单选题An application or user experiences poor performance, yet examination of the nfsstat -c output indicates no or very few timeouts and retransmits. This means that the client is receiving responses from the server as fast as it is asking for them. What is the first thing to be checked?()AThere is an appropriate number of NFS daemons running on the server machineBThere is an appropriate number of biod daemons running on the client machineCThe server is not CPU boundDThere is an appropriate number of biod daemons running on the server machine

单选题
An application or user experiences poor performance, yet examination of the nfsstat -c output indicates no or very few timeouts and retransmits. This means that the client is receiving responses from the server as fast as it is asking for them. What is the first thing to be checked?()
A

There is an appropriate number of NFS daemons running on the server machine

B

There is an appropriate number of biod daemons running on the client machine

C

The server is not CPU bound

D

There is an appropriate number of biod daemons running on the server machine


参考解析

解析: 暂无解析

相关考题:

You are a network administrator for your company. All servers run Windows Server 2003. A server namedServer34 runs an application named App1.Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)You need to identify the unauthorized application by using the output from the netstat command.Which tool should you use to identify the application? ()A. Performance consoleB. System MonitorC. Network MonitorD. Task Manager

A Windows Communication Foundation (WCF) service only accepts messages that are signed and encrypted. A client application is not receiving expected responses from the service. You need to enable logging to verify that the messages from the client are signed and encrypted. You also need to see what each message looks like before the message body is deserialized into a NET object. What should you do?()A.B.C.D.

Which correctly describes the tiers of the Oracle Workflow architecture?() A. Oracle Database tier and Application server tier onlyB. Oracle Database tier, Application server tier, and End-user client tier onlyC. Oracle Database tier, Application server tier, and Development client tier onlyD. Oracle Database tier, Application server tier, Development client tier, and End-user client tier

What is the new Oracle Shared Server?()A、An improved version of multithreaded server configuration. B、A connection pooling configuration where several clients are connected to the same server process. C、Two more database servers, which share data by means of database links; the client software is unaware to which server it is connected. D、A configuration of Real Application Cluster where the client connection is routed to the least busy instance.

An application or user experiences poor performance, yet examination of the nfsstat -c output indicates no or very few timeouts and retransmits. This means that the client is receiving responses from the server as fast as it is asking for them. What is the first thing to be checked?()A、There is an appropriate number of NFS daemons running on the server machineB、There is an appropriate number of biod daemons running on the client machineC、The server is not CPU boundD、There is an appropriate number of biod daemons running on the server machine

Company.com has a database application and a Web server application running on the same p5-570 server in a single partition. Recently there have been a number of instances where the increased load on the database server has impacted the performance of the Web server. What can the technical specialist recommend to keep the database application from impacting the performance of the Web server?()A、Create a VLAN between the web server and database server.B、Purchase APV and install the VIOS.C、Increase the priority of the Web server.D、Create separate LPARs for Web and database workloads.

The nfsstat -c command shows zero badxid, but retrans and timeouts are sizeable, what is the most probable cause of the problem?()A、 Too many nfsd’s runningB、 Client and server with different buffer sizesC、 Bridges, routers or gateways are receiving too many fragmentated packetsD、 Too few nfsd’s running

Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance.  Which J2EE pattern can help with this performance issue?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Model-View-Controller

You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  Server1 runs an application named App1. All client computers run Windows XP Professional Service Pack 3 (SP3). Users from a remote network segment report poor performance when they run App1. You need to identify whether the cause of the poor network performance is packet loss.  Which tool should you use?()A、Netcap.exeB、Netstat.exeC、Pathping.exeD、Tracert.exe

You create Windows Forms application by using the .Net FrameWork 3.5 You plan to deploy a new application to client computers that use the Windows Vista operating system. You need to ensure that the user can install the application without being prompted fore elevated permission.What should you do?()A、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a CD-ROM.Install the application on each client computer from the CD-ROMB、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a server on the network.Install the application on each client computer.C、Add the requestedExecutionLevel="highestAvailable" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.D、Add the requestedExecutionLevel="requiresAdministrator" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.

A server named Server2 runs Windows Server 2008. The Terminal Services server role is installed on Server2.  You plan to deploy a new Terminal Services application on Server2. The application vendor confirms that the application can be deployed in a Terminal Services environment. The application does not use Microsoft Windows Installer packages for installation. The application makes changes to the current user registry during installation.  You need to install the application to support multiple user sessions. What should you do?()A、Run the mstsc /v:Server2 /console command from the client computer to log on to Server2. Install the application.B、Run the change user /execute command on Server2. Install the application and run the change user /install command on Server2.C、Run the change user /install command on Server2. Install the application and run the change user /execute command on Server2.D、Run the change logon /disable command on Server2. Install the application and run the change logon /enable command on Server2.

