网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
After the site installation is complete, you should verify the mobility of the VoWLAN device whilewalking the site on an active phone call. Which Cisco WLC or Cisco WCS command is mostbeneficial in determining roaming efficiency?()
A

show {802.11a 802.11b} 2roam statistics 

B

show client roam-history 

C

show client tsm 802.11a/b/g 

D

show client detail 

E

show client ap-roam-history 


参考答案

参考解析
解析: 暂无解析
更多 “单选题After the site installation is complete, you should verify the mobility of the VoWLAN device whilewalking the site on an active phone call. Which Cisco WLC or Cisco WCS command is mostbeneficial in determining roaming efficiency?()A show {802.11a 802.11b} 2roam statistics B show client roam-history C show client tsm 802.11a/b/g  D show client detail E show client ap-roam-history ” 相关考题
考题 You are working on an existing Web site. You need to secure the Web site by redirecting all users to the logon page, Login.aspx. After logging on, users must be sent back to the page that they originally requested.Which code segment should you use?()A.B.C.D.

考题 You should complete in time ______ the teacher has told you to.A、thatB、whatC、whichD、after

考题 You are upgrading a computer from Windows 98 to Windows 2000 Professional. The computer is a 400-Mhz Pentium III, and has 128 MB of RAM and a 10-GB hard disk. You are performing the installation by using the Windows 2000 Professional CD-ROM. After the text mode installation portion is complete, you restart the computer. The BIOS virus checker on your computer indicates you're your computer is infected with a Master Boot Record virus.What should you do before you continue the installation?A.Remove the virus checker in Windows 98.B.Disable the BIOS virus checker and restart the computer.C.Run Fixmbr.Exe from the Windows 2000 Professional CD-ROM.D.Modify the Boot.ini file to include a signature parameter on the ARC path of the system partition.

考题 A customer is purchasing an IBM System Storage DS8700. What is the most important first step for the installation?() A. verify configurationB. conduct pre-install TDAC. complete physical planningD. verify the solution meets requirements

考题 You install Windows Vista on a new computer by using the default settings. You create an administrator account and a standard user account.You log on to the computer as the standard user and attempt to install a new application. You are prompted for user credentials to complete the installation.You need to install the application on the computer.What should you do?()A.AB.BC.CD.D

考题 Your company has an Active Directory domain. All computers are members of the domain. Your networkcontains an internal Web site that uses Integrated Windows Authentication. From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication. You verify that youruser account has permission to access the Web site. You need to ensure that you are automaticallyauthenticated when you connect to the Web site.  What should you do?()A、Create a complex password for your user account.B、Open Credential Manager and modify your credentials.C、Add the URL of the Web site to the Trusted sites zone.D、Add the URL of the Web site to the Local intranet zone.

考题 A customer is purchasing an IBM System Storage DS8700. What is the most important first step for the installation?()A、verify configurationB、conduct pre-install TDAC、complete physical planningD、verify the solution meets requirements

考题 After installing WebSphere Commerce V 5.6 using a quick installation, which of the following should be checked to verify the installation?()A、The installation log filesB、The Commerce tools can be launched and logged into properlyC、User ’wpadmin’ has been createdD、The structure of the installation directoryE、The WebSphere Application Server database schema

考题 The database is running in the ARCHIVELOG mode. It has three redo log groups with one member each. Oneof the redo log groups has become corrupted. You have issued the following command during the recovery of a damaged redo log file:ALTER DATABASE CLEAR UNARCHIVED LOGFILE GROUP 3; Which action should you perform immediately after using this command?()A、You should perform a log switchB、You should make a backup of the databaseC、You should switch the database to the NONARCHIVELOG modeD、You should shut down the database instance and perform a complete database recovery

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single site named KingSite1.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging  solution.Company.com has recently configured the mailbox server as members of a database availability group (DAG) with a public folder database. During the course of the business week you receive instruction from Company.com to create a new Active Directory site and install Exchange server in the site whilst ensuring the public folders are stored on servers in both sites. What should you do?()A、You should consider having clustered continuous replication (CCR) configured on two servers in the new site.You should then have the replication settings for all public folder databases modified.B、You should consider having the standby continuous replication (SCR) configured on a server in the new site.You should then have the Enable-StorageGroupCopy cmdlet run from a server in the new site.C、You should consider having a public folder database created on a server in the new site.You should then have the replication settings for all public folders modified.D、You should consider having a public folder database created on a server in the new site.You should then have the set-DatabaseAvailabilityGroup cmdlet run from a server in the new site.

考题 You are a systems administrator who is attempting to troubleshoot a problem with accessing a Web site ona computer running Windows Server 2008. In the past, users have been able to access the Web site byusing http://hr.contoso.com. However, when they attempt to access the site now, they receive the errormessage "Internet Explorer Cannot Display The Web page." Which of the following steps should you taketo resolve the error?()A、Using Server Manager, add the HTTP Errors server role.B、Using Server Manager, verify that the World Wide Web Publishing Service has been started.C、Verify the configuration of the usersWeb browsers.D、Using Server Manager, add the HTTP Logging server role.

