网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which of the following would allow a company to conserve energy and still provide a functional service to its employees?()
- A、Configure all workstations with higher RPM fans
- B、Use CRTs instead of LCD monitors
- C、Use NAS to reduce the number of file servers
- D、Configure all printers to print on single-side with low resolution
参考答案
更多 “Which of the following would allow a company to conserve energy and still provide a functional service to its employees?()A、Configure all workstations with higher RPM fansB、Use CRTs instead of LCD monitorsC、Use NAS to reduce the number of file serversD、Configure all printers to print on single-side with low resolution” 相关考题
考题
Given the following router output,which configuration file will the router use at its next reload?()
A.configB.clientqos.cnfC.startup-configD.running-configuration
考题
Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?()
A. Event ViewerB. System File CheckerC. MSCONFIGD. Task Manager
考题
Which of the following is a reason to implement a local KVM instead of an IP KVM?()
A. Local KVM supports all operating systems.B. Local KVMs allow multiple user access.C. Higher number of ports on a local KVM.D. Local KVMs are more secure.
考题
A corporation plans to replace older office PCs with energy efficient personal computers in their 24 hour help desk department. Which of the following would be the BEST choice?()A、Tablet notebooks with LCD monitorsB、Thin clients with LCD monitorsC、Thin clients with CRT monitorsD、Notebook computers with LCD monitors
考题
lisa is writing a formula to determine the number of elements in a list. she wants to ensure that a value is returned, even if the value her function is evaluating turns out to be a null string . which one of the following can she so to accomplish this ?()A、use a defaule formula of 1 B、use @elements and add 1 to the total C、use the @count function instead of @elements D、use @texttotime to ensure that all strings arte converted to date-time values
考题
You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()A、Require employees to access e-mail only over connections that use SSLB、Place Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the storesC、Use the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mailD、Use the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them
考题
You are the network administrator for Company. Five of Company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity. You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building. You need to configure the portable computers to always allow the employees to choose which network environment to use when they start their portable computers. What should you do?()A、Configure three different hardware profiles on each portable computer.B、Configure a single hardware profile and rename it to Universal Profile.C、Configure the wireless PC Card network adapters to use Automatic Private IP Addressing (APIPA) when they cannot detect a DHCP server.D、Instruct each employee to unplug the wireless PC Card network adapter whenever the portable computer is attached to a network-enabled docking station.E、Configure the hardware profiles selection to wait until a hardware profile is selected.F、Configure the hardware profiles selection to select the first profile listed and set the wait time to zero seconds.G、 Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.
考题
Attaching to a NAS storage system through redundant NICs will provide which of the following?()A、High availability and failoverB、File sharing on the storage systemC、Better bandwidth through NIC Teaming on attached serversD、Greater number of LUNS available on the same storage system
考题
Which of the following is an appropriate reason for adjusting the SNMP thresholds?()A、To eliminate excessive alertsB、To increase the number of threadsC、To monitor use of VPN trafficD、To allow more email to come through
考题
A companys computer policy dictates that all users workstations must use the companys corporate web page as their default home page. Which of the following methods should an administrator use to BEST comply with this policy?()A、 Configure a logon script to set the homepage at logon.B、 Set the default homepage to the corporate website in Group Policy.C、 Manually configure the homepage on all workstations and setup trace logs to ensure compliance.D、 Set the default homepage to the corporate website on the base computer image.
考题
Which of the following would an administrator use to configure a server’s BIOS settings even if the OS crashes?()A、 VPNB、 KVM over IPC、 TelnetD、 Remote Desktop
考题
A small business currently has a server room with a large cooling system that is appropriate for its size. The location of the server room is the top level of a building. The server room is filled with incandescent lighting that needs to continuously stay on for security purposes. Which of the following would be the MOST cost-effective way for the company to reduce the server rooms energy footprint?()A、Replace all incandescent lighting with energy saving neon lighting.B、Set an auto-shutoff policy for all the lights in the room to reduce energy consumption after hours.C、Replace all incandescent lighting with energy saving fluorescent lighting.D、Consolidate server systems into a lower number of racks,centralizing airflow and cooling in the room.
考题
Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?()A、Event ViewerB、System File CheckerC、MSCONFIGD、Task Manager
考题
Which of the following is a reason to implement a local KVM instead of an IP KVM?()A、 Local KVM supports all operating systems.B、 Local KVMs allow multiple user access.C、 Higher number of ports on a local KVM.D、 Local KVMs are more secure.
