网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()
A
Check the server.xml on the IMS Server.
B
Check the database table IMSSyncDataType.
C
Check the System policies in the AccessAdmin.
D
Check the IMS Server settings of the IMS Configuration Utility.
参考答案
参考解析
解析:
暂无解析
更多 “单选题How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()A Check the server.xml on the IMS Server.B Check the database table IMSSyncDataType.C Check the System policies in the AccessAdmin.D Check the IMS Server settings of the IMS Configuration Utility.” 相关考题
考题
Examine the section of the Health Check report given below:Which two statements are true regarding the Health Check report?()
A. Health Check was performed manually.B. Health Check was performed to check the disk image block corruptions.C. Health Check was performed to check interblock and intersegment corruption.D. Health Check was performed to verify the integrity of database files and report failures.E. Health Check was performed by the Health Monitor automatically in response to a critical error.
考题
You are the administrator of a SQL Server 2000 computer named SQL1. You want to perform. ad hoc distribution queries against a database that is stored on a SQL Server 2000 computer named SQL2. SQL2 contains several databases, and each of these databases uses a different collation.You want to ensure that comparisons in distributed queries are evaluated correctly. You also want to minimize administrative overhead.How should you configure SQL1?A.Use the ALTER DATABASE statement to change the collation of the databases on SQL1.B.Add SQL2 as remote server.C.Add SQL2 as a linked server. Select the Use Remote Collation check box, and do not specify a collation name.D.Add SQL2 as a linked server. Select the Use Remote Collation check box, and specify a collation name. Repeat this process once for each database on SQL2.
考题
Which of the following can be used to determine the amount of physical memory installed in a laptop? ()A、Check Device Manager Snap-in.B、Type WINVER in the command prompt.C、Check the BIOS.D、Check System Information in the Accessibility folder.E、Check System Information.
考题
The Business Partner technical specialist is called to check if the addition of host ports on an IBM System Storage DS8000 system has improved users’ response times for an IBM System p server running SAP. How can the improvement be verified()A、check the output of the vmstat command on AIXB、check the performance reports via TotalStorage Productivity Center for DataC、check the performance reports via TotalStorage Productivity Center for DiskD、check the improvement through the TotalStorage Expert report
考题
How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()A、Check the server.xml on the IMS Server.B、Check the database table IMSSyncDataType.C、Check the System policies in the AccessAdmin.D、Check the IMS Server settings of the IMS Configuration Utility.
考题
The Business Partner technical specialist is called to determine if the addition of host ports on an IBM System Storage DS8700 has improved users’ response times for an IBM System p server running SAP. How can the improvement be verified()A、check the output of the "vmstat" command on LINUXB、check the performance reports via Tivoli Storage Productivity Center for DataC、check the performance reports via Tivoli Storage Productivity Center for DiskD、check the output of the "iostat" command on AIX
考题
System, machine, and user policies can be configured though AccessAdmin. How are changes synchronized with the AccessAgent?()A、written by the Administrators on the INI filesB、propagated only with the Active Directory network serviceC、propagated to the clients on the next Administrator accessD、propagated to clients the next time AccessAgent synchronizes with the IMS Server
考题
A customer has a development environment that uses the auto-deployment feature. The customer claims the application is not redeployed even if the new version is copied to an application subdirectory. Which two parameters of the configuration should you check?()A、Check if archive file in the compressed version has a new REDEPLOY file. B、If server was started in the Development Mode. Auto-deployment is not supported in production mode. C、If the application includes an EJB 3 module. Auto-deployment is not supported for EJBs.D、You change JVM from HotSpot to JRockit. Auto-deployment is not supported in HotSpot auto deployment. E、If the domain is a single-server domain. Auto-deployment is not supported in multiserver domains.
