATE DATABASE .. command to create the database with Automatic Storage Management (ASM) file system.
考题
You work as a database administrator for Certkiller .com. You want to create your database with the automatic undo management feature enable.Which two tasks must you perform to achieve this?()A、Set the UNDO_RETENTION parameter to AUTO.B、Create an initial undo segment in undotablespace.C、Set the UNDO_RETENTION parameter to 900 or moreD、Set the initialization parameter UNDO_MANAGEMENT to AUTOE、Set the UNDO_MANAGEMENT parameter to the name of an undotablespace
考题
You are the network administrator for your company. Your network consists of a single Active Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the Accounting OU. You configure the GPO to disable the display options under the User Configuration section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to all user accounts that are members of the Processors group. You need to prevent the GPO fromapplying to any user account that is a member of the Accountants group. You need to prevent the GPO from applying to any user account that is a member of the Management group, unless the user account is also a member of the Processors group. What should you do?()A、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL of the GPO to assign the users who are in both the Accountants and Management security groups the Allow - Read and the Allow - Apply Group Policy permissions.B、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Create a new security group named Mixed that contains all the user accounts from the Processors group and the specific user accounts from the Management group to which you want the GPO to apply. Modify the DACL of the GPO to assign the Mixed security group the Allow - Read and the Allow - Apply Group Policy permissions.C、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL settings of the GPO to remove the Authenticated Users special group. Modify the DACL settings of the GPO to add the Processors group and assign the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Allow - Apply Group Policy permissions. Modify the DACL settings of the GPO to assign the Management security group the Deny - Read and the Deny - Apply Group Policy permissions.
考题
You have an Exchange Server 2010 organization. Your companys compliance policy states that the following occurs when a user leaves the company:.The user account is disabled .The user account and mailbox are deleted after six months .All e-mail messages in the mailbox are retained for three years You need to recommend a solution to retain the e-mail messages of users who leave the company.The solution must meet the following requirements: .Ensure that a group named Group1 can manage the process .Minimize disk space required to store the mailbox databases What should you recommend?()A、Assign the Mailbox Search management role to Group1, and then create a retention policy.B、Assign the Mailbox Search management role to Group1, and then create a managed folder mailbox policy.C、Assign the Mailbox Import Export management role to Group1, and then configure Personal Archivesfor each mailbox.D、Assign the Mailbox Import Export management role to Group1, and then instruct Group1 to export mailboxes to personal folder (.pst) files.
考题
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The server hosts databases for several mission-critical applications. Microsoft SQL Server Management Studio executes queries and it has some effect. Now you intend to limit the effect by using the Resource Governor. You must make sure that queries initiated through SQL Server Management Studio is less than 20 percent of CPU utilization, besides this, you must make sure that queries initiated by the mission-critical applications can consume 100 percent of CPU utilization when required. So what action should you perform to achieve this goal? ()A、You should alter the default resource pool and set the MAX_CPU_PERCENT option to 80. Then assign this resource pool to the workload group used by SQL Server Management Studio. B、First, you should create a new resource pool and set the MAX_CPU_PERCENT option to 20. Then assign this resource pool to the workload group used by SQL Server Management Studio. C、You should alter the default resource pool and set the MAX_CPU_PERCENT option to 20. Then assign this resource pool to the workload group used by the mission-critical applications. D、First, you should create a new resource pool and set the MAX_CPU_PERCENT option to 80. Then assign this resource pool to the workload group used by the mission-critical applications.
考题
Your network contains an Active Directory domain named contoso.com. The network contains client computers that run either Windows Vista or Windows 7. Active Directory Rights Management Services (AD RMS) is deployed on the network. You create a new AD RMS template that is distributed by using the AD RMS pipeline. The template is updated every month. You need to ensure that all the computers can use the most up-to-date version of the AD RMS template. You want to achieve this goal by using the minimum amount of administrative effort. What should you do()A、Upgrade all of the Windows Vista computers to Windows 7.B、Upgrade all of the Windows Vista computers to Windows Vista Service Pack 2 (SP2).C、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all users by usinD、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all computers by
考题
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a management data warehouse that uses the data collector to collect performance data. You intend to maintain the management data. You want to implement a data collection process. The process can gather and upload data in the management data warehouse on different schedules. What process should you implement?() A、You should create a cached data collectionB、You should create an on-demand non-cached data collection C、You should create a scheduled non-cached data collection D、You should create two different SQL Agent jobs that are scheduled stimultaneously
考题
Your company, A. Datum Corporation, has a single Active Directory domain named intranet.adatum.com. The domain has two domain controllers that run Windows Server 2008 R2 operating system. The domain controllers also run DNS servers. The intranet.adatum.com DNS zone is configured as an Active Directoryintegrated zone with the Dynamic updates setting configured to Secure only. A new corporate security policy requires that the intranet.adatum.com DNS zone must be updated only by domain controllers or member servers. You need to configure the intranet.adatum.com zone to meet the new security policy requirement. Which two actions should you perform()A、Remove the Authenticated Users account from the Security tab of the intranet.adatum.com DNS zone properties.B、Assign the SELF Account Deny on Write permission on the Security tab of the intranet.adatum.com DNS zone properties.C、Assign the server computer accounts the Allow on Write All Properties permission on the Security tab of the intranet.adatum.com DNS zone properties.D、Assign the server computer accounts the Allow on Create All Child Objects permission on the Security tab of the intranet.adatum.com DNS zone properties.
