网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Company.com has crated a process application monitor for an application that is initiated by a "c" Shell script. The application monitor is not functioning as designed. What could be the issue with eh application monitor?()
- A、 A process monitor cannot monitor an application started by a shell.
- B、 For process monitors to function correctly, they must use the "korn" shell.
- C、 A custom monitor cannot de3termine the status of applications started by shell scripts.
- D、 The process monitor script is not existing with a zero return code after checking the status of the application.
参考答案
更多 “ Company.com has crated a process application monitor for an application that is initiated by a "c" Shell script. The application monitor is not functioning as designed. What could be the issue with eh application monitor?() A、 A process monitor cannot monitor an application started by a shell.B、 For process monitors to function correctly, they must use the "korn" shell.C、 A custom monitor cannot de3termine the status of applications started by shell scripts.D、 The process monitor script is not existing with a zero return code after checking the status of the application.” 相关考题
考题
Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem.Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A. dig company.com nsB. ipconfig/allC. ifconfig-aD. dig company.com mx
考题
Company.com has a cluster with nodes that support "hot swap" adapters. During an upgrade of The network infrastructure,an additional network adapter has been added to the nodes and configured in AIX. What is the next step required to add this adapter to HACMP?() A、 Stop the node.B、 Stop the cluster.C、 Run autodiscovery.D、 Configure the IP adapter.
考题
Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A、dig company.com nsB、ipconfig/allC、ifconfig-aD、dig company.com mx
考题
Company.com has non-IBM fibre attached storage. The storage is connected to a node in the cluster that has multiple adapters and virtual paths. There is a concern about detecting the loss of one of the fibre adapters since there is no indication to the administrator that one has failed. What feature of HACMP can be sued to assist with this issue?() A、 Disk heartbeatB、 Error notificationC、 Event notificationD、 Application monitor
考题
Company.com has several network adapters configured as backup paths using the Virtual IP Addressing and dynamic routing of AIX. A second node needs to be added to the environment to crate a cluster. What considerations must be addressed during the planning session?() A、 HACMP supports most types of networks,including Virtual IP Addressing by AIX.B、 If HACMP IP aliasing is used,the devices may be the Virtual IP type used by AIX.C、 Using the AIX Virtual IP Addressing scheme HACMP can provide near fault tolerant availability of the network.D、 The AIX Virtual Addressing mechanism is not supported by HACMP,but a similar configuration can be created in HACMP.
考题
Company.com has decided to implement the "Fast Disk Takeover" and "Disk Heart Beat" features of HACMP. What IBM distribution media will be required for a default installation?() A、 AIX media onlyB、 HACMP media onlyC、 AIX and HACMP mediaD、 HACMP and Concurent Resource Manager media
考题
Company.com has purchased a 2-way p5-520 and would like to create three Micro-Partitions on the server. Which feature of Advanced POWER Virtualization would allow them to create the desired number of partitions?()A、Virtual EthernetB、Shared Ethernet AdapterC、Dedicated ProcessorsD、Shared Processor Pool
考题
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.
考题
Company.com has employed you as their exchange administrator.The Company.com network contains an exchange server 2010 organization.the Company.com organization contains a hub transport server as well as an edge transport server.the hub transport server is named -ex01 and the edge transport server is named -ex02.-ex02 is used to send smtp mail to the internet.a new Company.com directive requires that a disclaimer is added to all internal and external mail messages sent by employees. What should you do?()A、your best option would be to have the properties of a send connector modified from -ex02.B、your best option would be to have a transport rule created from -ex01.C、your best option would be to have a transport rule created from -ex02.D、your best option would be to have the properties of a send connector modified from -ex01.
考题
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()A、The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.B、The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.C、The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.D、The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.
考题
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.
考题
Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.
考题
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()A、You should consider changing the EWS virtual directory.B、You should consider changing the Federation Trust.C、You should consider changing the Organizational Relationship.D、You should consider changing the default sharing policy.
