During the implement phase, systems acceptance testing does which of the following for the customer? Select exactly 1 answer(s) from the following:()。
第1题:
You are the administrator of a SQL Server 2000 computer. Your company purchased an accounting application from a vendor. The application stores its data in a database named Accounting on the server. The tables in this database contain columns that function as primary keys, but PRIMARY KEY and FOREIGN KEY constraints are not used.
You need to replicate data from this database to another SQL Server computer. This server will use the replicated data to generate reports. Most reports will run each month, but the accounting department needs to have the ability to run reports at any time. Reports should be accurate through the last full working day.
You cannot make any changes to the database, but you need to implement replication. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)
A.Implement merge replication.
B.Implement snapshot replication.
C.Implement transactional replication.
D.Schedule replication to run continuously.
E.Schedule replication to run during off-peak hours.
第2题:
What are two methods of mitigating MAC address flooding attacks?()
第3题:
You need to design a PKI solution that meets business and security requirements. What should you do?()
第4题:
Which of the following should be the FINAL step according to the troubleshooting theory?()
第5题:
Which three best practices should be implemented at the campus backbone submodule to supportthe server farm module? ()
第6题:
An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits? ()
第7题:
Company.com has a four-node cluster (nodes ’A’, ’B’, ’C’, and ’D’). The nodes are set up in Resource group pairs. Node ’A’ falls over to Node ’B’, and Node ’C’ falls over to Node ’C’. During a maintenance windows, it was discovered that the six resource groups on Node ’A’ are too much to be adequately handled by Node ’B’. What could be done to better utilize the available resources during fallover?()
第8题:
Which of the following is true about job chains?()
第9题:
You need to recommend a solution for promoting the RODC in the new branch office.What should you include in the recommendations?()
第10题:
They consist of one or more Scheduler programs.
They are used to implement dependency scheduling.
They are used to implement time-based scheduling.
They are used to implement event-based scheduling.
None of the above.
第11题:
Create an HttpSessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getName method on the event object.
Create an HttpSessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getName method on the event object.
Create an SessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getAttributeName method on the event object.
Create an SessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getAttributeName method on the event object.
第12题:
project planning
configuration management
wireless readiness assessment
systems acceptance testing
site readiness specification
第13题:
下列各宏命令中,应该放在类实现中以支持序列化特性的宏命令是()。
第14题:
Which two service components are performed during the wireless implement phase?()
第15题:
You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()
第16题:
Which of these correctly identifies the six phases of the Cisco Lifecycle Services framework? ()
第17题:
Which of the following is the BEST way to allow web software through the server firewall?()
第18题:
An administrator needs to implement a security patch policy on the network that adheres to an internal SLA. Which of the following actions BEST achieves this task?()
第19题:
A network for a two-node cluster has been planned. The network administrator has explained that the networkdoes not support gratuitous ARP. Which of the following steps will ensure that clients are able to connect tothe cluster after a failover takes place?()
第20题:
You are a network administrator for your company. The company has a main office and two branch offices. The branch offices are connected to the main office by T1 lines. The network consists of three Active Directory sites, one for each office. All client computers run either Windows 2000 Professional or Windows XP Professional. Each office has a small data center that contains domain controllers, WINS, DNS, and DHCP servers, all running Windows Server 2003. Users in all offices connect to a file server in the main office to retrieve critical files. The network team reports that the WAN connections are severely congested during peak business hours. Users report poor file server performance during peak business hours. The design team is concerned that the file server is a single point of failure. The design team requests a plan to alleviate the WAN congestion during business hours and to provide high availability for the file server. You need to provide a solution that improves file server performance during peak hours and that provides high availability for file services. You need to minimize bandwidth utilization. What should you do? ()
第21题:
Which two can be used to create a new Thread? ()
第22题:
installation, configuration, and testing, as well as the commissioning of tools and processes in accordance with the operations implementation plan
provision of information regarding customer-specified design requirements and configuration
the migration of network services from an existing state to a future state in accordance with the migration plan
the provision of an objective means of measuring system operability and functionality
第23题:
Purchase two high-end servers and a shared fiber-attached disk array. Implement a file server cluster in the main office by using both new servers and the shared fiber-attached disk array.
Implement Offline Files on the client computers in the branch offices by using Synchronization Manager. Schedule synchronization to occur during off-peak hours.
Implement a stand-alone Distributed File System (DFS) root in the main office. Implement copies of shared folders for the branch offices. Schedule replication of shared folders to occur during off-peak hours by using scheduled tasks.
Implement a domain Distributed File System (DFS) root in the main office. Implement DFS replicas for the branch offices. Schedule replication to occur during off-peak hours.