考题
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a text file which is named SQL01.log on the E: drive. A SQL Server Agent job executes every 2 minutes and logs information to the text file. You get a report from users saying that the sever doesn't make response. As the technical support, you check and find that the SQL Server Agent service does not run and the SQL Server Agent job no longer functions. You have to identify the reason why the SQL Server Agent service is unresponsive. In the options below, which log should you check?() A、You should check SQL1.logB、You should check SQLAGENT.OUTC、You should check log_xx.trcD、You should check ERRORLOG
考题
You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005.You work as a database administrator for your company. A SQL Server 2005 database is utilized in your company. And a table named Inventory is contained by the database. A column named Price is included by the table. According to the company policy, you cannot reduce more than 10 percent the value in the Price column in any single database operation. Through many kinds of method, the company makes updates to the Price column. For instance, the utilization of ad hoc queries is one of the methods. Since you are the database administrator, you should confirm that this company policy takes its effect. Which action should be performed?()A、A stored procedure should be created, and changes are disallowed by the procedure to the Price column that violates company policy.B、On the Price column, a check constraint should be created, and a specified minimum value is required by the check constraint.C、A trigger should be created, and changes are rolled back by the trigger to the Price column that violates company policy.D、On the Price column, a foreign key constraint is created to a table that valid prices are included.
考题
You have a Windows Server 2008 R2 Hyper-V server with a single network adapter that is connected to a virtual network. The virtual network is configured as External. Virtual machines (VMs) running on the server are not able to communicate with the host server over the network. You need to ensure that VMs running on the server are able to communicate with the host server over the network. In Virtual Network Manager,what should you do?()A、Select the Internal only connection type.B、Select the Private virtual machine network connection type.C、Select the Allow management operating system to share this network adapter check box.D、Clear the Allow management operating system to share this network adapter check box.
考题
Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 has Active Directory Federation Services (AD FS) 2.0 installed. Server1 is a member of an AD FS farm. The AD FS farm is configured to use a configuration database that is stored on a separate Microsoft SQL Server. You install AD FS 2.0 on Server2. You need to add Server2 to the existing AD FS farm. What should you do()A、On Server1, run fsconfig.exe.B、On Server1, run fsconfigwizard.exe.C、On Server2, run fsconfig.exe.D、On Server2, run fsconfigwizard.exe.
考题
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 has the Active Directory Federation Services (AD FS) role installed. You have an application named App1 that is configured to use Server1 for AD FS authentication. You deploy a new server named Server2. Server2 is configured as an AD FS 2.0 server. You need to ensure that App1 can use Server2 for authentication. What should you do on Server2()A、Add an attribute store.B、Create a relying party trust.C、Create a claims provider trust.D、Create a relaying provider trust.
考题
You had installed an Active Directory Federation Services (AD FS) role on a Windows server 2008 in your organization. Now you need to test the connectivity of clients in the network to ensure that they can successfully reach the new Federation server and Federation server is operational. What should you do()A、Go to Services tab, and check if Active Directory Federation Services is runningB、In the event viewer, Applications, Event ID column look for event ID 674.C、Open a browser window, and then type the Federation Service URL for the new federation server. D、None of the above
考题
单选题While overhauling a jerk-type fuel pump it is necessary to replace the pump plungerWhich of the parts listed below must also be replaced?()A
Delivery check valveB
Pump barrelC
Tubing to the injectorD
Cam follower
考题
单选题You have a Windows Server 2008 R2 Hyper-V server with a single network adapter that is connected to a virtual network. The virtual network is configured as External. Virtual machines (VMs) running on the server are not able to communicate with the host server over the network. You need to ensure that VMs running on the server are able to communicate with the host server over the network. In Virtual Network Manager,what should you do?()A
Select the Internal only connection type.B
Select the Private virtual machine network connection type.C
Select the Allow management operating system to share this network adapter check box.D
Clear the Allow management operating system to share this network adapter check box.
考题
单选题Your company has an Active Directory Rights Management Services (AD RMS) server. Users have Windows Vista computers. An Active Directory domain is configured at the Windows Server 2003 functional level. You need to configure AD RMS so that users are able to protect their documents. What should you do()A
Install the AD RMS client 2.0 on each client computer.B
Add the RMS service account to the local administrators group on the AD RMS server.C
Establish an e-mail account in Active Directory Domain Services (AD DS) for each RMS user.D
Upgrade the Active Directory domain to the functional level of Windows Server 2008.
