Workload Manager
Support for AIX 5.3
Logical partitioning
64-bit or 32-bit kernel support
第1题:
A global container shipping company has a new application that they are going to deploy on a p5-570 at their corporate data center. The Chief Information Officer indicates that, if the application is down for more than 36 hours, the cost of downtime is very high. For the initial 36 hours of downtime, the company has a manual process they can execute without significant additional cost. Which of the following products best mitigates the major business risk to the company?()
第2题:
A company has 20 remotely located Microsoft Windows 2000 xSeries servers which need to deploy a non-IBM software application from a Windows 2000 xSeries server. How would they take advantage of IBM Director to be able to effectively deploy this application?()
第3题:
A hosting company recently purchased an IBM p5-570 to use in their data center. The company intends to use the server to run several different client workloads. Which of the following features of the IBM p5 servers addresses the need for the isolation of workloads?()
第4题:
Your company has 10 servers that run Windows Server 2008. The servers have Remote Desktop Protocol (RDP) enabled for server administration. RDP is configured to use default security settings. All administrators’ computers run Windows Vista. You need to ensure the RDP connections are as secure as possible.Which two actions should you perform? ()
第5题:
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()
第6题:
Your company has an Active Directory forest. The company has servers that run Windows Server 2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative templates that have been approved to support regulatory compliance requirements. Your partner company has an Active Directory forest that contains a single domain. The company has servers that run Windows Server 2008 R2 and client computers that run Windows 7. You need to configure your partner company’s domain to use the approved set of administrative templates. What should you do()
第7题:
netsh
tracert
ntdsutil
nslookup
第8题:
Workload Manager
Support for AIX 5.3
Logical partitioning
64-bit or 32-bit kernel support
第9题:
The best option is to use an A record for FederatedSharing.Company.com.
The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.
The best option is to use an A record for autodiscover.Company.com.
The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.
第10题:
Interconnect the service processors and use the IBM Director Agent
Install RSA II in each server and chain together the systems management processors
Install the RSA II in the top server and chain together the service processor interconnect
Install the IBM Director Agent on each server and use the remote control function to restart the servers
第11题:
Copy the image of the non-IBM servers and copy that image to the IBM servers, then reboot the IBM servers.
Copy the image from the non-IBM servers with RDM and install them with IBM Director to the new IBM servers. Reboot the IBM servers.
Install a fresh operating system using ServerGuide, and then install the applications and copy the data from the old servers.
Install a fresh operating system on the IBM servers and then run ServerGuide on the IBM servers to migrate the applications and data to the IBM servers.
第12题:
Use the authentication method of the default IPSec policies.
Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.
Create a custom IPSec policy and use certificate-based authentication.
Create a custom IPSec policy and use preshared key authentication.
Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.
第13题:
A customer has a large HP Intel infrastructure and is actively managing these servers with Insight Manager. They recently purchased an IBM x346 server for a remote office database project. They do not want to run additional systems management software but require to be notified of PFA and hardware alerting on critical hardware components. Which of the following solutions would accomplish this?()
第14题:
A company is consolidating four IBM System x servers. Each server has 500 GB of disk storage and each will grow to 2 TB within the next year. Additionally, the company will implement a SAN over the next year and must include connectivity and storage for its existing IBM System z and two IBM System p servers. Which storage solution meets the company requirements()
第15题:
A customer is running a number of non-IBM servers purchased two years ago and has settled on one of the new IBM xSeries servers as a migration path. From the following options, which is the preferred migration path?()
第16题:
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server. Which account type should you use? ()
第17题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP. The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server. You need to choose a secure authentication method. What should you do? ()
第18题:
You should use local Service account
You should use network Service account
You should use domain account
You should use local System account
第19题:
TSPEC IE
TSRS IE
WMM IE
TSM IE
第20题:
On each server in your office, use Performance Logs and Alers to create a baseline log. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.
From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.
第21题:
Remote Desktop Services (RDS)
Microsoft Application Virtualization (App-V)
Microsoft Virtual Desktop Infrastructure (VDI)
Microsoft Enterprise Desktop Virtualization (MED-V)
第22题:
Install an RSA II Slimline card on the IBM server and configure to send email alerts
Enable the IBM management option in Insight Manager
Install and configure a Director agent on the IBM server
Configure the systems management processor on the IBM server
第23题:
Request a Web server certificate from a commercial certification authority (CA).
Configure access restrictions based on employee ip address.
Enable Digest authentication for Windows domain servers.
Configure client certificate mapping.