网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You have configured the system to purge mailboxes after 8 days of being deleted. You need to receive a notification when the mailboxes are purged. What should you do?()
A

Start a data collector

B

Start an event viewer subscription

C

Add a task to the application event log

D

Modify the properties of the mailbox database


参考答案

参考解析
解析: 暂无解析
更多 “单选题You have configured the system to purge mailboxes after 8 days of being deleted. You need to receive a notification when the mailboxes are purged. What should you do?()A Start a data collectorB Start an event viewer subscriptionC Add a task to the application event logD Modify the properties of the mailbox database” 相关考题
考题 Don’t you have to first have enough food and clothing before you ____ after your dreams? A.ignoreB.chaseC.renewD.suppose

考题 Ezonexam users have noticed extremely slow network performance, intermittent connectivity, and connection losses. After entering the "show interfaces" command, you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that there is evidence of late collisions. What could be the cause of this problem?A. Duplex mismatchB. A routing loopC. Trunking mode mismatchD. Improperly configured root bridgeE. Improperly configured static VLANF. None of the above

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server is configured as shown in the following table.You need to ensure that you can restore the server and all its data in the event of a complete system failure.You perform an Automated System Recovery (ASR) backup.What else should you backup? ()A.volume CB.volume DC.volume ED.the system state

考题 You work as a network engineer at TestKing.com. TestKing users have noticed extremely slow network performance, intermittent connectivity, and connection loss. After entering the show interfaces command, you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that there is evidence of late collisions. What could be the cause of this problem?()A. duplex mismatchB. a routing loopC. trunking mode mismatchD. improperly configured root bridgeE. improperly configured static VLAN

考题 Your database is running in ARCHIVELOG mode. The SCOTT.EMP table belongs to the DATA1 tablespace. The junior DBA erroneously runs a script that executes the following statement:   SQL DROP TABLE SCOTT.EMP PURGE;   After one hour, you are performing the user managed incomplete recovery. Which datafiles will you restore from the last full backup?()A、 the datafiles associated with the SYSTEM tablespaceB、 the datafiles associated to the DATA1 tablespaceC、 the datafiles associated to the SYSTEM and DATA1 tablespacesD、 all the datafiles in the database

考题 Why should you sell IBM memory to your customer at the time of the system sale? ()A、IBM Memory is tested and supported in IBM systems, plus it automatically assumes the balance of system warranty. It is much more difficult to sell memory upgrades to customers after the server has been purchased.B、IBM memory is no different to third party memory, so memory can be sold at any time after the sale with ease.C、IBM memory needs a ServicePac to be sold for warranty to be implemented, so can only be sold at time of system sale.D、You should sell IBM memory at the time of system sale, as Servers can not be expanded once configured in SSCT.

考题 You work as a database administrator for Certkiller .com. In the Certkiller PRODUCTION database you have granted RESUMABLE system privilege to the CONNECT role.Resumablespace operation has been enabled for all user session. You want users NOT to be aware of any kind of space-related problems while performing transactions. Instead, you want the problem to be resolved by a database trigger automatically. Which combination of triggering time and event would you use to achieve this objective?()A、AFTER CREATEB、AFTER SUSPENDC、BEFORE CREATED、AFTER TRUNCATEE、BEFORE SUSPENDF、AFTER INSERT OR DELETE OR DELETEG、BEFORE INSERT OR DELETE OR DELETE

考题 Your database is running in the ARCHIVELOG mode. You have configured RMAN for backup and recovery operations. You execute the following command from the RMAN prompt:   RMAN CONFIGURE CONTROLFILE AUTOBACKUP ON;   After executing this command, in which of the following cases will RMAN make an auto-backup of the control file? ()A、 when you change the name of a datafileB、 when you drop a table from the databaseC、 when you take an export of the databaseD、 when you back up the database using OS utilitiesE、 when you issue an ALTER SYSTEM SWITCH LOGFILE statementF、 when you issue a BACKUP command from inside the RMAN run block

考题 You have configured OMF in your database. You enabled the ALTER DATABASE ENABLE BLOCK CHANGE TRACKING; statement to enable the block change tracking feature.  What information will be written in the change tracking file?()A、 the system change numberB、 the locations of the redo log filesC、 the locations of the datafilesD、 the physical location of all the database changes