考题
单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005.You work as a database administrator for your company. A SQL Server 2005 database is utilized in your company. And a table named Inventory is contained by the database. A column named Price is included by the table. According to the company policy, you cannot reduce more than 10 percent the value in the Price column in any single database operation. Through many kinds of method, the company makes updates to the Price column. For instance, the utilization of ad hoc queries is one of the methods. Since you are the database administrator, you should confirm that this company policy takes its effect. Which action should be performed?()A
A stored procedure should be created, and changes are disallowed by the procedure to the Price column that violates company policy.B
On the Price column, a check constraint should be created, and a specified minimum value is required by the check constraint.C
A trigger should be created, and changes are rolled back by the trigger to the Price column that violates company policy.D
On the Price column, a foreign key constraint is created to a table that valid prices are included.
考题
单选题Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 has Active Directory Federation Services (AD FS) 2.0 installed. Server1 is a member of an AD FS farm. The AD FS farm is configured to use a configuration database that is stored on a separate Microsoft SQL Server. You install AD FS 2.0 on Server2. You need to add Server2 to the existing AD FS farm. What should you do()A
On Server1, run fsconfig.exe.B
On Server1, run fsconfigwizard.exe.C
On Server2, run fsconfig.exe.D
On Server2, run fsconfigwizard.exe.
考题
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a text file which is named SQL01.log on the E: drive. A SQL Server Agent job executes every 2 minutes and logs information to the text file. You get a report from users saying that the sever doesn't make response. As the technical support, you check and find that the SQL Server Agent service does not run and the SQL Server Agent job no longer functions. You have to identify the reason why the SQL Server Agent service is unresponsive. In the options below, which log should you check?()A
You should check SQL1.logB
You should check SQLAGENT.OUTC
You should check log_xx.trcD
You should check ERRORLOG
考题
单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 has the Active Directory Federation Services (AD FS) role installed. You have an application named App1 that is configured to use Server1 for AD FS authentication. You deploy a new server named Server2. Server2 is configured as an AD FS 2.0 server. You need to ensure that App1 can use Server2 for authentication. What should you do on Server2()A
Add an attribute store.B
Create a relying party trust.C
Create a claims provider trust.D
Create a relaying provider trust.
考题
单选题Certkiller is having an Active Directory Rights Management Service (AD RMS) server. Users machines are running Windows Vista and an Active Directory domain is configured at Microsoft Windows Server 2003 functional level. Users are complaining that they cannot protect their documents. You need to configure AD RMS so that users are able to protect their documents. What should you do()A
Use a group policy to install the AD RMS client computersB
Add the ADRMSADMIN account to the local administrators group on the computersC
Add the ADRMSSRVC account to the local administrators on the AD RMS serverD
Establish an e-mail account in Active Directory Domain Services (AD DS) for each userE
Upgrade the active directory domain to the functional level of Windows 2008 server
考题
多选题A customer has a development environment that uses the auto-deployment feature. The customer claims the application is not redeployed even if the new version is copied to an application subdirectory. Which two parameters of the configuration should you check?()ACheck if archive file in the compressed version has a new REDEPLOY file.BIf server was started in the Development Mode. Auto-deployment is not supported in production mode.CIf the application includes an EJB 3 module. Auto-deployment is not supported for EJBs.DYou change JVM from HotSpot to JRockit. Auto-deployment is not supported in HotSpot auto deployment.EIf the domain is a single-server domain. Auto-deployment is not supported in multiserver domains.
考题
单选题System, machine, and user policies can be configured though AccessAdmin. How are changes synchronized with the AccessAgent?()A
written by the Administrators on the INI filesB
propagated only with the Active Directory network serviceC
propagated to the clients on the next Administrator accessD
propagated to clients the next time AccessAgent synchronizes with the IMS Server
热门标签
最新试卷