更多“Which of the following technologies can detect and fix singl”相关问题
  • 第1题:

    A WORM drive can be equated to which of the following common technologies?()

    • A、 CDRW
    • B、 CDR
    • C、 Flash Media
    • D、 DVDRW

    正确答案:B

  • 第2题:

    Which of the following wireless technologies can operate at only 5GHz?()

    • A、802.11b/g
    • B、802.11g
    • C、802.11b
    • D、802.11a

    正确答案:D

  • 第3题:

    Which of the following Windows Server 2003 technologies can help with making backups of open files?()

    • A、Differential backup
    • B、Snapshot
    • C、VSS
    • D、Incremental backup

    正确答案:C

  • 第4题:

    Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()

    • A、Intrusion detection
    • B、Virtualization
    • C、Kiting
    • D、Cloning

    正确答案:B

  • 第5题:

    Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?()

    • A、802.11a
    • B、802.11b
    • C、802.11g
    • D、802.11n

    正确答案:D

  • 第6题:

    A system administrator is deploying a new POWER5 server. The application requires AIX 5L V5.2.  Which of the following virtualization technologies can be used?()

    • A、DLPAR
    • B、Micro-Partitioning
    • C、Virtual Storage
    • D、Virtual Ethernet

    正确答案:A

  • 第7题:

    单选题
    Which of the following Windows Server 2003 technologies can help with making backups of open files?()
    A

     Differential backup

    B

     Snapshot

    C

     VSS

    D

     Incremental backup


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following nondestructive testing methods can be used to detect a suspected subsurface defect in a tail-shaft liner?()
    A

    Dye penetrant

    B

    Magnetic particle

    C

    Ultrasonic

    D

    All of the above


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following technologies can save server space and cooling requirements?()
    A

    Energy star ratings

    B

    Active solar panels

    C

    Network storage array

    D

    Blade servers


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following methods can be used to detect block corruption?()
    A

     ANALYZE operations

    B

     dbv

    C

     SQL queries that access the potentially corrupt block

    D

     RMAN

    E

     All of the above


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    Which of the following are storage technologies that can be hot swappable?()
    A

    SCSI

    B

    SAS

    C

    ATA

    D

    IDE

    E

    CMOS


    正确答案: C,B
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following statements is NOT a characteristic of a welfare state mentioned in this passage?
    A

    Free education is available to a child.

    B

    Laws are made to fix the minimum wage.

    C

    A jobless person can be insured.

    D

    There are regulations for rent.


    正确答案: C
    解析:
    本题可参照文章的最后一段。从中可知,B、C、D三项在这一段中均已提及,只有A项没有提到。因此A项是正确答案。

  • 第13题:

    Which two statements are true about the RMAN validate database command?()

    • A、It checks the database for intrablock corruptions.
    • B、It can detect corrupt pfiles.
    • C、It can detect corrupt spfiles.
    • D、It checks the database for interblock corruptions.
    • E、It can detect corrupt block change tracking files.

    正确答案:A,C

  • 第14题:

    Which of the following are storage technologies that can be hot swappable?()

    • A、SCSI
    • B、SAS
    • C、ATA
    • D、IDE
    • E、CMOS

    正确答案:A,B

  • 第15题:

    Which of the following virtualization technologies can save time during provisioning?()

    • A、Cloning
    • B、Snapshots
    • C、Clustering
    • D、Virtual memory

    正确答案:A

  • 第16题:

    Which of the following technologies can detect and fix single bit memory errors?()

    • A、RAID
    • B、Registered memory
    • C、SDRAM
    • D、ECC

    正确答案:D

  • 第17题:

    Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()

    • A、Multicast
    • B、Active/passive cluster
    • C、Active/active cluster
    • D、DNS round robin

    正确答案:C

  • 第18题:

    Which of the following methods can be used to detect block corruption?()  

    • A、 ANALYZE operations
    • B、 dbv
    • C、 SQL queries that access the potentially corrupt block
    • D、 RMAN
    • E、 All of the above

    正确答案:E

  • 第19题:

    多选题
    Which of the following technologies can be used to remotely gain access to a server console?()
    A

    PS/2 KVM

    B

    LDAP

    C

    VNC

    D

    Remote desktop

    E

    VPN


    正确答案: B,A
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()
    A

    MPLS TE FR

    B

    MPLS VPN

    C

    BFD

    D

    RSVP

    E

    VPLS

    F

    SNMP


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    A WORM drive can be equated to which of the following common technologies?()
    A

     CDRW

    B

     CDR

    C

     Flash Media

    D

     DVDRW


    正确答案: C
    解析: 暂无解析

  • 第22题:

    多选题
    Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()
    A

    Spanning Tree Protocol

    B

    Shortest path first tree

    C

    Link-state advertisements (LSA)

    D

    Hold-down timers

    E

    Split horizon

    F

    VRP


    正确答案: D,A
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following wireless technologies can operate at only 5GHz?()
    A

    802.11b/g

    B

    802.11g

    C

    802.11b

    D

    802.11a


    正确答案: C
    解析: 暂无解析