niusouti.com

How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()A、Check the server.xml on the IMS Server.B、Check the database table IMSSyncDataType.C、Check the System p

题目

How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()

  • A、Check the server.xml on the IMS Server.
  • B、Check the database table IMSSyncDataType.
  • C、Check the System policies in the AccessAdmin.
  • D、Check the IMS Server settings of the IMS Configuration Utility.

相似考题
更多“How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()A、Check the server.xml on the IMS Server.B、Check the database table IMSSyncDataType.C、Check the System p”相关问题
  • 第1题:

    Which of the following can be used to determine the amount of physical memory installed in a laptop? ()

    • A、Check Device Manager Snap-in.
    • B、Type WINVER in the command prompt.
    • C、Check the BIOS.
    • D、Check System Information in the Accessibility folder.
    • E、Check System Information.

    正确答案:C,E

  • 第2题:

    The Business Partner technical specialist is called to check if the addition of host ports on an IBM System Storage DS8000 system has improved users’ response times for an IBM System p server running SAP.  How can the improvement be verified()

    • A、check the output of the vmstat command on AIX
    • B、check the performance reports via TotalStorage Productivity Center for Data
    • C、check the performance reports via TotalStorage Productivity Center for Disk
    • D、check the improvement through the TotalStorage Expert report

    正确答案:C

  • 第3题:

    The Business Partner technical specialist is called to determine if the addition of host ports on an IBM System Storage DS8700 has improved users’ response times for an IBM System p server running SAP.  How can the improvement be verified()

    • A、check the output of the "vmstat" command on LINUX
    • B、check the performance reports via Tivoli Storage Productivity Center for Data
    • C、check the performance reports via Tivoli Storage Productivity Center for Disk
    • D、check the output of the "iostat" command on AIX

    正确答案:C

  • 第4题:

    System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()

    • A、written by the Administrators on the INI files
    • B、propagated only with the Active Directory network service
    • C、propagated to the clients on the next Administrator access
    • D、propagated to clients the next time AccessAgent synchronizes with the IMS Server

    正确答案:D

  • 第5题:

    You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a text file which is named SQL01.log on the E: drive. A SQL Server Agent job executes every 2 minutes and logs information to the text file. You get a report from users saying that the sever doesn't make response. As the technical support, you check and find that the SQL Server Agent service does not run and the SQL Server Agent job no longer functions. You have to identify the reason why the SQL Server Agent service is unresponsive. In the options below, which log should you check?()  

    • A、You should check SQL1.log
    • B、You should check SQLAGENT.OUT
    • C、You should check log_xx.trc
    • D、You should check ERRORLOG

    正确答案:B

  • 第6题:

    Your company has an Active Directory Rights Management Services (AD RMS) server. Users  have Windows Vista computers. An Active Directory domain is configured at the Windows Server  2003 functional level.     You need to configure AD RMS so that users are able to protect their documents.     What should you do()

    • A、Install the AD RMS client 2.0 on each client computer.
    • B、Add the RMS service account to the local administrators group on the AD RMS server.
    • C、Establish an e-mail account in Active Directory Domain Services (AD DS) for each RMS user.
    • D、Upgrade the Active Directory domain to the functional level of Windows Server 2008.

    正确答案:C

  • 第7题:

    Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers.  You are planning to deploy a custom application.   You need to schedule the deployment to occur outside of business hours and without user interaction.   Which deployment method should you choose?()

    • A、software installation with Group Policy
    • B、Microsoft Application Virtualization (App-V)
    • C、Lite Touch Installation
    • D、software deployment with Microsoft System Center Configuration Manager 2007

    正确答案:D

  • 第8题:

    Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 has the Active Directory Federation Services (AD FS) role installed.   You have an application named App1 that is configured to use Server1 for AD FS authentication. You deploy a new server named Server2. Server2 is configured as an AD FS 2.0 server.  You need to ensure that App1 can use Server2 for authentication.   What should you do on Server2()

    • A、Add an attribute store.
    • B、Create a relying party trust.
    • C、Create a claims provider trust.
    • D、Create a relaying provider trust.

    正确答案:B

  • 第9题:

    You had installed an Active Directory Federation Services (AD FS) role on a Windows server 2008 in your organization. Now you need to test the connectivity of clients in the network to ensure that they can successfully reach the new Federation server and Federation server is operational. What should you do()

    • A、Go to Services tab, and check if Active Directory Federation Services is running
    • B、In the event viewer, Applications, Event ID column look for event ID 674.
    • C、Open a browser window, and then type the Federation Service URL for the new federation server. 
    • D、None of the above

    正确答案:B,C

  • 第10题:

    Your company has a server that runs Windows Server 2008 R2. Active Directory Certificate Services  (AD CS) is configured as a standalone Certification Authority (CA) on the server. You need to audit changes to the CA configuration settings and the CA security settings. Which two tasks should you perform()

    • A、Configure auditing in the Certification Authority snap-in.
    • B、 Enable  auditing  of  successful  and  failed  attempts  to  change  permissions  on  files  in  the %SYSTEM32%/CertSrv directory.
    • C、Enable auditing of successful and failed attempts to write to files in the %SYSTEM32%/CertLog directory.
    • D、Enable the Audit object access setting in the Local Security Policy for the Active Directory Certificate  Services (AD CS) server.

    正确答案:A,D

  • 第11题:

    单选题
    Regarding fast path processing, when does the system perform the policy check?()
    A

    The policy is determined after the SCREEN options check.

    B

    The policy is determined only during the first packet path, not during fast path.

    C

    The policy is determined after the zone check.

    D

    The policy is determined after the SYN TCP flag.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()
    A

    Check the server.xml on the IMS Server.

