多选题Which of the following technologies can be used to remotely gain access to a server console?()APS/2 KVMBLDAPCVNCDRemote desktopEVPN
多选题
Which of the following technologies can be used to remotely gain access to a server console?()
A
PS/2 KVM
B
LDAP
C
VNC
D
Remote desktop
E
VPN
参考解析
解析:
暂无解析
相关考题:
Which of the following Windows Server 2003 technologies can help with making backups of open files?() A. Differential backupB. SnapshotC. VSSD. Incremental backup
Which of the following technologies can save server space and cooling requirements?()A、Energy star ratingsB、Active solar panelsC、Network storage arrayD、Blade servers
Which of the following can be used to manage a servers BIOS remotely? ()A、 Remote desktop softwareB、 Dedicated management cardC、 Telnet sessionD、 IP KVME、 VPN
Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN
Which of the following commands can be used to gain root privileges and profile without initially logging in as root?()A、 su B、 su root C、 su - root D、 su -c "root"
Which of the following products and utilities can be used to update all encrypted data as well as the merchant key in a WebSphere Commerce database for a given instance?()A、The Database Update Tool found in Configuration ManagerB、The LDAP ServerC、The WebSphere Application Server Administrative ConsoleD、The WebSphere Commerce SecurityUpdate CommandE、The WebSphere Commerce Administration Console
Which of the following is a best practice that can be used to ensure consistency when building systems?()A、Server build checklistB、Server baselining toolsC、Architecture diagramsD、Hardware compatibility list
An administrator does not have console access to a Windows Server. Which of the following command line utilities should the administrator use to reboot the system remotely?()A、rebootB、pkillC、shutdownD、kill
Which of the following Windows Server 2003 technologies can help with making backups of open files?()A、Differential backupB、SnapshotC、VSSD、Incremental backup
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning
User 1 has a printer connected to a PC. User 2 is requesting the ability to print large documents to that printer. Which of the following is the BEST way for User 2 to gain access to the printer?()A、Use infrared to print remotely.B、Unplug the printer and install it on the new pc.C、Share the Printer in Windows.D、Update universal drivers to allow printing.
An administrator needs to configure a server to restrict mail traffic to an application server for security reasons. Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking
Which tasks can NOT be performed at the management console if the Client ID is being used?()A、Reboot the HMCB、Access the storage managerC、Shut down the consoleD、Access the storage system diagnostics
Which of the following can be used to re-deploy a system configuration in a disaster recovery scenario?()A、System planB、System profileC、Critical console dataD、VIO server partition profile
A system administrator is deploying a new POWER5 server. The application requires AIX 5L V5.2. Which of the following virtualization technologies can be used?()A、DLPARB、Micro-PartitioningC、Virtual StorageD、Virtual Ethernet
Which of the following methods can be used to detect block corruption?() A、 ANALYZE operationsB、 dbvC、 SQL queries that access the potentially corrupt blockD、 RMANE、 All of the above
单选题A system administrator has a server that is performing poorly. The vmstat command identifies that high CPU usage is the problem. Which of the following commands can be used to identify the eight most active processes running on the server?()Aps -ef -t8Bsar -u -p 8Cvmstat -t 8Dtopas -p8 -n0 -d0
单选题Which of the following Windows Server 2003 technologies can help with making backups of open files?()A Differential backupB SnapshotC VSSD Incremental backup
多选题Which of the following are storage technologies that can be hot swappable?()ASCSIBSASCATADIDEECMOS
多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP
多选题Which of the following can be used to manage a servers BIOS remotely? ()ARemote desktop softwareBDedicated management cardCTelnet sessionDIP KVMEVPN
单选题Which of the following is a best practice that can be used to ensure consistency when building systems?()A Server build checklistB Server baselining toolsC Architecture diagramsD Hardware compatibility list
多选题Which of the following interfaces in Windows server can be used to add a new volume for storage?()AComputer ManagementBSystem PropertiesCDevice ManagerDDisk ManagementEMy Computer
多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.
单选题Which of the following products and utilities can be used to update all encrypted data as well as the merchant key in a WebSphere Commerce database for a given instance?()AThe Database Update Tool found in Configuration ManagerBThe LDAP ServerCThe WebSphere Application Server Administrative ConsoleDThe WebSphere Commerce SecurityUpdate CommandEThe WebSphere Commerce Administration Console
多选题When executing the massload command to load catalog data into a WebSphere Commerce database on a remote DB2 server,which of the following can be used as valid values for the -method command line parameter?()AcreateBimportCloadDsqlimportEupdate
多选题Which of the following technologies can be used to remotely gain access to a server console?()APS/2 KVMBLDAPCVNCDRemote desktopEVPN
单选题Which of the following commands can be used to gain root privileges and profile without initially logging in as root?()A su B su root C su - root D su -c root