考题
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A Company.com employee named Mia Hamm has sent a message to one of the other users at Company.com.You need to make sure that the message was delivered.What should you do?()A
You should run the Office Diagnostics in the Microsoft Outlook.B
You should run the Get-MessageTrackingReport cmd.C
You should choose the options in the Outlook Web App.D
You should run the Search- Message Tracking Report cmdlet.
考题
单选题Company.com has decided to implement the "Fast Disk Takeover" and "Disk Heart Beat" features of HACMP. What IBM distribution media will be required for a default installation?()A
AIX media onlyB
HACMP media onlyC
AIX and HACMP mediaD
HACMP and Concurent Resource Manager media
考题
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A
The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B
The best option is to set up a content filtering feature to comply with the Company.com security policy.C
The best option is to create a transport rule to comply with the Company.com security policy.D
The best option is to set up a sender reputation feature to comply with the Company.com security policy.
考题
单选题Company.com has several network adapters configured as backup paths using the Virtual IP Addressing and dynamic routing of AIX. A second node needs to be added to the environment to crate a cluster. What considerations must be addressed during the planning session?()A
HACMP supports most types of networks,including Virtual IP Addressing by AIX.B
If HACMP IP aliasing is used,the devices may be the Virtual IP type used by AIX.C
Using the AIX Virtual IP Addressing scheme HACMP can provide near fault tolerant availability of the network.D
The AIX Virtual Addressing mechanism is not supported by HACMP,but a similar configuration can be created in HACMP.
考题
单选题A cargo of refrigerated fruit is packed in crates with transverse members dividing the crate in two equal parts. Which statement is TRUE?()A
The cargo block should be tightly packed if the cargo is suitably chilled upon delivery to the vesselB
Both sides of each crate must be checked for the temperature and the appearance of the fruitC
The cargo block should be stowed with air channels built throughout the stowed cargoD
The crates should NEVER be stowed brick fashion
考题
单选题Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. Company.com has acquired a new Exchange Server 2010 server and moved the mailboxes to it.However, the employees find a problem to access their mailboxes. What should you do?()A
You should consider using Outlook Anywhere and configure it.B
You should consider creating and set up a Client Access array.C
You should consider renaming the OWA virtual directory to Exchange.D
You should consider the Switchover Server option.
考题
单选题Company.com has non-IBM fibre attached storage. The storage is connected to a node in the cluster that has multiple adapters and virtual paths. There is a concern about detecting the loss of one of the fibre adapters since there is no indication to the administrator that one has failed. What feature of HACMP can be sued to assist with this issue?()A
Disk heartbeatB
Error notificationC
Event notificationD
Application monitor
考题
单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com. What should you do?()A
You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.B
You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.C
You should consider having mail enabled for KingPublic.D
You should consider having the author role assigned to Anonymous.
考题
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to circumstances, Company.com has acquired a new Internet domain name.This results in that the employees cannot receive e-mail that is sent to the new Internet domain name.The new Internet domain name is set up as an e-mail address suffix.The Company.com employees need to receive e-mail sent from the new Internet domain name. What should you do?()A
You should consider using an External Relay Accepted Domain.B
You should consider using an Authoritative Accepted Domain.C
You should consider using a remote domain.D
You should consider using a new Receive connector.
考题
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com contains an exchange server 2010 server named -sr15 that has the following roles installed: client access, hub transport, and mailbox server.the Company.com also has a windows server 2008 r2 certification authority (ca).Company.com has merged with another company named Courseware Publishers that contains an internal root C A.You have received instructions from the CIO to install a certificate to create the federated trust as well as to reduce the cost. What should you do?()A
You need to set up a computer certificate request on -sr15; thereafter you should submit the request to a third-party trusted caB
You need to use -sr15 and generate a self-signed certificateC
You need to use request a computer certificate from the Company.com.com ca from -sr15D
You need to set up a computer certificate request on -sr15; thereafter you should submit the request to courseware publishers ca
考题
单选题Company.com has a large network control center with an SNMP based monitoring tool running on a non-IBM Unix like system. It has become desirable for the network control center to monitor the activity of an HACMP cluster. What feature in HACMP can assist with this?()A
hacmp.myB
hacmp.mibC
hacmp.defsD
hacmp.snmp
热门标签
最新试卷