    B

    Check the database table IMSSyncDataType.

    C

    Check the System policies in the AccessAdmin.

    D

    Check the IMS Server settings of the IMS Configuration Utility.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    下列的HTML中哪个可以产生复选框?()

    • A、<input type="check">  
    • B、<checkbox>  
    • C、<input type="checkbox">  
    • D、<check>

    正确答案:C

  • 第14题:

    复选框的type属性值是()

    • A、checkbox
    • B、radio
    • C、select
    • D、check

    正确答案:A

  • 第15题:

    A basic TCP/IP configuration on the system has just been completed. A remote system can be pinged by IP address but not by hostname. Which of the following actions should be performed next in an effort to successfully ping using the hostname?()

    • A、Check routing
    • B、Check inetd.conf
    • C、Check /etc/resolv.conf
    • D、Check interface with ifconfig

    正确答案:C

  • 第16题:

    A customer has a development environment that uses the auto-deployment feature. The customer  claims the application is not redeployed even if the new version is copied to an application  subdirectory. Which two parameters of the configuration should you check?()

    • A、Check if archive file in the compressed version has a new REDEPLOY file.  
    • B、If server was started in the Development Mode. Auto-deployment is not supported in production  mode.  
    • C、If the application includes an EJB 3 module. Auto-deployment is not supported for EJBs.
    • D、You change JVM from HotSpot to JRockit. Auto-deployment is not supported in HotSpot auto  deployment.  
    • E、If the domain is a single-server domain. Auto-deployment is not supported in multiserver  domains.

    正确答案:B,E

  • 第17题:

    You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005.You work as a database administrator for your company. A SQL Server 2005 database is utilized in your company. And a table named Inventory is contained by the database. A column named Price is included by the table. According to the company policy, you cannot reduce more than 10 percent the value in the Price column in any single database operation. Through many kinds of method, the company makes updates to the Price column. For instance, the utilization of ad hoc queries is one of the methods. Since you are the database administrator, you should confirm that this company policy takes its effect. Which action should be performed?()

    • A、A stored procedure should be created, and changes are disallowed by the procedure to the Price column that violates company policy.
    • B、On the Price column, a check constraint should be created, and a specified minimum value is required by the check constraint.
    • C、A trigger should be created, and changes are rolled back by the trigger to the Price column that violates company policy.
    • D、On the Price column, a foreign key constraint is created to a table that valid prices are included.

    正确答案:C

  • 第18题:

    You have a Windows Server 2008 R2 Hyper-V server with a single network adapter that is connected to a virtual network. The virtual network is configured as External. Virtual machines (VMs) running on the server are not able to communicate with the host server over the network. You need to ensure that VMs running on the server are able to communicate with the host server over the network. In Virtual Network Manager,what should you do?()

    • A、Select the Internal only connection type.
    • B、Select the Private virtual machine network connection type.
    • C、Select the Allow management operating system to share this network adapter check box.
    • D、Clear the Allow management operating system to share this network adapter check box.

    正确答案:C

  • 第19题:

    Your network contains two servers named Server1 and Server2 that run Windows Server 2008  R2. Server1 has Active Directory Federation Services (AD FS) 2.0 installed. Server1 is a member  of an AD FS farm.     The AD FS farm is configured to use a configuration database that is stored on a separate  Microsoft SQL Server.   You install AD FS 2.0 on Server2.     You need to add Server2 to the existing AD FS farm.     What should you do()

    • A、On Server1, run fsconfig.exe.
    • B、On Server1, run fsconfigwizard.exe.
    • C、On Server2, run fsconfig.exe.
    • D、On Server2, run fsconfigwizard.exe.

    正确答案:C

  • 第20题:

    Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()

    • A、RemoteApp and Desktop Connections
    • B、software installation in Group Policy
    • C、Microsoft Application Virtualization (App-V)
    • D、Microsoft System Center Configuration Manager 2007

    正确答案:A

  • 第21题:

    Your network contains an Active Directory forest. All domain controllers run Windows Server  2008 Standard. The functional level of the domain is Windows Server 2003. You have a  certification authority (CA).   The relevant servers in the domain are configured as shown in the following table:     Server name  Operating system  Server role   Server1  Windows Server 2003  Enterprise root CA  Server2  Windows Server 2008  Enterprise subordinate CA  Server3  Windows Server 2008 R2  Web Server   You need to ensure that you can install the Active Directory Certificate Services (AD CS)  Certificate Enrollment Web Service on the network.     What should you do()

    • A、Upgrade Server1 to Windows Server 2008 R2.
    • B、Upgrade Server2 to Windows Server 2008 R2.
    • C、Raise the functional level of the domain to Windows Server 2008.
    • D、Install the Windows Server 2008 R2 Active Directory Schema updates.

    正确答案:D

  • 第22题:

    单选题
    While overhauling a jerk-type fuel pump it is necessary to replace the pump plungerWhich of the parts listed below must also be replaced?()
    A

    Delivery check valve

    B

    Pump barrel

    C

    Tubing to the injector

    D

    Cam follower


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    A customer has a development environment that uses the auto-deployment feature. The customer  claims the application is not redeployed even if the new version is copied to an application  subdirectory. Which two parameters of the configuration should you check?()
    A

    Check if archive file in the compressed version has a new REDEPLOY file.

    B

    If server was started in the Development Mode. Auto-deployment is not supported in production  mode.

    C

    If the application includes an EJB 3 module. Auto-deployment is not supported for EJBs.

    D

    You change JVM from HotSpot to JRockit. Auto-deployment is not supported in HotSpot auto  deployment.

    E

    If the domain is a single-server domain. Auto-deployment is not supported in multiserver  domains.


    正确答案: A,C
    解析: 暂无解析