网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A TCP/IP application receives files from a remote machine.  The application reads 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size. Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()
A

 Increase the size of thewall

B

 Increase the size of sb_max

C

 Increase the size of tcp_recvspace

D

 Increase the size of tcp_sendspace


参考答案

参考解析
解析: 暂无解析
更多 “单选题A TCP/IP application receives files from a remote machine.  The application reads 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size. Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A  Increase the size of thewallB  Increase the size of sb_maxC  Increase the size of tcp_recvspaceD  Increase the size of tcp_sendspace” 相关考题
考题 Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?() A.Add the list of files to /etc/exclude.rootvg.B.Modify the image.data file and add the files to be excluded form the backup.C.Modify the bosinst.data file and specify which files are to be excluded from the backup.D.Specify the files to be excluded on the command line when executing the mksysb command.

考题 A TCP/IP application receives files from a remote machine.  The application reads 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size. Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A、 Increase the size of thewallB、 Increase the size of sb_maxC、 Increase the size of tcp_recvspaceD、 Increase the size of tcp_sendspace

考题 A system administrator has run topas on a server.  The output shows that the %iowait of the system is 60% and that most of the disk activity is on hdisk0.  Which of the following procedures should be performed to fix this problem?()A、 Replace the hard disk with a faster disk drive. B、 Add another paging space on another hdisk. C、 Spread the data hdisk0 across several hdisks. D、 Nothing, since %iowait is a measurement of CPU time.

考题 A TCP/IP application is transferring files from a personal machine to a remote machine.  The application writes 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size.  Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A、 Increase the size of thewallB、 Increase the size of sb_maxC、 Increase the size of tcp_recvspaceD、 Increase the size of tcp_sendspace

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server that runs Windows Server 2008. The Terminal Services server role is installed on theserver. You have a new application deployed on the server. The application creates files that have anextension of .xyz. You have to make sure that users are able to launch the remote application from theircomputers by double-clicking a file that has the .xyz extension. What action should you perform?()A、The Remote Desktop Connection Client on the users’ computers should be configured to point to theserver.B、Configure the application as a published application You should use a Remote Desktop Program file.C、Configure the application as a published application by using a Microsoft Windows Installer packagefile.D、Configure the application as a published application by using a Terminal Server Web Access Web site.

考题 A user reports that they cannot cd to /tmp/application. A system administrator entered the following    command: Is -Id /tmp/application   drw-r-r- 4 root system 512 Jan 15 14:09 application Which of the following is the most likely cause of the  problem()A、The /tmp/application should be globally writable.B、The /tmp/application directory should be executable.C、The /tmp/application directory should be owned by the user.D、The /tmp/application directory should have the sticky bit set

考题 An administrator receives a call from an end user reporting that the application they are using keeps giving them an error on port 23. Which of the following is being used?()A、SSHB、Remote Desktop ConnectionC、TelnetD、VPN

考题 A basic TCP/IP configuration on the system has just been completed. A remote system can be pinged by IP address but not by hostname. Which of the following actions should be performed next in an effort to successfully ping using the hostname?()A、Check routingB、Check inetd.confC、Check /etc/resolv.confD、Check interface with ifconfig

考题 A customer asked a consultant to create the infrastructure for an application.  The application is designed to charge customers for conferencing services based on usage.  To determine if a Storage Area Network (SAN) is the best storage solution, which of the following questions is most appropriate?()A、Will the application require a database?B、Which operating system does the application require?C、Will the data need to be backed up in real time?D、Does the application share data among the servers?

考题 A user wants to connect to the database instance from an application that is running on a remote machine. Which tools should the DBA use to establish the required configuration to ensure that the user is able to connect to the database instance?()A、Data PumpB、Oracle Net ManagerC、Oracle Enterprise ManagerD、Oracle Universal Installer (OUI)E、Database Configuration Assistant (DBCA)

考题 You create a Web application to process XML documents. The Web application receives XML document files from several sources, reads them, and stores them in a Microsoft SQL Server database. The Web application parses all incoming data files to ensure that they conform to an XML schema. You need to find all validation errors in the XML document. What should you do?()A、Load the XML data by using an instance of the XmlDocument class and specify a location for the application schema.B、Configure the ValidationEventHandler in the XmlReaderSettings of the XmlReader object.C、Read the XML file into a DataSet object and set the EnforceConstraints property to True.D、Read the XML file into a DataSet object. Handle the DataSet.MergeFailed event to parse the data that does not conform to the XML schema.

考题 The System Administrator wants to do a backup of the HMC and notices that there are two options on the HMC menu: Backup Critical Console data and Save Upgrade Data. Which of the following best describes the differences between the two options?()A、Both options back up user and partition profile data. Only the Backup Critical Console Data backs up TCP/IP settings or preferencesB、Both options back up partition profile information. Only the Backup Critical Console Data backs up service function settings, such as Inventory Scout, Service Agent, and Service Focal PointC、The Backup Critical Console Data should be performed just before the HMC software update operation. The Save Upgrade Data should be performed each time configuration changes are made to the system or the HMCD、The Save Upgrade Data should be performed just before the HMC software update operation. The Backup Critical Console Data should be performed each time configuration changes are made to the system or the HMC

考题 单选题A basic TCP/IP configuration on the system has just been completed. A remote system can be pinged by IP address but not by hostname. Which of the following actions should be performed next in an effort to successfully ping using the hostname?()A Check routingB Check inetd.confC Check /etc/resolv.confD Check interface with ifconfig

