多选题A company is deploying a Microsoft Windows-based, mission-critical Data Warehousing application.  The customer has specified 4GB of RAM.  Which TWO of the following questions will best help the consultant determine the proper memory configuration?()ADoes the application require a large paging space?BWhat is the anticipated memory/disk cache hit ratio?CDoes the application support Physical Address Extensions (PAE)?DAre there future plans to expand the amount of memory in the system?EDo the application availability requirements justify the use of Memory Mirroring technologies?

多选题
A company is deploying a Microsoft Windows-based, mission-critical Data Warehousing application.  The customer has specified 4GB of RAM.  Which TWO of the following questions will best help the consultant determine the proper memory configuration?()
A

Does the application require a large paging space?

B

What is the anticipated memory/disk cache hit ratio?

C

Does the application support Physical Address Extensions (PAE)?

D

Are there future plans to expand the amount of memory in the system?

E

Do the application availability requirements justify the use of Memory Mirroring technologies?


参考解析

解析: 暂无解析

相关考题:

Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App-V).You are creating an application virtualization package.Which should you use?()A.Microsoft Application Virtualization SequencerB.Microsoft Application Virtualization Desktop ClientC.Microsoft System Center Application Virtualization Streaming ServerD.Microsoft System Center Application Virtualization Management Server

All servers on your company’s network run Windows Server 2008 R2. All client computers run Windows Vista.  The company is planning to virtualize an application that is CPU intensive and that runs only on Windows Vista and Windows 7. You need to recommend a virtualization solution that minimizes the use of CPU resources on the server.    Which technology should you recommend?()A、Remote Desktop Services (RDS)B、Microsoft Application Virtualization (App-V)C、Microsoft Virtual Desktop Infrastructure (VDI)D、Microsoft Enterprise Desktop Virtualization (MED-V)

You need to recommend a solution for deploying App1. The solution must support the company’s  planned changes.   What should you include in the recommendation?()A、Group Policy Software InstallationB、Microsoft Application Virtualization (App-V)C、Microsoft Enterprise Desktop Virtualization (MED-V)D、Microsoft System Center Configuration Manager

A company is deploying a Microsoft Windows-based, mission-critical Data Warehousing application.  The customer has specified 4GB of RAM.  Which TWO of the following questions will best help the consultant determine the proper memory configuration?()A、Does the application require a large paging space?B、What is the anticipated memory/disk cache hit ratio?C、Does the application support Physical Address Extensions (PAE)?D、Are there future plans to expand the amount of memory in the system?E、Do the application availability requirements justify the use of Memory Mirroring technologies?

You need to recommend a technology to deploy and manage updates of Business_App for the public relations users. The solution must meet the company’s corporate requirements. Which technology should you recommend?()A、Microsoft System Center Virtualization ManagerB、Microsoft UpdateC、Microsoft Enterprise Desktop Virtualization (MED-V)D、Microsoft Application Virtualization (App-V)

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2000 and Microsoft Exchange Server 2003 Service Pack 2 (SP2) as their messaging solution.During the course of the business week you receive instruction from Company.com to transition the Exchange organization to Microsoft Exchange Server 2010 whilst preparing the Exchange organization for the deployment of the Exchange Server 2010 Hub Transport servers, Client Access and Mailbox servers.What should you do?()A、You should consider having the Microsoft Exchange Server 2010 Edge Transport server deployed first.B、You should consider having the Microsoft Exchange Server 2000 servers removed from the organization first.C、You should consider having the Active Directory Connector (ADC) installed first.D、You should consider having the Recipient Update service (RUS) objects deleted first.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 client access server named -ex16 that is accessible via the internet with the following: mail.Company.com or autodiscover.Company.com.during the course of the day you receive an instruction from the cio to ensure that the mobile users is able to make use of auto discover on the internet.What should you do?()A、The best option is to set the external URL for Microsoft-Server-ActiveSync to $NULL.B、The best option is to set the external URL for Microsoft-Server-ActiveSync to https:// ExamWays-ex16.com/Microsoft - Server - ActiveSync.C、The best option is to set the external URL for Microsoft-Server-ActiveSync to https://mail. Company.com/Microsoft- Server- ActiveSync.D、The best option is to set the external URL for Microsoft-Server-ActiveSync to http://autodiscover. Company.com/Microsoft- Server- ActiveSync.

