网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

在AWS上看到Prefered Timing Mode NotUsed这样的告警,在Proposed Repair Actions中有Check timing mode的内容,应该怎么修正?

  • A、configure system clock-mgmt priority-scheme none
  • B、configure system clock-mgmt priority-scheme auto
  • C、configure system clock-mgmt priority-scheme external
  • D、configure system clock-mgmt priority-scheme local

参考答案

更多 “在AWS上看到Prefered Timing Mode NotUsed这样的告警,在Proposed Repair Actions中有Check timing mode的内容,应该怎么修正?A、configure system clock-mgmt priority-scheme noneB、configure system clock-mgmt priority-scheme autoC、configure system clock-mgmt priority-scheme externalD、configure system clock-mgmt priority-scheme local” 相关考题
考题 Which mode is used to allow only a single person to edit a configuration?() A. configure batchB. configure privateC. configure exclusiveD. configure dynamic

考题 Refer to the network of Layer 3 switches in the exhibit. The RPI Multi cast Server only multicasts to hosts connected to multilayer switches 5 and 6. The CMU Multicast Server multicasts to hosts on multilayer switches 1 - 6. Given the number of configuration steps involved, what is the most efficient way to configure the net work while meeting the requirements for multicast data flow? ()A. Configure each switch with PIM sparse mode and a separate instance of PIM dense mode.Specify switch 1 as the root for the RPI Multicast Server. Specify switch 2 as the root for the CMU Multicast Server.B. Configure each switch with PIM sparse mode and a separate instance of PIM dense mode. Leave each multicast server as the root of its own multicast tree.C. Configure each switch with PIM sparse - dense mode. Configure switch 3 as a ren dezvous point for the RPI multicast stream.D. Configure each switch with PIM sparse mode and a separate instance of PIM dense mode.Allow the switches to elect their own root for each multicast tree.E. Configure each switch with PIM sparse mode.F. Configure each switch with PIM dense mode.

考题 Assuming the default switch configuration,which approach should you use to configure the extended vlan range(1006 through 4094) on a cisco catalyst 3750 series switch?() A. Configure the switch to be in VTP client mode.B. Configure the switch to be in VTP domaint mode.C. Configure the switch to be in VTP transparent mode.D. Configure the switch to be in VTPv2.

考题 Assuming the default switch configuration,which approach should you use to configure the extended vlan range(1006 through 4094) on a cisco catalyst 3750 series switch?()A、Configure the switch to be in VTP client mode.B、Configure the switch to be in VTP domaint mode.C、Configure the switch to be in VTP transparent mode.D、Configure the switch to be in VTPv2.

考题 Which option correctly identifies the four main menus of a Cisco Wireless Control System (WCS)? ()A、 Home, Configure, Location, and MonitorB、 Home, Configure, Monitor, and RefreshC、 Home, Monitor, Refresh, and AdministrationD、 Monitor, Configure, Location, and AdministrationE、 Monitor, Configure, Refresh, and AdministrationF、 Monitor, Location, Refresh, and Administration

考题 Safe Mode is an essential Startup tool for troubleshooting Windows 98. Which two methods cause the system to start up in Safe Mode?()A、start the system in DOS Mode and run the WIN /S commandB、press the  key while restarting system - select Safe ModeC、start the system in DOS Mode and run the safe.EXE fileD、hold  key while restarting the system; select Safe Mode

考题 What should an administrator do to allow the logon of a user to a local system without limitations from the host‘webserver’?()A、configure the /etc/.rhosts with:webserverB、configure the root’$HOME/.rhost file with:+webserverC、configure each user’s $HOME/.rhosts file with:webserverD、configure the root’$HOME/.rhost file with:webserver

考题 A client is configuring an x3650 M3. Once the system is in production, they need to able to remotely view and make changes to the UEFI interface. Which of the following is the correct way to configure this?()A、Configure the RSA with an IP addressB、Configure the BMC with an IP addressC、Configure the AMM with an IP addressD、Configure the IMM with an IP address

考题 You need to recommend an update management strategy for the Chicago campus that meets the  company’s technical requirements. What should you recommend?()A、Deploy a WSUS server in replica mode,and then configure the servers reporting rollup settingsB、Deploy a WSUS server in replica mode,and then configure the serverse-mail notification settings.C、Deploy a WSUS server in autonomous mode,and then configure the servers reporting rollup settingsD、Deploy a WSUS server in autonomous mode,and then configure the servers e-mail notification  settings.

考题 You are preparing to install an operating system on virtual machines (VMs) in a Hyper-V environment. You need to configure each VM so that you can perform a network-based operating system installation. What should you do for each VM?()A、Add a Network Adapter.B、Add a Legacy Network Adapter.C、Configure a static MAC address.D、Configure a dynamic MAC address.

考题 You have a portable computer that runs Windows 7. You configure the computer to enter sleep mode after10 minutes of inactivity. You do not use the computer for 15 minutes and discover that the computer has notentered sleep mode. You need to identify what is preventing the computer from entering sleep mode.  What should you do?()A、At a command prompt, run Powercfg energy.B、At a command prompt, run Systeminfo /s localhost.C、From Performance Monitor, review the System Summary.D、From Performance Information and Tools, review the detailed performance and system information.

