单选题An IT services provider, has a new requirement for you to be able to field general calls concerning System x Servers as a backup function for a tech support person in your company. You have been told to pass on anything that requires more of a solutions-based answer and only answer questions regarding what option goes with what servers. What tool best accomplishes this task?()AIBM Configurations and Options GuideBIBM Server ProvenCIBM System x Sales Configuration AidDIBM xREF SheetsEIBM Standalone Solutions Configuration Tool
单选题
An IT services provider, has a new requirement for you to be able to field general calls concerning System x Servers as a backup function for a tech support person in your company. You have been told to pass on anything that requires more of a solutions-based answer and only answer questions regarding what option goes with what servers. What tool best accomplishes this task?()
A
IBM Configurations and Options Guide
B
IBM Server Proven
C
IBM System x Sales Configuration Aid
D
IBM xREF Sheets
E
IBM Standalone Solutions Configuration Tool
参考解析
解析:
暂无解析
相关考题:
You have assembled your thoughts into a message. As you pass this information to a second party, you are giving this person your:A InputB OutputC DataD FeedbackE A and C
155 You have assembled your thoughts into a message. As you pass this information to a second party, you are giving this person your:A. InputB. OutputC. DataD. FeedbackE. A and C
If it has been over 12 hours since you missed a dose, you should .A. change the amount of your next doseB, eat more when taking your next doseC. have a dose as soon as you rememberD. take the next dose at your regular time
You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()A. Run the following command: ntbackup.exe backup /F {FileName}B. Run the following command: ntbackup.exe backup systemstate /F {FileName}C. In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.D. Use NTBackup interactively.
An IT services provider, has a new requirement for you to be able to field general calls concerning System x Servers as a backup function for a tech support person in your company. You have been told to pass on anything that requires more of a solutions-based answer and only answer questions regarding what option goes with what servers. What tool best accomplishes this task?()A、IBM Configurations and Options GuideB、IBM Server ProvenC、IBM System x Sales Configuration AidD、IBM xREF SheetsE、IBM Standalone Solutions Configuration Tool
You have successfully sold and installed your customer’s System x solution. Sometimes, the overall succeed of a sale depends on how well you have trained your customer to support their new hardware. Please consider the following tools. Which one would be the best for protectively determining a server outage, and contacting the system administrator about the outage?()A、CDATB、Configuration and Options Guide (COG)C、Physical Alarm Sounding in Data CenterD、IBM Systems Director
A solution provider has proposed a pSeries solution to a new customer. The solution is complex with a number of technologies that are new to the customer. They have a tight timeline for implementation. The solution provider has not been able to get a clear understanding as to how the customer will backup the system. What would be the most appropriate action to address the risks with this solution?()A、Sell SysbackB、Conduct a SARC、Sell SupportlineD、Provide a project timeline
You are using a recovery catalog to maintain Recovery Manager (RMAN) backup information for your production database. You have registered your production database and are performing regular backups. Because of a new requirement you have added a few new tablespaces to your production database and you want them to be included in backups. Identify two options for completing this task.()A、 Reregistering the target database in recovery catalogB、 Transporting the new tablespaces to the recovery catalog databaseC、 Syncronizing the recovery catalog with the target database control fileD、 Performing a fresh backup of the target database to include the new data files in the catalog database
You are ready to implement RMAN in the backup and recover strategy for your company. Which system privilege must the RMAN user have to be able to connect and execute RMAN commands on a target database?()A、SYSDBAB、SYSOPERC、No system privileges are required for the RMAN user.D、Only SYS user can connect and execute RMAN commands on a target database.
You have an Exchange Server 2010 organization. Your company has a relationship with another company. The partner company has an Exchange Server 2010 organization. You need to recommend a security solution to meet the following requirements: .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A、Active Directory Rights Management Services (AD RMS)B、Domain SecurityC、Forms-based AuthenticationD、Secure/Multipurpose Internet Mail Extensions (S/MIME)
You are the administrator of your company's network. You are preparing to deploy 20 new Windows 2000 Professional computers on your network. You want to be able to recover from disk failures and corrupt system files on the new computers. You want to configure the computers to automatically update their system configuration and emergency repair files on a scheduled bases. What should you do?()A、Use the at command to schedule a weekly job to back up the boot partition.B、Use the at command to schedule a weekly job to run the system file checker.C、Use Windows backup to schedule a backup of the System State Data.D、Use Windows backup to schedule a backup of the system partition and the boot partition.