考题 Your Network contains a single AD Site.You install 10 new Exchange Server 2010 CAS.All servers are configured to use a wildcard certificate.Users connect to their Mailboxes by using Windows Mobile 6.5 devices.All devices are configured to connect to cas.contoso.com.You need to ensure that users can connect to their Mailboxes by using mail.contoso.com. Which cmdlet should you run?()A、set-activesyncdeviceaccessruleB、set-activesyncmailboxpolicyC、set-activesyncorganizationsettingD、set-activesyncvirtualdirectory

考题 You have an Exchange Server 2007 organization.All users on your network run Microsoft Office Outlook 2007 to access their mailboxes.Outlook 2007 is configured to connect by using RPC over HTTP and Auto discover. You perform a Typical installation of Exchange Server 2010 on a new server, and then move mailboxes to the new server.Users now report that they cannot access their mailboxes.You need to ensure that all users can access their mailboxes. What should you do from the new server?()A、Select the Switchover Server option.B、Enable and configure Outlook Anywhere.C、Create and configure a Client Access array.D、Rename the OWA virtual directory to Exchange.

考题 You work as an Exchange Administrator for Xxx .The company has a Windows 2008 Active  Directorybased network.You have just finished deploying an Exchange 2010 server and migrating all mailboxes including resource mailboxes from Exchange Server 2003. After the migration from the Exchange 2003 server was complete, you noticed that the resource mailboxes were showing up as a shared mailbox and not a resource mailbox.You realize that you need to convert them to Exchange 2010 resource mailboxes.While logged into the Exchange Management Console, you do not see any option to convert a mailbox. What should you use to convert this Exchange 2010 shared mailbox to an Exchange 2010 resource mailbox?()A、Exchange Troubleshooting AssistantB、Exchange System ManagerC、Exchange Management ShellD、Command prompt

考题 You have a computer that runs Windows 7. Windows Backup is configured to store backups on an externaldrive. You create a new NTFS volume on the computer. You need to configure Windows Backup to includethe files on the new volume as part of regularly scheduled backups.  What should you do?()A、From Backup and Restore, select Change settings.B、From Backup and Restore, select Create a system image.C、From the System Protection tab, create a restore point.D、From the System Protection tab, enable system protection for the new volume.

考题 You have an Exchange Server 2010 organization.  The network contains two Mailbox servers that are configured in a database availability group (DAG). You plan to implement a disaster recovery solution.  You need to recommend a solution that ensures that the active mailbox database copy is unaffected bythe backup process.  You want to achieve this goal while minimizing costs.  What should you recommend?()A、Windows Server BackupB、Network Attached Storage (NAS) snapshotsC、Microsoft System Center Configuration ManagerD、Microsoft System Center Data Protection Manager

考题 Bob is going on a trip with his laptop configured with Windows 2000 Professional. He is concerned that he will run out of battery life and his system will crash. He asks you to configure the power savings feature so that when he is not using his laptop, it will save his work and power down. You go into Advanced Power Management options. What should you do next?()A、Set the system to hibernation mode to 15 minutes.B、Set the system to snooze mode after 15 minutes.C、Max BatteryD、PresentationE、Minimal Power Management

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network contains a Mailbox server named XXX-EX10.What action must you take to have mailboxes retained for 8 weeks after deletion?()A、You must create a legal hold.B、You must change the mailbox database properties.C、You must create Transport Protection Rules.D、You must create Personal archives.

考题 You work as an Exchange Administrator for Xxx Inc.The company has a Windows 2008 Active Directorybased network.You have recently transitioned the messaging organization to Exchange 2010 from Exchange Server 2007 SP2.You need to move the mailboxes from the old messaging organization to the new messaging organization.What cautions and prerequisites will you take when moving mailboxes?()A、The Move-Mailbox cmdlets in Exchange 2007 cannot be used to move mailboxes from Exchange 2007 to Exchange 2010.B、The mailboxes from Exchange 2007 SP1 or earlier cannot be moved.The source mailbox server must be Exchange 2007 SP2 or later.C、The antivirus and anti-spam updates have to be disabled prior to moving the mailboxes.D、The Exchange System Manager or Active Directory Users and Computer consoles cannot be used to move mailboxes from Exchange 2003 to Exchange 2010.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You have a Terminal Services farm that contains several Terminal Servers. One of the Terminal Serversshould be configured as a dedicated redirector. After you configure the appropriate DNS records,what action should you perform next?()A The server should be configured to deny new user logons from Terminal Services Configuration.B The licensing mode should be set to per user from Terminal Services Configuration.C The licensing mode should be set to per device from Terminal Services Configuration.D The relative weight of the server should be changed to 50 from Terminal Services Configuration.

