参考答案和解析
正确答案:A
更多“How are custom ”相关问题
  • 第1题:

    11. public class Commander {  12. public static void main(String[] args) {  13. String myProp = /* insert code here */  14. System.out.println(myProp);  15. }  16. }  and the command line:  java -Dprop.custom=gobstopper Commander  Which two, placed on line 13, will produce the output gobstopper?()

    • A、 System.load(”prop.custom”);
    • B、 System.getenv(”prop.custom”);
    • C、 System.property(”prop.custom”);
    • D、 System.getProperty(”prop.custom”);
    • E、 System.getProperties().getProperty(”prop.custom”);

    正确答案:D,E

  • 第2题:

    In the past several months, manual intervention has been required to correct improper cluster configuration changes. The administrator received a directive from management to create a more effective strategy for making the changes required fro month-end processing.  How can HACMP be used to meet the requirements of management’s directive?()  

    • A、 Create a snapshot for each of the required cluster configurations.
    • B、 Create a custom snapshot method to handle the configuration changes.
    • C、 Create a custom verification method to verify configuration changes.
    • D、 Create a cluster custom event to mange required configuration changes.

    正确答案:A

  • 第3题:

    While reviewing the hacmp.out after a node failure,an administrator realizes that the custom Event queue_down did not execute. The queue_down event shows up when a list of custom events is displayed.  What would be the next logical step to resolve this problem?()

    • A、 Delete the custom event and add a pre event and synchronize.
    • B、 Synchronize the cluster and recheck the cluster custom events.
    • C、 Create an application server that will stop and start the queues.
    • D、 Add a pre or post event to appropriate cluster events and synchronize.

    正确答案:D

  • 第4题:

    You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()

    • A、IWeb Event Custom Evaluator
    • B、Web Event Provider
    • C、Web Base Event
    • D、Web Audit Event

    正确答案:C

  • 第5题:

    An HACMP setting timer may used to allow:()  

    • A、 The setting or fallback of a cluster custom resource group
    • B、 The cluster time to stabilize before starting a custom resource group
    • C、 A priority node time to acquire custom resource group at cluster start
    • D、 A fallover node time to process custom resource states to be monitored

    正确答案:C

  • 第6题:

    单选题
    How are custom controls made?()
    A

    By assembling existing controls

    B

    By combining multipleXPages together

    C

    By creating a brand new widget from scratch

    D

    By writing the code for a brand new control


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    You want to use TCPMON between the two WS-Provisioning Service instances. How do you configure the endpoint of the partner WS-Provisioning service (i.e., the destination of step 3) so that TCPMON can be used?()
    A

    modify the ITFIMClientIDI.properties file

    B

    modify the ITFIMClientScript.constants file

    C

    use the IBM Tivoli Federated Identity Manager Console to modify a custom runtime parameter

    D

    use the WebSphere Application Server Administration Console to modify the WS-Provisioning application properties


    正确答案: A
    解析: 暂无解析

  • 第8题:

    多选题
    You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()
    A

    Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.

    B

    Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.

    C

    Select the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.

    D

    Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.


    正确答案: B,C
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following is NOT one of the three details you need to fill in on the New Custom Control dialog?()
    A

    Name of the custom control

    B

    Comments to describe the custom control

    C

    List of the controls that will make up this custom control

    D

    Application that will contain the custom control


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following are properties that can be set for Custom Controls?()
    A

    Specifying validation

    B

    Configuring data sources

    C

    Your own custom properties

    D

    All of the above


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()
    A

    By using a job scheduler such as cron

    B

    By enabling automatic cluster verification

    C

    By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rc

    D

    By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    Given: Which two, placed on line 13, will produce the output gobstopper?()
    A

    System.load("prop.custom");

    B

    System.getenv("prop.custom");

    C

    System.property("prop.custom");

    D

    System.getProperty("prop.custom");

    E

    System.getProperties().getProperty("prop.custom");


    正确答案: A,D
    解析: 暂无解析

  • 第13题:

    An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()

    • A、By using a job scheduler such as cron
    • B、By enabling automatic cluster verification
    • C、By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rc
    • D、By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods

    正确答案:A

  • 第14题:

    Which statement is false?() 

    • A、 custom URL categories cannot contain IP addresses
    • B、 custom URL categories cannot override predefined URL categories
    • C、 custom URL categories can contain domain names
    • D、 custom URL categories can use regular expressions

    正确答案:A

  • 第15题:

    A customer wants to create a custom Junos Pulse configuration. Which two are required?()

    • A、Connection set
    • B、Configuration set
    • C、Custom installer
    • D、Component set

