单选题Which of the following virtualization technologies can save time during provisioning?()ACloningBSnapshotsCClusteringDVirtual memory
单选题
Which of the following virtualization technologies can save time during provisioning?()
A
Cloning
B
Snapshots
C
Clustering
D
Virtual memory
参考解析
解析:
暂无解析
相关考题:
Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?() A.802.11aB.802.11bC.802.11gD.802.11n
Which of the following wireless technologies can operate at only 5GHz?() A.802.11b/gB.802.11gC.802.11bD.802.11a
Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()A、MPLS TE FRB、MPLS VPNC、BFDD、RSVPE、VPLSF、SNMP
A WORM drive can be equated to which of the following common technologies?()A、 CDRWB、 CDRC、 Flash MediaD、 DVDRW
Which of the following wireless technologies can operate at only 5GHz?()A、802.11b/gB、802.11gC、802.11bD、802.11a
Which virtualization technologies can save time during provisioning?()A、CloningB、SnapshotsC、ClusteringD、Virtual memory
Which of the following are storage technologies that can be hot swappable?()A、SCSIB、SASC、ATAD、IDEE、CMOS
Which of the following Windows Server 2003 technologies can help with making backups of open files?()A、Differential backupB、SnapshotC、VSSD、Incremental backup
Which of the following virtualization technologies can save time during provisioning?()A、CloningB、SnapshotsC、ClusteringD、Virtual memory
Which of the following BEST describes how server virtualization can cut down IT costs? ()A、 Server virtualization increases server application performance allowing productivity to be increased.B、 Server virtualization simplifies server administration and reduces the IT department staffing needs.C、 Server virtualization implements higher security measures at the server OS level reducing the need for other security implementations.D、 Server virtualization is a more efficient use of hardware for multiple servers reducing the resource utilization.
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning
Which of the following technologies is specifically designed to increase server virtualization performance?()A、 Multicore processingB、 VTC、 64-bit processingD、 Hyperthreading
Which of the following technologies can detect and fix single bit memory errors?()A、RAIDB、Registered memoryC、SDRAMD、ECC
Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?()A、802.11aB、802.11bC、802.11gD、802.11n
Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()A、MulticastB、Active/passive clusterC、Active/active clusterD、DNS round robin
Which of the following functions can be performed using the Integrated Virtualization Manager?()A、Concurrent firmware updatesB、Management of virtual storageC、Hot add/remove of I/O drawersD、Management of Capacity on Demand
Which of the following can be utilized from a Legacy form without additional coding?()A、Field ValidationsB、Query Save logicC、Dialog formsD、All of the above
In the context of Advanced Power Virtualization, the shared pool refers to which of the following?()A、A pool of physical memory that can be used by any partitionB、A pool of physical processors that can be used by any virtual or dedicated partitionC、A pool of physical memory that can be used by multiple Micro-PartitionsD、A pool of physical processors that can be used by multiple Micro-Partitions
A system administrator is deploying a new POWER5 server. The application requires AIX 5L V5.2. Which of the following virtualization technologies can be used?()A、DLPARB、Micro-PartitioningC、Virtual StorageD、Virtual Ethernet
单选题Which of the following Windows Server 2003 technologies can help with making backups of open files?()A Differential backupB SnapshotC VSSD Incremental backup
多选题Which of the following technologies can be used to remotely gain access to a server console?()APS/2 KVMBLDAPCVNCDRemote desktopEVPN
单选题Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()AMPLS TE FRBMPLS VPNCBFDDRSVPEVPLSFSNMP
单选题Which of the following technologies can save server space and cooling requirements?()AEnergy star ratingsBActive solar panelsCNetwork storage arrayDBlade servers
单选题Which of the following technologies is specifically designed to increase server virtualization performance?()A Multicore processingB VTC 64-bit processingD Hyperthreading
单选题A WORM drive can be equated to which of the following common technologies?()A CDRWB CDRC Flash MediaD DVDRW
多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP
多选题Which of the following are storage technologies that can be hot swappable?()ASCSIBSASCATADIDEECMOS
单选题Which of the following wireless technologies can operate at only 5GHz?()A802.11b/gB802.11gC802.11bD802.11a