网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
一个proxyplug-in放在一个cluster的前边,如果当前正在进行web请求的servercrash掉,请问plug-in根据()进行fail-over。
- A、根据session cookie
- B、随机
- C、根据对cluster的heart-beat检测
- D、用户决定
参考答案
更多 “一个proxyplug-in放在一个cluster的前边,如果当前正在进行web请求的servercrash掉,请问plug-in根据()进行fail-over。A、根据session cookieB、随机C、根据对cluster的heart-beat检测D、用户决定” 相关考题
考题
一个proxy plug-in放在一个cluster的前边,如果当前正在进行web请求的server crash 掉,请问plug-in根据什么进行fail-over? ()A. 根据session cookieB. 随机C. 根据对cluster的heart-beat检测
考题
在浏览器中通过Weblogic Server Proxy Plug-in来访问一个WeblogicServerCluster,如果登录操作请求发送到集群中的ServerA,那么在该浏览器中再点击其他链接,那么()请求会发送到Cluster中。A、ServerAB、根据Proxy负载均衡算法,到另外的ServerC、随机选择后端的任意一个ServerD、以上都有可能
考题
关于session的论述正确的有()A、一个session可以对应数个用户B、一个session只能对应一个用户C、可以手动关闭一个sessionD、session如果不手动关闭,会一直存在Server中
考题
关于session论述正确的有:()A、一个session可以对应数个用户B、一个session只能对应一个用户C、可以手动关闭一个sessionD、session 如果不手动关闭,会一直存在Server中
考题
以下从四种不同的作用域中得到Bean的实例,说法错误的是()。A、page是指当前Web应用程序的所有JSP文件中取得实例,从Page对象中获取JavaBeanB、request是指在当前的用户请求中取得实例,从ServletRequest对象中获取JavaBeanC、session是指在当前的用户会话中取得实例,常用于一个用户登录在网站上全过程不同请求之间共享数据,从HttpSession对象中获取JavaBeanD、application是指在当前的应用程序中取得实例,常用于同一个应用程序不同用户访问时共享数据,从ServletContext对象中获取JavaBean
考题
An administrator wants to install Web SMIT on a node that is not part of a cluster. Which PowerHA filesetprovides this function?()A、cluster.sysmgt.wsmB、cluster.es.client.wsmC、cluster.es.server.websmD、cluster.sysmgt.websm.rte
考题
What is the functionality of redundant interfaces (reth) in a chassis cluster?()A、reth interfaces are used only for VRRP.B、reth interfaces are the same as physical interfaces.C、reth interfaces are pseudo-interfaces that are considered the parent interface for two physical interfaces.D、Each cluster member has a reth interface that can be used to share session state information with the other cluster members.
考题
You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()A、Create a Network Load Balancing cluster that contains the Outlook Web Access serversB、Create a Microsoft Cluster Server cluster that contains the Outlook Web Access serversC、Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailboxD、Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers
考题
You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster. The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template. You need to implement protective measures against the cluster’s most significant security vulnerability. What should you do? ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.
考题
Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
考题
Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
考题
Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com. You also discover that there is only one port rule configured for Network Load Balancing cluster. You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only. Which two actions should you perform to achieve this objective()A、Create a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleB、Run the wlbs disable command on the cluster nodesC、Assign a unique port rule for NLB cluster by using the NLB Cluster consoleD、Delete the default port rules through Network Load Balancing Cluster console
考题
下述有关“中断优先级”的描述中不正确的是()。A、中断的请求是随机的,不同外设可能同时请求中断B、当有两个中断源请求中断时,CPU随机响应其中的一个中断请求C、中断优先级是指根据不同中断的轻重缓急,为每一个中断源分配一个优先权D、CPU正在处理一个低优先级中断时,如果接收到一个高优先级中断请求,CPU会暂停当前中断执行,先处理优先级较高的中断请求
考题
多选题Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()ALog on to one of the cluster nodes and run the wlbs disable all command.BOpen the Network Load Balancing Clusters console and delete the default port rules.COpen the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.DOpen the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
考题
判断题网页请求到达时,Web应用引擎需要利用篡改检测模块来读取网页文件,篡改检测模块首先对即将访问文件进行完整性检查,根据检查结果决定如何反馈Web应用引擎,完成此次网络请求的处理。A
对B
错
考题
单选题You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster. The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template. You need to implement protective measures against the cluster’s most significant security vulnerability. What should you do? ()A
Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B
Use packet filtering on all inbound traffic to the cluster.C
Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D
Use intrusion detection on the perimeter network.
考题
单选题What is the functionality of redundant interfaces (reth) in a chassis cluster?()A
reth interfaces are used only for VRRP.B
reth interfaces are the same as physical interfaces.C
reth interfaces are pseudo-interfaces that are considered the parent interface for two physical interfaces.D
Each cluster member has a reth interface that can be used to share session state information with the other cluster members.
考题
单选题关于session论述正确的有:()A
一个session可以对应数个用户B
一个session只能对应一个用户C
可以手动关闭一个sessionD
session 如果不手动关闭,会一直存在Server中
考题
多选题Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()ALog on to one of the cluster nodes and run the wlbs disable all command.BOpen the Network Load Balancing Clusters console and delete the default port rules.COpen the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.DOpen the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
考题
多选题关于session的论述正确的有()A一个session可以对应数个用户B一个session只能对应一个用户C可以手动关闭一个sessionDsession如果不手动关闭,会一直存在Server中
热门标签
最新试卷