    正确答案:A,D

  • 第16题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 10 domain controllers and 50 servers in application server roles. All servers run Windows Server 2003.   The application servers are configured with custom security settings that are specific to their roles as application servers. Application servers are required to audit account logon events, object access events, and system events. Application servers are required to have passwords that meet complexity requirements, to enforce password history, and to enforce password aging. Application servers must also be protected against man-in-the-middle attacks during authentication.  You need to deploy and refresh the custom security settings on a routine basis. You also need to be able to verify the custom security settings during audits.   What should you do? ()

    • A、 Create a custom security template and apply it by using Group Policy.
    • B、 Create a custom IPSec policy and assign it by using Group Policy.
    • C、 Create and apply a custom Administrative Template.
    • D、 Create a custom application server image and deploy it by using RIS.

    正确答案:A

  • 第17题:

    单选题
    You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets the following requirements.Sends an e-mail notification when an application error is logged in the event log .Runs a script to restart the computer if an application error occurs between 17.00 and 07.00 .Minimizes the administrative effort required to monitor applications. What should you do?()
    A

    On all the computers,configure a custom view. Configure a custom task for the application error events.

    B

    On a computer,configure a custom view to display the application errors. Configure a custom task for the application error events.

    C

    On a central computer, configure an event subscription. On all of the computers, configure a custom task in the Forwarded Events log.

    D

    On all the computers,configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.


    正确答案: C
    解析: 暂无解析

  • 第18题:

    单选题
    You are creating an ASP.NET Web site. The site has a master page named Custom.master. The code-behind file for Custom.master contains the following code segment.Partial Public Class Custom  Inherits System.Web.UI.MasterPagePublic Property Region As String    Protected Sub Page_Load(ByVal sender As Object,ByVal e As System.EventArgs) Handles Me.LoadEnd SubEnd Class You create a new ASP.NET page and specify Custom.master as its master page.You add a Label control named lblRegion to the new page.  You need to display the value of the master pages Region property in lblRegion.What should you do? ()
    A

    Add the following code segment to the Page_Load method of the page code-behind file. Dim custom As Custom = Me.Parent  lblRegion.Text = custom.Region

    B

    Add the following code segment to the Page_Load method of the page code-behind file. Dim custom As Custom = Me.Master  lblRegion.Text = custom.Region

    C

    Add the following code segment to the Page_Load method of the Custom.Master.vb code-behind file. Dim lblRegion As Label = Page.FindControl(lblRegion) lblRegion.Text = Me.Region

    D

    Add the following code segment to the Page_Load method of the Custom.Master.vb code-behind file. Dim lblRegion As Label = Master.FindControl(lblRegion) lblRegion.Text = Me.Region


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    An HACMP setting timer may used to allow:()
    A

     The setting or fallback of a cluster custom resource group

    B

     The cluster time to stabilize before starting a custom resource group

    C

     A priority node time to acquire custom resource group at cluster start

    D

     A fallover node time to process custom resource states to be monitored


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    While reviewing the hacmp.out after a node failure,an administrator realizes that the custom Event queue_down did not execute. The queue_down event shows up when a list of custom events is displayed.  What would be the next logical step to resolve this problem?()
    A

     Delete the custom event and add a pre event and synchronize.

    B

     Synchronize the cluster and recheck the cluster custom events.

    C

     Create an application server that will stop and start the queues.

    D

     Add a pre or post event to appropriate cluster events and synchronize.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()
    A

    Create a custom sign-in page with specific instructions in the Instructions field.

    B

    Create a custom sign-in page with specific Missing Certificate messages in the Custom error messages field.

    C

    Create a custom sign-in policy with specific instructions in the Instructions field.

    D

    Create a custom sign-in notification and assign it to the Pre-Auth Sign-in Notification in the sign-in policy.


    正确答案: B,D
    解析: 暂无解析

  • 第22题:

    单选题
    How can you modify the application to return more meaningful error messages to the user?()
    A

    Create a custom messages table. Include the necessary error handling code in the form modules to display the meaningful custom message instead of the ORA- error message. 

    B

    Provide users with a form in the application to query the ORA- error, that will return a custom message to replace the ORA- message. 

    C

    Eliminate constraints where possible, thereby limiting the number of error messages returned. 

    D

    Create a procedure to include the RETRIEVE_MESSAGE built-in that automatically translates common server errors into meaningful messages for use in Forms.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which statement is false?()
    A

     custom URL categories cannot contain IP addresses

    B

     custom URL categories cannot override predefined URL categories

    C

     custom URL categories can contain domain names

    D

     custom URL categories can use regular expressions


    正确答案: B
    解析: 暂无解析