网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?()
- A、Coaxial
- B、CAT3
- C、CAT5
- D、CAT5e
参考答案
更多 “A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?()A、CoaxialB、CAT3C、CAT5D、CAT5e” 相关考题
考题
()you prepare cross training plans, you need to consider both the company benefits and the employee benefits.A. AlthoughB. Even ifC. As
考题
Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()
A. Implement ACLs.B. Disable accounts for staff members who do not require server access.C. Implement anti-spam software on the server.D. Implement anti-virus software on the server.
考题
The CEO of Star Records announced plans for aggressive expansion, saying the company will purchase ( ) new properties in the next two years.
A. many
B. little
C. much
D. any
考题
Workers maintain that the company's __________to implement modern safety regulations puts everyone in the factory at risk of injury.A.discouragement
B.indecision
C.unwillingness
D.hindrance
考题
Which of the following would provide the BEST reference of normal server performance for a company’s environment?()A、 OEM websiteB、 Software logsC、 Baseline documentationD、 Pre-installation plans
考题
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons
考题
Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()A、 Implement ACLs.B、 Disable accounts for staff members who do not require server access.C、 Implement anti-spam software on the server.D、 Implement anti-virus software on the server.
考题
Which of the following would a company implement to help reduce the cost of electricity?()A、Shutdown/power policiesB、Redundant power suppliesC、Use optical miceD、Social engineering policy
考题
A customer recently acquired two Power servers and plans to implement AIX 6.1 and Live Application Mobility. What other product is required to accomplish this objective? ()A、 HACMP for AIXB、 PowerVM Enterprise EditionC、 IBM Management Edition for AIXD、 Workload Partition Manager for AIX
考题
You create two resource plans, one for data warehouse loading jobs at night and the other for application jobs at day time. You want the resource plans to activate automatically so that the resource allocation is optimum as desired by the activity.How would you achieve this?()A、Implement job classesB、Implement Scheduler windowsC、Implement the mapping rule for the consumer groupsD、Set the SWITCH_TIME resource plan directive for both the resource plans
考题
You need to recommend a strategy for the file servers that meets the company’s technical requirements. What should you recommend?()A、Implement active file screens.B、Implement passive file screens.C、Configure classification rules.D、Configure File Server Resource Manager (FSRM) quotas.
考题
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 inthe instance. You have set the recovery model of DB1 to Full. You deploy a new process. The process modifies 10,000 records from the Accounts table at 18:00 every day. Any modification made by the process to the data must be reverted and database keeps online. You must make sure of this. So which strategy should you implement?() A、You should implement Differential backup B、You should implement Database snapshotsC、You should implement Primary filegroup backup D、You should implement Transaction log backup
考题
You have an Exchange Server 2010 organization. You need to recommend a solution that prevents the permanent deletion of e-mail messages from themailboxes of employee who have been dismissed from the company. What should you recommend?()A、Implement managed folders.B、Implement a legal hold for each mailbox.C、Implement a Retention Policy for each mailbox.D、Implement an Outlook Protection Rule for each mailbox.
考题
A company is planning to implement a B2C store and would like to recommend products to its customers according to their personal information (for example: age, gender, marital status). Which WebSphere Commerce V5.6 function/feature could be used to implement this requirement?()A、gift certificatesB、marketing campaignsC、merchandising associationsD、loyalty programs
考题
单选题Which of the following would provide the BEST reference of normal server performance for a company’s environment?()A
OEM websiteB
Software logsC
Baseline documentationD
Pre-installation plans
考题
单选题A company needs to implement an offsite backup method that is replicated and needs toguarantee that the data cannot be changed once it is replicated. Which of the following would meet the company’s needs?()A
SANB
WORMC
NASD
CD-RW
考题
单选题Which of the following is false?()A
A company should develop a SMS and implement itB
A company implementing a SMS properly may obtain a DOCC
Once a company obtains its DOC, each vessel of this company will obtain a SMCD
DOC is valid for 60 months unless “major non-conformity” is found
考题
单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A
On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB
On all client computers, implement logon auditing for all user account logonsC
On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD
On all domain controllers, implement logon auditing for all user account logons
考题
单选题Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()A
Implement ACLs.B
Disable accounts for staff members who do not require server access.C
Implement anti-spam software on the server.D
Implement anti-virus software on the server.
考题
单选题You create two resource plans,one for data warehouse loading jobs at night and the other for application jobs at day time. You want the resource plans to activate automatically so that the resource allocation is optimum as desired by the activity. How would you achieve this?()A
Implement job classesB
Implement Scheduler windowsC
Implement the mapping rule for the consumer groupsD
Set the SWITCH_TIME resource plan directive for both the resource plans
考题
单选题A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?()A
CoaxialB
CAT3C
CAT5D
CAT5e
考题
单选题Your network consists of a single Active Directory domain. Your main office has an Internet connection. Your company plans to open a branch office. The branch office will connect to the main office by using a WAN link. The WAN link will have limited bandwidth. The branch office will not have access to the Internet. The branch office will contain 30 Windows Server 2008 R2 servers. You need to plan the deployment of the servers in the branch office. The deployment must meet the following requirements: èInstallations must be automated. èComputers must be automatically activated. èNetwork traffic between the offices must be minimized. What should you include in your plan?()A
In the branch office,implement Key Management Service(KMS),a DHCP server,andWindowsDeployment Services (WDS).B
Use Multiple Activation Key (MAK) Independent Activation on the servers. In the main office,implement a DHCP server and Windows Deployment Services(WDS).C
In the main office,implement Windows Deployment Services(WDS). In the branch office,implement a The safer ,easier way to help you pass any IT exams.DHCP server and implement the Key Management Service(KMS).D
Use Multiple Activation Key(MAK) Independent Activation on the servers. In the main office,implement a DHCP server. In the branch office implement Windows Deployment Services(WDS).
考题
单选题()means a structured and documented system enabling company personal to implement effectively the company safety and environmental protection policy.A
SMSB
ISMC
SOLASD
SMC
考题
单选题Under SEC guidelines, a company in this situation is required either to submit revised financial statements or that they withdraw their plans for a public stock offering.A
that they withdraw their plansB
to withdraw its plansC
that it withdraw planningD
to have been withdrawn from their plansE
it should withdraw its plans
考题
单选题According to the writer, the key role of a General Manager is to ______.A
help to formulate company policyB
communicate between groups of peopleC
interpret plans made by senior managementD
divide the company into departments
热门标签
最新试卷