一个proxyplug-in放在一个cluster的前边,如果当前正在进行web请求的servercrash掉,请问plug-in根据()进行fail-over。
第1题:
网页请求到达时,Web应用引擎需要利用篡改检测模块来读取网页文件,篡改检测模块首先对即将访问文件进行完整性检查,根据检查结果决定如何反馈Web应用引擎,完成此次网络请求的处理。
第2题:
关于session的论述正确的有()
第3题:
以下哪些参数是防止一个CLUSTER内的路由环路?()
第4题:
以下从四种不同的作用域中得到Bean的实例,说法错误的是()。
第5题:
An administrator wants to install Web SMIT on a node that is not part of a cluster. Which PowerHA filesetprovides this function?()
第6题:
You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()
第7题:
Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()
第8题:
Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com. You also discover that there is only one port rule configured for Network Load Balancing cluster. You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only. Which two actions should you perform to achieve this objective()
第9题:
Log on to one of the cluster nodes and run the wlbs disable all command.
Open the Network Load Balancing Clusters console and delete the default port rules.
Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
第10题:
Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.
Use packet filtering on all inbound traffic to the cluster.
Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.
Use intrusion detection on the perimeter network.
第11题:
一个session可以对应数个用户
一个session只能对应一个用户
可以手动关闭一个session
session 如果不手动关闭,会一直存在Server中
第12题:
一个session可以对应数个用户
一个session只能对应一个用户
可以手动关闭一个session
session如果不手动关闭,会一直存在Server中
第13题:
用于辨别用户身份,进行session跟踪而存储在用户本地终端的数据是()。
第14题:
关于session论述正确的有:()
第15题:
当UE正在执行随机接入过程中收到另外一个随机接入请求,()将决定继续正在进行的随机接入过程或者接入新的过程。
第16题:
当UE正在执行随机接入过程中收到另外一个随机接入请求,()将决定继续正在进行随机接入过程或者接入新的过程。
第17题:
What is the functionality of redundant interfaces (reth) in a chassis cluster?()
第18题:
You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster. The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template. You need to implement protective measures against the cluster’s most significant security vulnerability. What should you do? ()
第19题:
Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()
第20题:
下述有关“中断优先级”的描述中不正确的是()。
第21题:
对
错
第22题:
reth interfaces are used only for VRRP.
reth interfaces are the same as physical interfaces.
reth interfaces are pseudo-interfaces that are considered the parent interface for two physical interfaces.
Each cluster member has a reth interface that can be used to share session state information with the other cluster members.
第23题:
Log on to one of the cluster nodes and run the wlbs disable all command.
Open the Network Load Balancing Clusters console and delete the default port rules.
Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.