考题 In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()A、Take a "System Snapshot"B、Configure "Licensing"C、Review the "Events"D、Set the date and timeE、Upgrade or downgrade the firmware

考题 Which mode is used to allow only a single person to edit a configuration?()A、configure batchB、configure privateC、configure exclusiveD、configure dynamic

考题 You need to recommend a solution to ensure that users in the London office can access the graphics files in the main office. The solution must meet the companyˉs business goals.What should you recommend?()A、Configure the client computers to use BranchCache in Distributed Cache mode.B、Deploy a standalone Distributed File System (DFS) namespace. Configure a DFS Replication group.C、Deploy a domain-based Distributed File System (DFS) namespace. Configure a DFS Replication  group.D、Deploy a BranchCache server that operates in Hosted Cache mode. Configure the client computers to use the BranchCache server.

考题 对于华为路由器,用户要从用户视图进入系统视图,需要输入的命令是().A、system-viewB、enableC、configure terminalD、interface system

考题 During system boot, the system hangs at LED 0C31. What is the first step the system administrator should take to correct the problem?()A、Check system console connectionsB、Check system network connectionsC、Boot in service mode and change the bootlistD、Boot from the AIX installation media and mount rootvg filesystems

考题 A system administrator needs to configure dump devices for the system. Which command would be used to estimate the size required for a dump device?()A、lsdevB、chdevC、sysdumpdevD、sysdumpstart

考题 What should an administrator do to allow the logon of a user to a local system without limitations from the host ’webserver’?()  A、configure the /etc/.rhosts withweb:serverB、configure the root’$HOME/.rhost file with:+webserver C、configure each user’s $HOME/.rhosts file with:webserver D、configure the root’$HOME/.rhost file with:  

考题 What is the IBM tool used to configure the IBM System Storage DS5000 system?()A、DS Storage ManagerB、Tivoli Storage ManagerC、Remote Support ManagerD、Tivoli Provisioning Manager

考题 In which mode are users allowed to configure the device, including interfaces, protocols, user access, and system hardware properties?()A、priviledged modeB、configuration modeC、monitoring modeD、operational mode

考题 You find that the database performance degrades while you backup the PROD database using Recovery Manager (RMAN). The PROD database is running in shared server mode. The database instance is currently using 60% of total operating system memory. You suspect the shared pool fragmentation to be the reason. Which action would you consider to overcome the performance degradation?()A、Configure Java Pool to cache the java objects.B、Configure Streams Pool to enable parallel processing.C、Increase Shared Pool size to cache more PL/SQL objects.D、Increase Database Buffer Cache size to increase cache hits.E、Configure Large Pool to be used by RMAN and shared server.F、Increase the total System Global Area (SGA) size to increase memory hits.

考题 A Windows Communication Foundation (WCF) application exposes a service as a SOAP endpoint for consumption by cross-platform clients.During integration testing, you find that one of the clients is not generating the correct messages to the WCF application.In order to debug the issue and fix the communication, you need to configure the service to log messages received from the client.What should you do?()A、Set an etwTracking behavior on the service and configure a listener for the System.ServiceModel trace source.B、Set an etwTracking behavior on the service and configure a listener for the System.ServiceModel.MessageLogging trace source.C、Enable messageLogging in the System.ServiceModel diagnostics element configuration and configure a listener for the System.ServiceModel.MessageLogging trace source.D、Enable messageLogging in the System.ServiceModel diagnostics element configuration and configure a listener for the System.ServiceModel trace source.

考题 You need to recommend a Windows update strategy for the new branch office. What should you recommend doing in the new branch office?()A、Deploy WSUS in replica mode. Configure updates to be stored on the new WSUS server.B、Deploy WSUS in autonomous mode. Configure updates to be stored on the new WSUS server.C、Deploy WSUS in replica mode. Configure the WSUS clients to retrieve updates from Microsoft Update.D、Deploy WSUS in autonomous mode.Configure the WSUS clients to retrieve updates from Microsoft  Update.

考题 You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.  What should you do?()A、Enable the Password must meet complexity requirements setting.B、Enable the User Account Control: Detect application installations and prompt for elevation setting.C、Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.D、Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.

考题 Bob is going on a trip with his laptop configured with Windows 2000 Professional. He is concerned that he will run out of battery life and his system will crash. He asks you to configure the power savings feature so that when he is not using his laptop, it will save his work and power down. You go into Advanced Power Management options. What should you do next?()A、Set the system to hibernation mode to 15 minutes.B、Set the system to snooze mode after 15 minutes.C、Max BatteryD、PresentationE、Minimal Power Management

考题 单选题Which option correctly identifies the four main menus of a Cisco Wireless Control System (WCS)? ()A  Home, Configure, Location, and MonitorB  Home, Configure, Monitor, and RefreshC  Home, Monitor, Refresh, and AdministrationD  Monitor, Configure, Location, and AdministrationE  Monitor, Configure, Refresh, and AdministrationF  Monitor, Location, Refresh, and Administration

考题 单选题You need to recommend a solution to ensure that users in the London office can access the graphics files in the main office. The solution must meet the companyˉs business goals.What should you recommend?()A Configure the client computers to use BranchCache in Distributed Cache mode.B Deploy a standalone Distributed File System (DFS) namespace. Configure a DFS Replication group.C Deploy a domain-based Distributed File System (DFS) namespace. Configure a DFS Replication  group.D Deploy a BranchCache server that operates in Hosted Cache mode. Configure the client computers to use the BranchCache server.