考题 多选题Youe just configured the network interface on You?e just configured the network interface on systemA and the following information is displayed pertaining to systemA’s network interface: You have been instructed to change the name of this system to systemB.  Which four files need to be modified to change the name of this system from systemA to systemB? ()A/etc/nodenameB/etc/hostname.rtls0C/etc/hostnameD/etc/inet/hostsE/etc/domainnameF/etc/inet/ipnodesG/etc/inetd.conf

考题 单选题Your database is running in ARCHIVELOG mode. The SCOTT.EMP table belongs to the DATA1 tablespace. The junior DBA erroneously runs a script that executes the following statement:   SQL DROP TABLE SCOTT.EMP PURGE;   After one hour, you are performing the user managed incomplete recovery. Which datafiles will you restore from the last full backup?()A  the datafiles associated with the SYSTEM tablespaceB  the datafiles associated to the DATA1 tablespaceC  the datafiles associated to the SYSTEM and DATA1 tablespacesD  all the datafiles in the database

考题 单选题If fuel tank levels are found to have increased after a grounding, you should suspect ().A a damaged pneumercator lineB a puncture, crack, or hole in the skin of the vesselC improper record keeping of fuel transfer activitiesD contamination of the contaminated steam supply system

考题 单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network contains a Mailbox server named XXX-EX10.What action must you take to have mailboxes retained for 8 weeks after deletion?()A You must create a legal hold.B You must change the mailbox database properties.C You must create Transport Protection Rules.D You must create Personal archives.

考题 单选题How can you verify that you have correctly configured SSH access to your Junos device?()A user@router# show system servicesB user@router show configuration servicesC user@router# show configuration system servicesD user@router# show system login

考题 单选题You work as a network engineer at TestKing.com. TestKing users have noticed extremely slow network performance, intermittent connectivity, and connection loss. After entering the show interfaces command, you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that there is evidence of late collisions. What could be the cause of this problem?()A duplex mismatchB a routing loopC trunking mode mismatchD improperly configured root bridgeE improperly configured static VLAN

考题 单选题In your database, the users SYS and SYSTEM have been assigned the profiles, ADMIN_PROF1 and ADMIN_PROF2, respectively. The rest of the database administrators are assigned the profile ADMIN_PROF3. You create a profile, USER_PROF, and assign it to the application user, Adams. After a week you realize that the profile is no longer required and you decide to drop it. What will Adam’s profile be after the USER_PROF profile has been dropped?()A no profilesB the default profileC same as the profile of SYS userD same as the profile of SYSTEM user

考题 单选题Your Network contains a single AD Site.You install 10 new Exchange Server 2010 CAS.All servers are configured to use a wildcard certificate.Users connect to their Mailboxes by using Windows Mobile 6.5 devices.All devices are configured to connect to cas.contoso.com.You need to ensure that users can connect to their Mailboxes by using mail.contoso.com. Which cmdlet should you run?()A set-activesyncdeviceaccessruleB set-activesyncmailboxpolicyC set-activesyncorganizationsettingD set-activesyncvirtualdirectory

考题 多选题Your database is running in the ARCHIVELOG mode. You have configured RMAN for backup and recovery operations. You execute the following command from the RMAN prompt:   RMAN CONFIGURE CONTROLFILE AUTOBACKUP ON;   After executing this command, in which of the following cases will RMAN make an auto-backup of the control file? ()Awhen you change the name of a datafileBwhen you drop a table from the databaseCwhen you take an export of the databaseDwhen you back up the database using OS utilitiesEwhen you issue an ALTER SYSTEM SWITCH LOGFILE statementFwhen you issue a BACKUP command from inside the RMAN run block