考题 You are a systems administrator responsible for managing a Windows Server 2008 Web server. Recently,your organization set up a new IIS Web site that will be accessed by users outside of your organizations.Consultants should be able to connect to this Web site, using IIS Manager. Your organization’s securitypolicy prevents you from creating domain accounts or local user accounts for these users. You attempt touse the IIS Manager Permissions feature for the Web site. However, when you click Allow User, you areable to select only Windows users.  How can you resolve this problem?()A、Verify that Management Service has been started.B、Reconfigure the file system permissions for the root folder of the Web site.C、Reconfigure Management Service to enable Windows And IIS Manager Credentials.D、Verify the Authentication settings for the Web site.

考题 You are upgrading a computer from Windows 98 to Windows 2000 Professional. The computer is a Pentium III - 400 MHz, has 128 MB of RAM and a 10-GB hard disk.  You are performing the installation using the Windows 2000 Professional CD-ROM. After the text mode installation portion is complete, you restart the computer. The BIOS virus checker on your computer indicates that your computer is infected with a master boot record virus.  What should you do before you continue with the installation? ()A、 Remove the virus checker in Windows 98. B、 Disable the ‘BIOS virus checker’ and restart the computer. C、 Run Fixmbr.Exe from the Windows 20000 Professional CD-ROM. D、 Modify the Boot.ini to include a signature parameter on the ARC path of the system partition. 

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2002 instance. You upgrade this instance to SQL Server 2008. You configure the Agent service to use the LocalSystem account. There is a file named Orderdata on a remote network share. A job accesses this Orderdata file by using a CMDExec step. The job step fails to complete execution after the upgrade. You must make sure that the job can complete execution, so you have to configure the job step. What action should you perform? () A、You should configure a certificate B、You should configure the SQL Server Agent service to use the NetworkService account.C、You should configure the job step to use a proxy account D、You should configure the SQL Server Agent service to use a local Windows account

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server that runs Windows Server 2008 in your company. The serverhas the Web Server (IIS) server role installed. Now you receive an order from the company management.You are asked to activate SSL for the default Web site. What should you do?()A、Use the IIS Manager console to add bindings for the HTTPS protocol to the default Web site.B、You should use the IIS Manager console to obtain and import a server certificate.C、Use the Server Manager console to perform the installation of the Digest Authentication component forthe Web server role.D、You should choose the Generate Key option in the Machine Key dialog box for the default Web site.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You perform the installation of the Web Server (IIS) server role on a serverthat runs Windows Server 2008. Your companys default Web site has an IP address of 10.10.0.1. You adda Web site named HelpDesk. The HelpDesk Web site cannot be started. You need to configure theHelpDesk Web site so that it can be started.  What action should you perform?()A、The HelpDesk Web site should be configured to use a host header.B、The iisreset /enable command should be run on the server.C、The set-location literalpath "d:/HelpDesk_content" HelpDesk ID://2 location port:80 domain:HelpDeskcommand should be run in the Microsoft Windows PowerShell tool on the server.D、The appcmd add site /name: HelpDesk /id:2 /physicalPath: c:/HelpDesk /binding:http/*:80:HelpDeskcommand should be run on the server.

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. On DB1, quite few logged operations are performed. Now according to the requirement of the company CIO, you must validate that the database can be restored to a specific point in time. So what action should you perform to achieve this goal? () A、You should verify that the simple recovery model is used by the database.B、You should verify that the full recovery model is used by the database.C、You should verify that the checksum page verify option is used by the database. D、You should verify that the bulk-logged recovery model is used by the database. 

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You perform the installation of the Web Server (IIS) server role on a serverthat runs Windows Server 2008. Your companys default Web site has an IP address of 10.10.0.1. You adda Web site named HelpDesk. The HelpDesk Web site cannot be started. You need to configure theHelpDesk Web site so that it can be started.  What action should you perform?()A The HelpDesk Web site should be configured to use a host header.B The iisreset /enable command should be run on the server.C The set-location literalpath d:/HelpDesk_content HelpDesk ID://2 location port:80 domain:HelpDeskcommand should be run in the Microsoft Windows PowerShell tool on the server.D The appcmd add site /name: HelpDesk /id:2 /physicalPath: c:/HelpDesk /binding:http/*:80:HelpDeskcommand should be run on the server.

