A storage specialist needs to create a new host connection using the DSCLI. Which of the following parameters identifies the host()
第1题:
You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command "ip access-group 101 in" to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()
A. Telnet sessions from host A to host 5.1.1.10
B. Telnet sessions from host A to host 5.1.3.10
C. Telnet sessions from host B to host 5.1.2.10
D. Telnet sessions from host B to host 5.1.3.8
E. Telnet sessions from host C to host 5.1.3.10
F. Telnet sessions from host F to host 5.1.1.10
第2题:
In the "host to host" layer of the DOD model, which of the following is a valid connection oriented protocol?()
第3题:
When configuring the messaging system, which of the following are parameters of the e-mail transport? ()
第4题:
When using CHKDSK, which of the following parameters locks the volume, locates bad sectorsand recovers readable information?()
第5题:
Which of the following is used to gather Disk Magic information on a Windows host that will be used for determining the optimum configuration of an IBM System Storage DS8800?()
第6题:
What is the correct order to create an object in a new IBM System Storage DS8000 to get a LUN provided to a host()
第7题:
While planning the logical volume design of a new install, Companycom considered using a striped logical volume for performance. They want to be able to extend the logical volume in the future. Which of the following actions will provide this capability?()
第8题:
Connection Manager features cannot be used with which of the following naming method? ()
第9题:
Your company has an Active Directory Domain Services (AD DS) domain. You have a Windows Server 2008 R2 Hyper-V server. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to ensure that a user can create new virtual machines (VMs) on only a specific set of servers . The user must not be able to see or manage servers outside of that set within VMM . Which two actions should you perform?()
第10题:
ARP
RARP
TCP
UDP
IP
ICMP
BootP
第11题:
Opening the database in RESTRICTED mode
Opening the database with the RESETLOGS option
Setting a new DBID for the newly restored database
Restoring the server parameter file (SPFILE) to the new host
第12题:
hosttype
volume group
ioports
WWPN
第13题:
The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()
A.from host PC1 to host 5.1.1.10
B.from host PC1 to host 5.1.3.10
C.from host PC2 to host 5.1.2.10
D.from host PC2 to host 5.1.3.8
第14题:
An administrator needs to review the open ports on a host. Which of the following commands should they use?()
第15题:
When an LNS sends a Start Control Connection Reply to a LAC,which three parameters can be conveyed?()
第16题:
A customer is consolidating their ten rack mount Windows servers into a VMware environment with four servers. The existing servers all have internal disk. The total amount of useable capacity is 5TB which is expected to increase to 10TB over the life of this asset. The customer will want to use the advanced features of VMware like VMotion.The customer is concerned about cost. Which of the following meets the customers needs? ()
第17题:
A customer has two locations that host their pSeries servers. Traffic is being routed through the public Internet. The customer needs to exchange confidential financial data between the servers. Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()
第18题:
Tiered disk systems (DS8700 and DS5020), tape backup and Cisco director(s) utilizing VSANs have been proposed as a solution. The storage specialist is asked to explain the technical advantage of using Cisco directors and VSANs. Which of the following is the key point to stress to the customer()
第19题:
After you have restored and recovered a database to a new host by using a previously performed Recovery Manager (RMAN) backup, which is the best option you would consider for the new database?()
第20题:
A Windows Communication Foundation (WCF) service is self-hosted in a console application. The service implements the IDataAccess contract, which is defined in the MyApplication namespace. The service is implemented in a class named DataAccessService which implements the IDataAccess interface and also is defined in the MyApplication namespace. The hosting code is as follows. (Line numbers are included for reference only.) 01 static void Main(string[] args) 02 { 03 ServiceHost host; 04 ... 05 host.Open( ); 06 Console.ReadLine( ); 07 host.Close( ); 08 } You need to create a ServiceHost instance and assign it to the host variable. You also need to instantiate the service host.Which line of code should you insert at line 04?()
第21题:
You work as an IT support specialist. Your job responsibilities include managing server storage. You aredesigning storage for a new application server. The application makes heavy use of temporary storage, andyou want to allocate three 20-GB disk drives to that storage. If excellent read and write performance is ahigh priority,and you also want to use as much available space as possible,which of the following volumetypes should you create?()
第22题:
Computer Management
System Properties
Device Manager
Disk Management
My Computer
第23题:
/r
/f
/i
/x