An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing

题目

An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()

  • A、Caching engines
  • B、QoS
  • C、Traffic shaping
  • D、Load balancing

相似考题
参考答案和解析
正确答案:D
更多“An administrator is implementing”相关问题
  • 第1题:

    What’s the steps of implementing MQC?


    正确答案: 1、Define a traffic class by using the class-map command.
    2、Create a traffic policy by using the policy-map command.
    3、Attach the traffic policy (policy map) to the interface by using the service-policy command.

  • 第2题:

    Which two statements are true about the implementation of QoS? ()

    • A、 Implementing DiffServ involves the configuration of RSVP.
    • B、 Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.
    • C、 Implementing IntServ involves the utilization of RSVP.
    • D、 Traffic should be classified and marked by the core network devices.
    • E、 Traffic should be classified and marked as close to the edge of the network as possible.

    正确答案:C,E

  • 第3题:

    An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again.  Which of the following is the MOST likely reason for this?()

    • A、 The administrator improperly configured the virtual memory settings on the server.
    • B、 The administrator is using incorrect patch switches for the install.
    • C、 The administrator is trying to install security patches for software that is not installed.
    • D、 The administrator is trying to install patches that require hard drive encryption on the server.

    正确答案:C

  • 第4题:

    An administrator is investigating an incident where an unauthorized user gained access to a servera nd modified HR files.The administrator has a tested theory as to how the user accomplished this.Which of the following actions should the administrator take NEXT?()

    • A、Perform a root cause analysis.
    • B、Implement a change to the servers.
    • C、Establish a plan of action to resolve the issue.
    • D、Question users prior to implementing the solution.

    正确答案:C

  • 第5题:

    An administrator is interested in implementing multiple shared processor pools on a new Power 595.  How many user-customizable multiple shared processor pools are available?()

    • A、 63
    • B、 64
    • C、 254
    • D、 255

    正确答案:A

  • 第6题:

    You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information What should you recommend?()

    • A、Creating cross-forest trusts
    • B、Implementing Federated Sharing
    • C、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007
    • D、Running the Microsoft Exchange Inter-Organization Replication tool

    正确答案:B

  • 第7题:

    You work as a system administrator at Certkiller.com. You are in the process of creating anASP.NET application using Microsoft .NET Framework v3.5.  You receive an instruction from management to create a custom-templated server control. Toensure productivity you need to make sure that the child controls of the newly created servercontrol are identified within the hierarchy of the page. You thus need to identify the interface thatwill accomplish this.  What should you do?()

    • A、You should consider implementing the IRequiresSessionState interface.
    • B、You should consider implementing the ITemplatable interface.
    • C、You should consider implementing the IPostBackDataHandler interface.
    • D、You should consider implementing the INamingContainer interface

    正确答案:D

  • 第8题:

    多选题
    What are three factors a network administrator must consider before implementing Netflow in the network?()
    A

    CPU utilization

    B

    where Netflow data will be sent

    C

    number of devices exporting Netflow data

    D

    port availability

    E

    SNMP version

    F

    WAN encapsulation


    正确答案: C,B
    解析: 暂无解析

  • 第9题:

    单选题
    ABC Corp. is implementing 11i Oracle Applications. The company has two local administrators in separate locations. They need to ensure that only a relevant set of users is visible to each of these local administrators. Which action will meet the requirement?()
    A

    create a separate role for each local administrator

    B

    specify user administration privileges in Oracle User Management

    C

    use Data Security to provide relevant access to each local administrator

    D

    use Function Security to provide relevant access to each local administrator


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    How can you create a listener class that receives events when the mouse is moved?()
    A

     By extending MouseListener.

    B

     By implementing MouseListener.

    C

     By extending MouseMotionListener.

    D

     By implementing MouseMotionListener.

    E

     Either by extending MouseMotionListener or extending MouseListener.

    F

     Either by implementing MouseMotion Listener or implementing MouseListener.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    A system administrator is implementing a new 2-way POWER5 server with APV that is to be divided into three partitions. The application groups have requested the following CPU entitlements for the partitions:  Partition 1: min = 1.0, max = 2.0, desired = 1.5  Partition 2: min = 1.0, max = 2.0, desired = 1.0  Partition 3: min = 0.1, max = 1.0, desired = 0.8  The administrator immediately finds that the three partitions cannot be started in order to run concurrently.  What changes can be made to entitlement configuration to allow all three partitions to be started in order?()
    A

    Change the max on Partition 1 to 1.5.