考题 单选题The System Administrator wants to do a backup of the HMC and notices that there are two options on the HMC menu: Backup Critical Console data and Save Upgrade Data. Which of the following best describes the differences between the two options?()A Both options back up user and partition profile data. Only the Backup Critical Console Data backs up TCP/IP settings or preferencesB Both options back up partition profile information. Only the Backup Critical Console Data backs up service function settings, such as Inventory Scout, Service Agent, and Service Focal PointC The Backup Critical Console Data should be performed just before the HMC software update operation. The Save Upgrade Data should be performed each time configuration changes are made to the system or the HMCD The Save Upgrade Data should be performed just before the HMC software update operation. The Backup Critical Console Data should be performed each time configuration changes are made to the system or the HMC

考题 单选题Which statement is true about IP telephony calls?()A  A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and  Layer 2 link header.B  The voice carrier stream uses H323 to set up, maintain, and tear down call endpoints.C  Call control signaling uses Real-Time Transport Protocol (RTP) packets that contain actual voice  samples.D  The sum of bandwidth necessary for each major application, including voice, video, and data, should not exceed 75 percent of the total available bandwidth for each link.

考题 单选题A system administrator periodically receives calls from users who complain about poor performance with their application. Use the following sar command output to answer the question: Which of the following system resources need more investigation?()A CPUsB DiskC MemoryD NetworkX

考题 单选题You create a Web application to process XML documents. The Web application receives XML document files from several sources, reads them, and stores them in a Microsoft SQL Server database. The Web application parses all incoming data files to ensure that they conform to an XML schema. You need to find all validation errors in the XML document. What should you do? ()A Load the XML data by using an instance of the XmlDocument class and specify a location for the application schema.B Configure the ValidationEventHandler in the XmlReaderSettings of the XmlReader object.C Read the XML file into a DataSet object and set the EnforceConstraints property to True.D Read the XML file into a DataSet object. Handle the DataSet.MergeFailed event to parse the data that does not conform to the XML schema.

考题 单选题In a three-disk volume group, a disk was physically removed from the system without performing any software procedures to properly remove the disk. Which of the following commands should be performed to recover from this error?()A extendvgB cfgmgrC reducevgD varyoffvg

考题 单选题An administrator receives a call from an end user reporting that the application they are using keeps giving them an error on port 23. Which of the following is being used?()A SSHB Remote Desktop ConnectionC TelnetD VPN

考题 单选题A TCP/IP application is transferring files from a personal machine to a remote machine.  The application writes 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size.  Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A  Increase the size of thewallB  Increase the size of sb_maxC  Increase the size of tcp_recvspaceD  Increase the size of tcp_sendspace

考题 单选题A customer with a small IT budget has one data center. Their main application is a database running on an IBM System Storage DS8000. The database has a data change rate of 50% per day. Once a week, they must do a point-in-time backup from the database to tape. The time it takes to run the backup now exceeds the backup window allowed. The customer requests a proposal to reduce database downtime caused by running backups, with nearly no impact to production volumes.    In addition to the tape backup, which DS8000 feature should a technical specialist propose()A FlashCopyB FlashCopy SEC Metro MirrorD Global Mirror

考题 单选题Application developers in TestKing.com create an assembly that contains a CLR function.This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set. Which permission set should you use?()A DefaultB SAFEC EXTERNAL ACCESSD UNSAFE

考题 单选题A system administrator has run topas on a server.  The output shows that the %iowait of the system is 60% and that most of the disk activity is on hdisk0.  Which of the following procedures should be performed to fix this problem?()A  Replace the hard disk with a faster disk drive. B  Add another paging space on another hdisk. C  Spread the data hdisk0 across several hdisks. D  Nothing, since %iowait is a measurement of CPU time.

考题 单选题A user reports that they cannot cd to /tmp/application. A system administrator entered the following    command: Is -Id /tmp/application   drw-r-r- 4 root system 512 Jan 15 14:09 application Which of the following is the most likely cause of the  problem()A The /tmp/application should be globally writable.B The /tmp/application directory should be executable.C The /tmp/application directory should be owned by the user.D The /tmp/application directory should have the sticky bit set

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server that runs Windows Server 2008. The Terminal Services server role is installed on theserver. You have a new application deployed on the server. The application creates files that have anextension of .xyz. You have to make sure that users are able to launch the remote application from theircomputers by double-clicking a file that has the .xyz extension. What action should you perform?()A The Remote Desktop Connection Client on the users’ computers should be configured to point to theserver.B Configure the application as a published application You should use a Remote Desktop Program file.C Configure the application as a published application by using a Microsoft Windows Installer packagefile.D Configure the application as a published application by using a Terminal Server Web Access Web site.

考题 单选题A customer asked a consultant to create the infrastructure for an application.  The application is designed to charge customers for conferencing services based on usage.  To determine if a Storage Area Network (SAN) is the best storage solution, which of the following questions is most appropriate?()A Will the application require a database?B Which operating system does the application require?C Will the data need to be backed up in real time?D Does the application share data among the servers?

考题 单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A Add the list of files to /etc/exclude.rootvg.B Modify the image.data file and add the files to be excluded form the backup.C Modify the bosinst.data file and specify which files are to be excluded from the backup.D Specify the files to be excluded on the command line when executing the mksysb command.