考题
Which of the following would a company implement to help reduce the cost of electricity?()A、Shutdown/power policiesB、Redundant power suppliesC、Use optical miceD、Social engineering policy
考题
A network administrator has been receiving work orders about poor voice quality crossing a branch T1. The cause is determined to be users running high bandwidth file sharing applications across the T1 sending large packets delaying the smaller voice streams. Which of the following would improve voice quality?()A、Configure traffic shaping to reduce the bandwidth available to the file sharing application.B、Configure a separate VLAN for the IP phones.C、Install a content caching proxy at the branch to reduce inbound WAN traffic.D、Upgrade switches to provide higher bandwidth ports for workstations and IP phones.
考题
A large company would like to roll out thin clients to all retail terminals on its next upgrade. Which of the following are potential risks of this IT plan?()A、Power consumption;thin clients use more energy than comparable workstations and therefore have a larger energy footprint.B、Single point of failure;if the thin client server goes down all machines are without functionality.C、Centralized administration;IT staff cannot rely on localized group policy settings.D、High cost of terminals;compared to traditional workstations,thin clients are very expensive and require more maintenance.
考题
A customer is running an application with large block files that contain images and video files. They have a requirement for a low cost storage solution. The consultant recommended considering the NAS solution. Which of the following benefits will the NAS solution provide?()A、Utilizes existing infrastructureB、Provides direct host attached solutionC、NAS storage will use the reliable iSCSI protocolD、Long distances after upgrading all host connections to fibre
考题
Your database is open and running in ARCHIVELOG mode. You take RMAN full backups every Sunday night. On Monday morning, while querying the user1.employees table, you receive the following error message: 01578: ORACLE data block corrupted (file # 5, block # 51) ORA-01110: data file 5: ’/u01/app/oracle/oradata/orcl/example01.dbf’ You need to rectify the corruption while ensuring the following: The data file should remain online. The mean time to recover (MTTR) should be minimal. You are not using a backup control file, and all the archived logs are accessible. Which option would you choose?()A、flash back the corrupted blocksB、use the DBMS_REPAIR packageC、use the RMAN TSPITR commandD、use the RMAN BLOCKRECOVER commandE、use the RESTORE DATABASE and RECOVER DATABASE commandsF、investigate the time at which the corruption occurred and perform a point-in-time recovery
考题
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server. Which account type should you use? () A、You should use local Service accountB、You should use network Service accountC、You should use domain accountD、You should use local System account
考题
You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()A、Use the Security Configuration and Analysis tool on one of the new servers to import the template file.B、Use the default Domain Security Policy console on one of the new servers to import the template file.C、Use the Group Policy Editor console to open NYServersGPO and import the template file.D、Use the default Local Security Policy console on one of the new servers to import the template file.
考题
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2002 instance. You upgrade this instance to SQL Server 2008. You configure the Agent service to use the LocalSystem account. There is a file named Orderdata on a remote network share. A job accesses this Orderdata file by using a CMDExec step. The job step fails to complete execution after the upgrade. You must make sure that the job can complete execution, so you have to configure the job step. What action should you perform? () A、You should configure a certificate B、You should configure the SQL Server Agent service to use the NetworkService account.C、You should configure the job step to use a proxy account D、You should configure the SQL Server Agent service to use a local Windows account
考题
A bank runs 50 workstations and would like to decrease its electricity costs, while not sacrificing functionality. All of the workstations are high-end performance units that are intended to be used for CAD-like applications. Analysts benefit from the added performance, but tellers and associates could use more minimalist systems. Which of the following methods would decrease the banks electricity and hardware costs?()A、Swap all teller and associate machines with servers.B、Swap all teller and associate machines with thin clients.C、Swap all teller and associate machines with low-profile high-end workstations.D、Swap all teller and associate machines with laptops.
考题
单选题Which of the following would allow a company to conserve energy and still provide a functional service to its employees?()A
Configure all workstations with higher RPM fansB
Use CRTs instead of LCD monitorsC
Use NAS to reduce the number of file serversD
Configure all printers to print on single-side with low resolution
考题
单选题A network administrator has been receiving work orders about poor voice quality crossing a branch T1. The cause is determined to be users running high bandwidth file sharing applications across the T1 sending large packets delaying the smaller voice streams. Which of the following would improve voice quality?()A
Configure traffic shaping to reduce the bandwidth available to the file sharing application.B
Configure a separate VLAN for the IP phones.C
Install a content caching proxy at the branch to reduce inbound WAN traffic.D
Upgrade switches to provide higher bandwidth ports for workstations and IP phones.
考题
单选题Which of the following is a reason to implement a local KVM instead of an IP KVM?()A
Local KVM supports all operating systems.B
Local KVMs allow multiple user access.C
Higher number of ports on a local KVM.D
Local KVMs are more secure.
考题
单选题You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()A
Require employees to access e-mail only over connections that use SSLB
Place Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the storesC
Use the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mailD
Use the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them
热门标签
最新试卷