    B

    Change the desired on Partition 1 to 1.0.

    C

    Change the max and desired on Partition 1 and 2 to 1.0.

    D

    Change the min and desired on Partition 1 and 2 to 0.9.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    问答题
    What’s the steps of implementing MQC?

    正确答案: 1、Define a traffic class by using the class-map command.
    2、Create a traffic policy by using the policy-map command.
    3、Attach the traffic policy (policy map) to the interface by using the service-policy command.
    解析: 暂无解析

  • 第13题:

    You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information  What should you recommend?()

    • A、Creating cross-forest trusts
    • B、Implementing Federated Sharing
    • C、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007
    • D、Running the Microsoft Exchange Inter-Organization Replication tool

    正确答案:B

  • 第14题:

    It is a violation of the "separation of duties" principle when which of the fol-lowing individuals access the software on systems implementing security? 下列哪项个人访问对系统安全软件,是违反了“职责分离原则?()

    • A、systems auditor 系统审计员
    • B、systems programmer 系统程序员
    • C、security analyst 安全分析员
    • D、security administrator 安全管理员

    正确答案:B

  • 第15题:

    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

    • A、SSH
    • B、WEP
    • C、VPN
    • D、WPA

    正确答案:D

  • 第16题:

    An administrator is interested in implementing multiple shared processor pools on a new Power 595. How many user-customizable multiple shared processor pools are available?()

    • A、 63 
    • B、 64 
    • C、 254 
    • D、 255

    正确答案:A

  • 第17题:

    How can you create a listener class that receives events when the mouse is moved?()  

    • A、 By extending MouseListener.
    • B、 By implementing MouseListener.
    • C、 By extending MouseMotionListener.
    • D、 By implementing MouseMotionListener.
    • E、 Either by extending MouseMotionListener or extending MouseListener.
    • F、 Either by implementing MouseMotion Listener or implementing MouseListener.

    正确答案:D

  • 第18题:

    You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. You utilize the SP:Recompile event class to run SQL Server Profiler. You find that a great amount of recompiles occurring. The possible causes of the large number of recompiles should be identified.  From the flowing four options, which one is the most possible cause of the problem?()

    • A、The sp_executesql batches are not being recovered from the procedure cache.
    • B、A database administrator executed UPDATE STATISTICS statements on all tables, and the most common stored procedures reference all the tables.
    • C、One new stored procedure is created by a database administrator.
    • D、Ad hoc batches are not being recovered from the procedure cache.

    正确答案:B

  • 第19题:

    Which of the following lists of items all require an HMC to function with POWER5?()

    • A、Running AIX 5.3 Implementing HACMP Implementing Static LPAR
    • B、Implementing Advanced POWER Virtualization Running Linux Attaching RIO drawers
    • C、Implementing VIO Server Implementing Dynamic LPAR Running with SMT turned "On"
    • D、Running AIX and Linux on the same system Implementing CoD Implementing Micro-Partitioning

    正确答案:D

  • 第20题:

    单选题
    Which of the following lists of items all require an HMC to function with POWER5?()
    A

    Running AIX 5.3 Implementing HACMP Implementing Static LPAR

    B

    Implementing Advanced POWER Virtualization Running Linux Attaching RIO drawers

    C

    Implementing VIO Server Implementing Dynamic LPAR Running with SMT turned On

    D

    Running AIX and Linux on the same system Implementing CoD Implementing Micro-Partitioning


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    An administrator is interested in implementing multiple shared processor pools on a new Power 595.  How many user-customizable multiple shared processor pools are available?()
    A

     63

    B

     64

    C

     254

    D

     255


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()
    A

     Awareness of company policy requirements

    B

     Differentiating between archiving and backup processes

    C

     Awareness of potential legal requirements

    D

     Ensuring that the backups for the retention program cover key business areas


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. You utilize the SP:Recompile event class to run SQL Server Profiler. You find that a great amount of recompiles occurring. The possible causes of the large number of recompiles should be identified.  From the flowing four options, which one is the most possible cause of the problem?()
    A

    The sp_executesql batches are not being recovered from the procedure cache.

    B

    A database administrator executed UPDATE STATISTICS statements on all tables, and the most common stored procedures reference all the tables.

    C

    One new stored procedure is created by a database administrator.

    D

    Ad hoc batches are not being recovered from the procedure cache.


    正确答案: A
    解析: 暂无解析