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runs Terminal Services. A user has remotely logged on to the Terminal Server. The user requires help to use anapplication. When you connect to the Terminal Server session, you are not able to operate any applications. You have to make sure that you can assist any user on the Terminal Server. So what action should you perform to achieve this?()A、Use remote control should be enabled with the following settings in the RDP-Tcp Properties. The Levelof control policy setting should be configured to Interact with the session. The user should be instructedto log off and log back on.B、After the Tscon /v command is run from the Terminal Server, reconnect to the session.C、After the Chgusr /execute command is run on the Terminal Server, reconnect to the session.D、Use remote control should be enabled with default user settings in the RDP-Tcp Properties.
You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. The organization consists of 40 servers is configured to run Exchange Server 2010. A new TestKing.com security policy requires that approved server patches of Exchange and Windows aswell as security updates be applied to servers within seven days of it being released. During the course of day you receive an instruction from management to: * Ensure that only approved patches and security updates are installed. * Ensure that only administrators are allowed to approve patches and security updates manually. * Ensure that the deployment casts is reduced. * Ensure that the administrative effort of deploying patched is reduced. You are instructed to recommend a solution that will comply with the set criteria. What should you do?()A、You should recommend that Microsoft System Center Configuration Manager be included in your solution.B、You should recommend that Windows Update be included in your solution.C、You should recommend that Windows Server Update Services be included in your solution.D、You should recommend that Microsoft Update be included in your solution.
You are the network administrator for your company. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. You successfully install a new server named Server9. Immediately afterward, you perform the first backup of the server. The date is January 25, 2003. Next, you add a user named Anna to the local Backup Operators group. You direct Anne to perform nightly backups of Server9. One week later, you try to review the backup logs for Server9. The Backup utility displays the information show in the exhibit Exhibit: Backup Reports Report date, time and backup job name: 1/25/2003 4:12 PM - Interactive You verify that Anne is performing nightly backups. You need to be able to review the backup logs for the previous week. What should you do?()A、Add your user account to the local Backup Operators group.B、Direct Anne to use her user account to log on and open the Backup utility.C、In the Backup utility, select the verify data after the backup completes check box.D、Open %windir%/System32/LogFiles. Create a new subfolder named BackupLogs.
You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()A、Run the following command: ntbackup.exe backup /F {"FileName"}B、Run the following command: ntbackup.exe backup systemstate /F {"FileName"}C、In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.D、Use NTBackup interactively.
单选题You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()ARun the following command: ntbackup.exe backup /F {FileName}BRun the following command: ntbackup.exe backup systemstate /F {FileName}CIn Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.DUse NTBackup interactively.
单选题You are the administrator of your company's network. You are preparing to deploy 20 new Windows 2000 Professional computers on your network. You want to be able to recover from disk failures and corrupt system files on the new computers. You want to configure the computers to automatically update their system configuration and emergency repair files on a scheduled bases. What should you do?()AUse the at command to schedule a weekly job to back up the boot partition.BUse the at command to schedule a weekly job to run the system file checker.CUse Windows backup to schedule a backup of the System State Data.DUse Windows backup to schedule a backup of the system partition and the boot partition.
单选题You are the network administrator for your company. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. You successfully install a new server named Server9. Immediately afterward, you perform the first backup of the server. The date is January 25, 2003. Next, you add a user named Anna to the local Backup Operators group. You direct Anne to perform nightly backups of Server9. One week later, you try to review the backup logs for Server9. The Backup utility displays the information show in the exhibit Exhibit: Backup Reports Report date, time and backup job name: 1/25/2003 4:12 PM - Interactive You verify that Anne is performing nightly backups. You need to be able to review the backup logs for the previous week. What should you do?()AAdd your user account to the local Backup Operators group.BDirect Anne to use her user account to log on and open the Backup utility.CIn the Backup utility, select the verify data after the backup completes check box.DOpen %windir%/System32/LogFiles. Create a new subfolder named BackupLogs.