考题
You network consists of an Active Directory forest named contoso.com. All servers run Windows Server 2008. All domain controllers are configured as DNS servers. The contoso.com DNS zone is stored in the ForestDnsZones Active Directory application partition. You have a member server that contains a standard primary DNS zone for dev.contoso.com. You need to ensure that all domain controllers can resolve names for dev.contoso.com. What should you do()A、Create a NS record in the contoso.com zone.B、Create a delegation in the contoso.com zone.C、Create a standard secondary zone on a Global Catalog server.D、Modify the properties of the SOA record in the contoso.com zone.
考题
You have an Exchange 2010 organization.You have an administrative user named Admin1.You need to ensure that Admin1 can move mailboxes in the organization.The solution must assign the minimum amount of permissions to Admin1. What should you do?()A、Create a local move request.B、Create a custom Management role.Assign the role to Admin1.C、Add Admin1 to the Organization Management role group.D、Add Admin1 to the Recipient Management security group.
考题
You are the network administrator for Wingtip Toys. The network consists of a single Active Directory domain named wingtiptoys.com. The Active Directory-integrated DNS zone named wingtiptoys.com is replicated to all domain controllers. Only domain controllers have the DNS service installed.The network management department requires all hosts in the manufacturing division to be registered in the DNS namespace manufacturing.wingtiptoys.com. The manufacturing.wingtiptoys.com namespace does not exist on any of the DNS servers.You need to add support for the manufacturing.wingtiptoys.com namespace to all the existing DNS servers. To reduce administrative overhead, you want to find a solution that will not require reconfiguration if DNS servers are added to the domain in the future. What should you do?()A、Create a subdomain named manufacturing in the wingtiptoys.com zone.B、Create a delegation named manufacturing in the wingtiptoys.com zone.C、Create a stub zone for manufacturing.wingtiptoys.com.D、Create a primary zone for manufacturing.wingtiptoys.com that is not Active Directory-integrated.
考题
多选题You work as a database administrator for Certkiller .com. You want to create your database with the automatic undo management feature enable.Which two tasks must you perform to achieve this?()ASet the UNDO_RETENTION parameter to AUTO.BCreate an initial undo segment in undotablespace.CSet the UNDO_RETENTION parameter to 900 or moreDSet the initialization parameter UNDO_MANAGEMENT to AUTOESet the UNDO_MANAGEMENT parameter to the name of an undotablespace
考题
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The server hosts databases for several mission-critical applications. Microsoft SQL Server Management Studio executes queries and it has some effect. Now you intend to limit the effect by using the Resource Governor. You must make sure that queries initiated through SQL Server Management Studio is less than 20 percent of CPU utilization, besides this, you must make sure that queries initiated by the mission-critical applications can consume 100 percent of CPU utilization when required. So what action should you perform to achieve this goal? ()A
You should alter the default resource pool and set the MAX_CPU_PERCENT option to 80. Then assign this resource pool to the workload group used by SQL Server Management Studio. B
First, you should create a new resource pool and set the MAX_CPU_PERCENT option to 20. Then assign this resource pool to the workload group used by SQL Server Management Studio. C
You should alter the default resource pool and set the MAX_CPU_PERCENT option to 20. Then assign this resource pool to the workload group used by the mission-critical applications. D
First, you should create a new resource pool and set the MAX_CPU_PERCENT option to 80. Then assign this resource pool to the workload group used by the mission-critical applications.
考题
单选题You have an Exchange Server 2010 server that contains a single mailbox database.All users run Microsoft Office Outlook and Outlook Web App.You discover that users cannot restore e-mail messages from the Recover Deleted Items folder.You need to ensure that users can restore e-mail messages from the Recover Deleted Items folder.What should you do?()A
From the Exchange Management Console (EMC), modify the properties of the mailbox databaseB
From the Exchange Management Console (EMC), modify the properties of the Mailbox server objectC
From the Exchange Management Shell, create a management role and then assign the role to all usersD
From the Exchange Management Shell, create a retention policy and then assign the policy to all users
考题
单选题You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()A
[edit security policies from-zone HR to-zone HR]B
[edit security zones functional-zone management protocols]C
[edit security zones protocol-zone HR host-inbound-traffic]D
[edit security zones security-zone HR host-inbound-traffic protocols]
考题
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a management data warehouse that uses the data collector to collect performance data. You intend to maintain the management data. You want to implement a data collection process. The process can gather and upload data in the management data warehouse on different schedules. What process should you implement?()A
You should create a cached data collectionB
You should create an on-demand non-cached data collection C
You should create a scheduled non-cached data collection D
You should create two different SQL Agent jobs that are scheduled stimultaneously
考题
单选题You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A
set security zones management interfaces ge-0/0/0.0B
set zones functional-zone management interfaces ge-0/0/0.0C
set security zones functional-zone management interfaces ge-0/0/0.0D
set security zones functional-zone out-of-band interfaces ge-0/0/0.0
考题
单选题You have a long-running process you want to assign to a specific UNDO segment brought online for that express purpose. You are not using automatic UNDO management. What statement can be used for this task? ()A
ALTER DATABASE B
SET TRANSACTION C
ALTER ROLLBACK SEGMENT D
ALTER TABLE
考题
单选题You want to create a security policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in the Untrust zone. How do you create this policy?()A
Specify the IP address (172.19.1.1/32) as the destination address in the policy.B
Specify the DNS entry (hostb.example.com.) as the destination address in the policy.C
Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.D
Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy
热门标签
最新试卷