考题 多选题After installing WebSphere Commerce V 5.6 using a quick installation, which of the following should be checked to verify the installation?()AThe installation log filesBThe Commerce tools can be launched and logged into properlyCUser ’wpadmin’ has been createdDThe structure of the installation directoryEThe WebSphere Application Server database schema

考题 单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2002 instance. You upgrade this instance to SQL Server 2008. You configure the Agent service to use the LocalSystem account. There is a file named Orderdata on a remote network share. A job accesses this Orderdata file by using a CMDExec step. The job step fails to complete execution after the upgrade. You must make sure that the job can complete execution, so you have to configure the job step. What action should you perform? ()A You should configure a certificate B You should configure the SQL Server Agent service to use the NetworkService account.C You should configure the job step to use a proxy account D You should configure the SQL Server Agent service to use a local Windows account

考题 单选题You create an unattended installation file named unattend.txt. You plan to use an answer file to perform an automated installation of Windows XP Professional. You need to ensure that a line-of-business application is installed automatically after the installation of Windows XP Professional is complete. What should you do?()A Add a [GuiUnattend] section to unattend.txt.B Include a [GuiRunOnce] section in unattend.txt.C Create an unattend.bat file. Place the file in the root of the installation source files.D Create a registry file named setup.reg. Place the file in the root of the installation source files.

考题 单选题The ADMIN_EMP table has columns EMPNO, ENAME, DEPTNO, and SAL. It has a materialized view EMP_MV with a materialized log and an ENAME_IDX index on the ENAME column. You need to perform an online table redefinition on the ADMIN_EMP table to move it from the TBS1 tablespace to the TBS2 tablespace in the same schema.  What action is required for the dependent objects when you perform online redefinition on the table?()A  The materialized view should have a complete refresh performed after the online table redefinition is completed.B  The materialized view should have a fast refresh performed after the online table redefinition is completed.C  The materialized view,materialized log,and the index should be dropped and re-created after the online table redefinition is complete.D  The materialized view and materialized log should be dropped and all constraints disabled and re-created after the online table redefinition is complete.

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. On DB1, quite few logged operations are performed. Now according to the requirement of the company CIO, you must validate that the database can be restored to a specific point in time. So what action should you perform to achieve this goal? ()A You should verify that the simple recovery model is used by the database.B You should verify that the full recovery model is used by the database.C You should verify that the checksum page verify option is used by the database. D You should verify that the bulk-logged recovery model is used by the database. 

考题 单选题After the recovery is complete, which command should you execute?()A ALTER DATABASE OPEN;B ALTER DATABASE CLEAR LOGFILE;C ALTER DATABASE OPEN RESETLOGS;D ALTER DATABASE OPEN NORESETLOGS;

考题 单选题You plan to upgrade a computer that runs Windows 2000 to Windows XP Professional. You need to verify that the applications currently installed on the computer will run after the upgrade. What should you do before you start the Windows XP Professional installation?()A From the Windows XP Professional source files, run winnt.exe /u. B From the Windows XP Professional source files, run Winnt32 /checkupgradeonly.C Review the Windows Hardware Compatibility List on the Microsoft Web site. D Start the computer from the Windows XP Professional installation CD. When prompted, press F6.

考题 单选题The database is running in the ARCHIVELOG mode. It has three redo log groups with one member each. One of the redo log groups has become corrupted. You have issued the following command during the recovery of a damaged redo log file:   ALTER DATABASE CLEAR UNARCHIVED LOGFILE GROUP 3;   Which action should you perform immediately after using this command?()A  You should perform a log switchB  You should make a backup of the databaseC  You should switch the database to the NONARCHIVELOG modeD  You should shut down the database instance and perform a complete database recovery

考题 多选题You are a network administrator for your company. The design team provides you with the following list of requirements for server disaster recovery:   No more than two sets of tapes can be used to restore to the previous day.  A full backup of each server must be stored off-site.   A full backup of each server that is no more than one week old must be available on-site.  Backups must never run during business hours.   Tapes may be recalled from off-site storage only if the on-site tapes are corrupted or damaged. A full backup of all servers requires approximately 24 hours. Backing up all files that change during one week requires approximately 4 hours. Business hours for the company are Monday through Friday, from 6:00 A.M. to 10:00 P.M.  You need to provide a backup rotation plan that meets the design team’s requirements.   Which two actions should you include in your plan?()APerform a full normal backup for on-site storage on Friday night after business hours. Perform a full copy backup for off-site storage on Saturday night after the Friday backup is complete.BPerform a full normal backup for on-site storage on Friday night after business hours. Perform another full normal backup for off-site storage on Saturday night after the Friday backup is complete.CPerform a full copy backup for on-site storage on Friday night after business hours. Perform a full copy backup for off-site storage on Saturday night after the Friday backup is complete.DPerform differential backups on Sunday, Monday, Tuesday, Wednesday, and Thursday nights after business hours.EPerform incremental backups on Sunday, Monday, Tuesday, Wednesday, and Thursday nights after business hours.FPerform incremental backups on Sunday, Tuesday, and Thursday nights after business hours. Perform differential backups on Monday and Wednesday nights after business hours.