更多“一个proxyplug-in放在一个cluster的前边,如果当前正在进行web请求的servercrash掉,请问plug-in根据()进行fail-over。A、根据session cookieB、随机C、根据对cluster的heart-beat检测D、用户决定”相关问题
  • 第1题:

    网页请求到达时,Web应用引擎需要利用篡改检测模块来读取网页文件,篡改检测模块首先对即将访问文件进行完整性检查,根据检查结果决定如何反馈Web应用引擎,完成此次网络请求的处理。


    正确答案:正确

  • 第2题:

    关于session的论述正确的有()

    • A、一个session可以对应数个用户
    • B、一个session只能对应一个用户
    • C、可以手动关闭一个session
    • D、session如果不手动关闭,会一直存在Server中

    正确答案:B,C

  • 第3题:

    以下哪些参数是防止一个CLUSTER内的路由环路?()

    • A、ROUTER_ID
    • B、CLUSTER_ID
    • C、ORIGINATOR_ID
    • D、CLUSTER_LIST

    正确答案:B

  • 第4题:

    以下从四种不同的作用域中得到Bean的实例,说法错误的是()。

    • A、page是指当前Web应用程序的所有JSP文件中取得实例,从Page对象中获取JavaBean
    • B、request是指在当前的用户请求中取得实例,从ServletRequest对象中获取JavaBean
    • C、session是指在当前的用户会话中取得实例,常用于一个用户登录在网站上全过程不同请求之间共享数据,从HttpSession对象中获取JavaBean
    • D、application是指在当前的应用程序中取得实例,常用于同一个应用程序不同用户访问时共享数据,从ServletContext对象中获取JavaBean

    正确答案:A

  • 第5题:

    An administrator wants to install Web SMIT on a node that is not part of a cluster. Which PowerHA filesetprovides this function?()

    • A、cluster.sysmgt.wsm
    • B、cluster.es.client.wsm
    • C、cluster.es.server.websm
    • D、cluster.sysmgt.websm.rte

    正确答案:B

  • 第6题:

    You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()

    • A、Create a Network Load Balancing cluster that contains the Outlook Web Access servers
    • B、Create a Microsoft Cluster Server cluster that contains the Outlook Web Access servers
    • C、Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailbox
    • D、Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers

    正确答案:A

  • 第7题:

    Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()

    • A、Log on to one of the cluster nodes and run the wlbs disable all command.
    • B、Open the Network Load Balancing Clusters console and delete the default port rules.
    • C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
    • D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

    正确答案:B,C

  • 第8题:

    Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()

    • A、Create a new rule for TCP port 80 by using the Network Load Balancing Cluster console
    • B、Run the wlbs disable command on the cluster nodes
    • C、Assign a unique port rule for NLB cluster by using the NLB Cluster console
    • D、Delete the default port rules through Network Load Balancing Cluster console

    正确答案:A,D

  • 第9题:

    多选题
    Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()
    A

    Log on to one of the cluster nodes and run the wlbs disable all command.

    B

    Open the Network Load Balancing Clusters console and delete the default port rules.

    C

    Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.

    D

    Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.


    正确答案: C,A
    解析: 暂无解析

  • 第10题:

    单选题
    You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()
    A

     Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.

    B

     Use packet filtering on all inbound traffic to the cluster.

    C

     Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.

    D

     Use intrusion detection on the perimeter network.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    关于session论述正确的有:()
    A

    一个session可以对应数个用户

    B

    一个session只能对应一个用户

    C

    可以手动关闭一个session

    D

    session 如果不手动关闭,会一直存在Server中


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    关于session的论述正确的有()
    A

    一个session可以对应数个用户

    B

    一个session只能对应一个用户

    C

    可以手动关闭一个session

    D

    session如果不手动关闭,会一直存在Server中


    正确答案: A,D
    解析: 暂无解析

  • 第13题:

    用于辨别用户身份,进行session跟踪而存储在用户本地终端的数据是()。

    • A、Cookie
    • B、浏览器
    • C、账户信息
    • D、身份信息

    正确答案:A

  • 第14题:

    关于session论述正确的有:()

    • A、一个session可以对应数个用户
    • B、一个session只能对应一个用户
    • C、可以手动关闭一个session
    • D、session 如果不手动关闭,会一直存在Server中

    正确答案:C

  • 第15题:

    当UE正在执行随机接入过程中收到另外一个随机接入请求,()将决定继续正在进行的随机接入过程或者接入新的过程。

    • A、UE
    • B、eNodeB
    • C、MME
    • D、SGW

    正确答案:A

  • 第16题:

    当UE正在执行随机接入过程中收到另外一个随机接入请求,()将决定继续正在进行随机接入过程或者接入新的过程。

    • A、UE
    • B、eNodeB
    • C、MME
    • D、SGW

    正确答案:A

  • 第17题:

    What is the functionality of redundant interfaces (reth) in a chassis cluster?()

    • A、reth interfaces are used only for VRRP.
    • B、reth interfaces are the same as physical interfaces.
    • C、reth interfaces are pseudo-interfaces that are considered the parent interface for two physical interfaces.
    • D、Each cluster member has a reth interface that can be used to share session state information with the other cluster members.

    正确答案:C

  • 第18题:

    You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()

    • A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.
    • B、 Use packet filtering on all inbound traffic to the cluster.
    • C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.
    • D、 Use intrusion detection on the perimeter network.

    正确答案:B

  • 第19题:

    Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()

    • A、Log on to one of the cluster nodes and run the wlbs disable all command.
    • B、Open the Network Load Balancing Clusters console and delete the default port rules.
    • C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
    • D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

    正确答案:B,C

  • 第20题:

    下述有关“中断优先级”的描述中不正确的是()。

    • A、中断的请求是随机的,不同外设可能同时请求中断
    • B、当有两个中断源请求中断时,CPU随机响应其中的一个中断请求
    • C、中断优先级是指根据不同中断的轻重缓急,为每一个中断源分配一个优先权
    • D、CPU正在处理一个低优先级中断时,如果接收到一个高优先级中断请求,CPU会暂停当前中断执行,先处理优先级较高的中断请求

    正确答案:B

  • 第21题:

    判断题
    网页请求到达时,Web应用引擎需要利用篡改检测模块来读取网页文件,篡改检测模块首先对即将访问文件进行完整性检查,根据检查结果决定如何反馈Web应用引擎,完成此次网络请求的处理。
    A

    B


    正确答案:
    解析: 暂无解析

  • 第22题:

    单选题
    What is the functionality of redundant interfaces (reth) in a chassis cluster?()
    A

    reth interfaces are used only for VRRP.

    B

    reth interfaces are the same as physical interfaces.

    C

    reth interfaces are pseudo-interfaces that are considered the parent interface for two physical interfaces.

    D

    Each cluster member has a reth interface that can be used to share session state information with the other cluster members.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()
    A

    Log on to one of the cluster nodes and run the wlbs disable all command.

    B

    Open the Network Load Balancing Clusters console and delete the default port rules.

    C

    Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.

    D

    Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.


    正确答案: A,D
    解析: 暂无解析