You deploy mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. A server that runs Microsoft Exchange Server 2003 Service Pack 2 is configured by using the default installation settings.   Company security policy requires a complex password for unlocking the Windows Mobilebased devices.   You need to ensure that the Windows Mobilebased devices that perform Microsoft ActiveSync synchronization meet the company security policy.   Which two actions should you perform?()A、Enter all mobile device users in the Exceptions list.B、Enable the Require both numbers and letters option.C、Enable the Allow access to devices that do not fully support password settings option.D、Enable the Minimum password length (characters) option. Configure a value of 6 or greater.

You need to generate a report that lists all of the computers in the domain that can be converted to Hyper-V hosts. The solution must meet the company’s business requirements. What should you use to generate the report?()A、Microsoft System Center Virtual Machine ManagerB、Microsoft Desktop Optimization Pack (MDOP)C、Microsoft Assessment and Planning Toolkit (MAP)D、Microsoft System Center Operations Manager

All servers on your company’s network run Windows Server 2008 R2. All client computers run Windows Vista.  The company is planning to virtualize an application that runs only on Windows 2000 Professional. You need to recommend a virtualization solution that enables users to run the virtualized application while their computers are disconnected from the corporate network.    Which technology should you recommend?()A、Remote Desktop Services (RDS)B、Microsoft Application Virtualization (App-V)C、Microsoft Virtual Desktop Infrastructure (VDI)D、Microsoft Enterprise Desktop Virtualization (MED-V)

You plan to implement a WSUS server in a branch office.You need to recommend a solution for deploying the WSUS server that meets the company's technicalequirements.   What should you include in the recommendation?()A、an autonomous WSUS server that is configured to download updates from Microsoft UpdateB、an autonomous WSUS server that is configured to download updates from the WSUS server in the main officeC、a WSUS server running in replica mode that is configured to download updates from Microsoft UpdateD、a WSUS server running in replica mode that is configured to download updates from the WSUS server  in the main office

You need to generate a report that lists all of the computers in blueyonderairlines.com that can be converted to Hyper-V hosts. The solution must meet the company’s corporate requirements. What should you use to generate the report?()A、Microsoft System Center Operations ManagerB、Microsoft Desktop Optimization Pack (MDOP)C、Microsoft Assessment and Planning Toolkit (MAP)D、Microsoft System Center Virtual Machine Manager

Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App - V). You are creating an application virtualization package. Which sh ould you use?()A、Microsoft Application Virtualization SequencerB、Microsoft Application Virtualization Desktop ClientC、Microsoft System Center Application Virtualization Streaming ServerD、Microsoft System Center Application Virtualization Management Server

You need to recommend a solution for managing the GPOs that supports the company's planned changes.   What should you include in the recommendation?()A、Group Policy Management Console (GPMC) and Authorization ManagerB、Group Policy Management Console (GPMC) and Microsoft SharePoint Foundation 2010C、Microsoft Desktop Optimization Pack (MDOP)D、Microsoft System Center Configuration Manager

You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A、Microsoft Baseline Security Analyzer (MBSA)B、Microsoft Security Assessment Tool (MSAT)C、Resultant Set of Policy (RSoP)D、Security Configuration Wizard (SCW)

You deploy a mobile messaging solution by using front-end and back-end servers that run Microsoft Exchange Server 2003 Service Pack 2.   Company policy requires that all Microsoft Windows Mobilebased devices must support Microsoft Exchange ActiveSync communication that is Federal Information Processing Standard compliant.   You need to deploy the Windows Mobilebased devices.   What should you use?()A、Microsoft Windows Mobile 5.0B、Microsoft Windows Mobile 2003 for Pocket PCC、Microsoft Windows Mobile 2003 Second EditionD、Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to have the permission of a public folder named KingPublic modified.What should you do?()AYou should consider using the Microsoft Office Outlook tool.BYou should consider using the Public Folder Management Console tool.CYou should consider using the Exchange Control Panel (ECP) tool.DYou should consider using the Exchange Management Console (EMC) tool.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest named Company.com containing three sites named KingSite1, KingSite2 and KingSite3.The Company.com organization makes use of Microsoft Exchange Server 2007 Service Pack 1 (SP1) as their messaging solution.Company.com has additionally configured each site with two Client Access server, Mailbox server and Hub Transport Server.During the course of the business week you receive instruction from Company.com to install Microsoft Exchange Server 2010 in KingSite1 whilst ensuring that you use the least amount of administrative effort.What should you do?()AYou should consider having all Exchange servers in the organization upgraded to Microsoft Exchange Server 2007 Service Pack 2 (SP2).BYou should consider having all Exchange servers in KingSite1 and all Client Access servers in the organization upgraded to Microsoft Exchange Server 2007 Service Pack 2 (SP2).CYou should consider having all Client Access servers in the organization upgraded to Microsoft Exchange Server 2007 ServicePack 2 (SP2)DYou should consider having all Exchange servers in KingSite1 upgraded to Microsoft Exchange Server 2007 ServicePack 2 (SP2).