单选题You have a single Active Directory directory service domain. You use a Group Policy object (GPO) to apply security settings to your client computers. You configure the startup type for system services settings in a new GPO, and you link the GPO to an organizational unit (OU). You discover that the startup type for system services on one of the client computers has not been updated. You need to ensure that the Group Policy settings are applied to the client computer. What should you do?()A Restart the client computer.B Instruct the user to log off and then log on to the client computer.C On the client computer, run the Gpupdate.exe command with the /Force parameter.D On the client computer, run the Gpupdate.exe command with the /Target:computer parameter.
单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runs Terminal Services. A user has remotely logged on to the Terminal Server. The user requires help to use anapplication. When you connect to the Terminal Server session, you are not able to operate any applications. You have to make sure that you can assist any user on the Terminal Server. So what action should you perform to achieve this?()AUse remote control should be enabled with the following settings in the RDP-Tcp Properties. The Levelof control policy setting should be configured to Interact with the session. The user should be instructedto log off and log back on.BAfter the Tscon /v command is run from the Terminal Server, reconnect to the session.CAfter the Chgusr /execute command is run on the Terminal Server, reconnect to the session.DUse remote control should be enabled with default user settings in the RDP-Tcp Properties.
单选题You are ready to implement RMAN in the backup and recover strategy for your company. Which system privilege must the RMAN user have to be able to connect and execute RMAN commands on a target database?()ASYSDBABSYSOPERCNo system privileges are required for the RMAN user.DOnly SYS user can connect and execute RMAN commands on a target database.
单选题You have successfully sold and installed your customer’s System x solution. Sometimes, the overall succeed of a sale depends on how well you have trained your customer to support their new hardware. Please consider the following tools. Which one would be the best for protectively determining a server outage, and contacting the system administrator about the outage?()ACDATBConfiguration and Options Guide (COG)CPhysical Alarm Sounding in Data CenterDIBM Systems Director
单选题You have an Exchange Server 2010 organization. Your company has a relationship with another company. The partner company has an Exchange Server 2010 organization. You need to recommend a security solution to meet the following requirements: .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()AActive Directory Rights Management Services (AD RMS)BDomain SecurityCForms-based AuthenticationDSecure/Multipurpose Internet Mail Extensions (S/MIME)
单选题Your company has a main office and 10 branch offices. You have an Exchange Server 2010 organization. All Exchange servers are installed on virtual machines. You need to create a monitoring plan for the Exchange servers that meets the following requirements:.Identify Exchange server errors .Provide alerts when Exchange services are stopped .Produce statistical analysis and reporting Which tool should you include in the plan?()AMicrosoft System Center Service ManagerBMicrosoft System Center Operations ManagerCMicrosoft System Center Configuration ManagerDMicrosoft System Center Virtual Machine Manager
单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. Your company has a server named VS1 that runs Windows Server 2008 andHyper-V. You want to create eight virtual servers that run Windows Server 2008 and configure the virtual servers asan Active Directory forest for testing purposes. You find that VS1 has only 30 GB of free hard disk space.You need to have the eight new virtual servers installed on VS1. 1.Perform the installation of Windows Server 2008. 2.Activate undo disks on all virtual servers. 3.Create a virtual server that has a 10-GB fixed-size virtual hard disk. 4.Create eight virtual servers that have a differencing virtual hard disk attached. 5.Create eight virtual servers that have a dynamically expanded virtual hared disk attatched. What action should you perform?()A3→1→4B1→5→2C2→4→3D5→3→1E4→3→5
单选题You work as an application developer at Certkiller .com. You have been asked by you superiors at Certkiller .com to create a child application domain. The new child application domain has to specify a different assembly path than that of the parent application domain.You need to ensure that your solution meets Certkiller .com’s requirements.What should you do?()A AB BC CD D
单选题A solution provider has proposed a pSeries solution to a new customer. The solution is complex with a number of technologies that are new to the customer. They have a tight timeline for implementation. The solution provider has not been able to get a clear understanding as to how the customer will backup the system. What would be the most appropriate action to address the risks with this solution?()ASell SysbackBConduct a SARCSell SupportlineDProvide a project timeline