单选题You plan to implement a WSUS server in a branch office.You need to recommend a solution for deploying the WSUS server that meets the company's technicalequirements.   What should you include in the recommendation?()Aan autonomous WSUS server that is configured to download updates from Microsoft UpdateBan autonomous WSUS server that is configured to download updates from the WSUS server in the main officeCa WSUS server running in replica mode that is configured to download updates from Microsoft UpdateDa WSUS server running in replica mode that is configured to download updates from the WSUS server  in the main office

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server as their messaging solution.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server 2010 management tools on a computer running Microsoft Windows 7. What should you do?()AYou should consider having the Net.TCP Port Sharing service set to Automatic.BYou should consider having Microsoft .NET Framework 3.5.1 and the Internet Information Services (IIS) 6.0 Management console installed first.CYou should consider having the Telnet Client installed first.DYou should consider having the Exchange Best Practices Analyzer run first.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to install a new Exchange server to the network whilst ensuring that the network users are able to connect from the Internet to the new server using Exchange ActiveSync. What should you do?()AYou should consider having the Anonymous authentication enabled for the Microsoft-Server- ActiveSync virtual directory.BYou should consider having the Windows Integrated Authentication enabled for the Microsoft-Server- ActiveSync virtual directory.CYou should consider having the internal URL for the Microsoft-Server-ActiveSync virtual directory modified.DYou should consider having the external URL for the Microsoft-Server-ActiveSync virtual directory modified.

单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()AmsiBmstCzapDzip

多选题Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You manage client computers by using Microsoft System Center Configuration Manager 2007 R2. You are deploying Microsoft Enterprise Desktop Virtualization (MED-V) to support client virtualization requirements. You need to ensure that administrators can centrally store MED-V logging information and generate reports. Which two actions should you perform?()AInstall and configure IIS on a member server.BConfigure a shared folder on a member server.CInstall and configure Microsoft SQL Server 2008 on a member server.DConfigure permissions for the shared folder on a member server.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.During the course of the business week you receive instruction from Company.com to install Microsoft Exchange Server 2010 using the installation media. What should you do?()AYou should consider having the adprep.exe //forestprep command run from the Microsoft Windows Server 2008 installation media.BYou should consider having the adprep.exe /domainprep command run from the Microsoft Windows Server 2008 installation media.CYou should consider having the setup /ps command run from the Microsoft Exchange Server 2010 installation media.DYou should consider having the setup /NewProvisionedServer command from the Microsoft Exchange Server 2010 installation media.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to create Personal Archives for the users with mailboxes.What should you do?()AYou should consider having the Exchange Management Console (EMC) tool used.BYou should consider having Microsoft Office Outlook tool used.CYou should consider having Active Directory Users and Computers tool used.DYou should consider having the Exchange Control Panel (ECP) tool used.

多选题Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You manage client computers by using Microsoft System Center Configuration Manager 2007 R2. You are deploying Microsoft Enterprise Desktop Virtualization (MED -V) to support client virtualization requirements. You need to ensure that administrators can centrally store MED - V logging in formation and generate reports. Which two actions should you perform?()AInstall and configure IIS on a member server.BConfigure a shared folder on a member server.CInstall and configure M icrosoft SQL Server 2008 on a member server.DConfigure permissions for the shared folder on a member server.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()AYou should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.BYou should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.CYou should consider having the new server joined to an Active Directory domain.DYou should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com servers are currently configured as members of the Database Availability Group (DAG).During the course of the business week you receive instruction from Company.com to deploy Microsoft Exchange Server 2010 by selecting the operating system which can be used to install Microsoft Exchange Server 2010 whilst ensuring your solution minimizes the cost.What should you do?()AYou should consider having Microsoft Exchange Server 2010 installed on Microsoft Windows Server 2003 Service Pack 2 (SP2) Enterprise Edition.BYou should consider having Microsoft Exchange Server 2010 installed on Microsoft Windows Server 2008 Service Pack 2 (SP2) Enterprise Edition.CYou should consider having Microsoft Exchange Server 2010 installed on Microsoft Windows Server 2003 R2 Standard Edition.DYou should consider having Microsoft Exchange Server 2010 installed on Microsoft Windows Server 2008 R2 Standard Edition.