You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1runs an application named App1. All client computers run Windows XP Professional Service Pack 3 (SP3). Users from a remote network segment report poor performance when they run App1. You need to identify whether the cause of the poor network performance is packet loss.  Which tool should you use?()A、Netcap.exe B、Netstat.exe C、Pathping.exe D、Tracert.exe

Ten users at your office run an accounting application on their Windows NT Workstation 4.0 computers. The application stores its data in a shared network folder named Accdata on a Windows 2000 Server computer named Server1. You upgrade all 10 computers to Windows 2000Professional and verify that all applications are compatible with Windows 2000. After the upgrade,some users report that they are receiving intermittent data-corruption error messages. They are also receiving data file-version mismatch error messages. When these errors occur, your only method of recovery is to restore the entire contents of the Accdata folder from a known good backup copy. You need to prevent these errors from occurring in the future. What should you do?()A、Configure Accdata folder to allow a maximum of one user.B、Configure the Accdata folder to disable client caching.C、Create a group policy that removes the Bypass Traverse Checking user right on server1.D、Create a group policy that increases the amount of idle time required before a session disconnects on server1.

单选题Company.com has a database application and a Web server application running on the same p5-570 server in a single partition. Recently there have been a number of instances where the increased load on the database server has impacted the performance of the Web server. What can the technical specialist recommend to keep the database application from impacting the performance of the Web server?()ACreate a VLAN between the web server and database server.BPurchase APV and install the VIOS.CIncrease the priority of the Web server.DCreate separate LPARs for Web and database workloads.

单选题Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is thesignificance of the icon?()A It indicates that the radio of the client adapter is disabledB It indicates that the client adapter is not associated to an access point or another clientC It indicates that the client adapter is associated to an access point or another client, but the user is not EAP authenticatedD It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is excellent or goodE It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fairF It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor

单选题You create Windows Forms application by using the .Net FrameWork 3.5 You plan to deploy a new application to client computers that use the Windows Vista operating system. You need to ensure that the user can install the application without being prompted fore elevated permission.What should you do?()ASign the deployment manifest by using an Authenticode certificate.Publish the application to a CD-ROM.Install the application on each client computer from the CD-ROMBSign the deployment manifest by using an Authenticode certificate.Publish the application to a server on the network.Install the application on each client computer.CAdd the requestedExecutionLevel=highestAvailable attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.DAdd the requestedExecutionLevel=requiresAdministrator attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.

单选题What is the new Oracle Shared Server?()AAn improved version of multithreaded server configuration. BA connection pooling configuration where several clients are connected to the same server process. CTwo more database servers, which share data by means of database links; the client software is unaware to which server it is connected. DA configuration of Real Application Cluster where the client connection is routed to the least busy instance.

单选题Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured  through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the  installation and the icon appears in the system tray area in the lower right of the desktop. What is the  significance of the icon?()A  It indicates that the radio of the client adapter is disabled.B  It indicates that the client adapter is not associated to an access point or another client. C  It indicates that the client adapter is associated to an access point or another client, but the user is not  EAP authenticated.D  It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is  excellent or good.E  It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair.F  It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor.

单选题Ten users at your office run an accounting application on their Windows NT Workstation 4.0 computers. The application stores its data in a shared network folder named Accdata on a Windows 2000 Server computer named Server1. You upgrade all 10 computers to Windows 2000 Professional and verify that all applications are compatible with Windows 2000. After the upgrade, some users report that they are receiving intermittent data-corruption error messages. They are also receiving data file-version mismatch error messages. When these errors occur, your only method of recovery is to restore the entire contents of the Accdata folder from a known good backup copy.  You need to prevent these errors from occurring in the future. What should you do? ()AConfigure Accdata folder to allow a maximum of one user.BConfigure the Accdata folder to disable client caching.CCreate a group policy that removes the Bypass Traverse Checking user right on server1.DCreate a group policy that increases the amount of idle time required before a session   disconnects on server1.

单选题A server named Server2 runs Windows Server 2008. The Terminal Services server role is installed on Server2.  You plan to deploy a new Terminal Services application on Server2. The application vendor confirms that the application can be deployed in a Terminal Services environment. The application does not use Microsoft Windows Installer packages for installation. The application makes changes to the current user registry during installation.  You need to install the application to support multiple user sessions. What should you do?()ARun the mstsc /v:Server2 /console command from the client computer to log on to Server2. Install the application.BRun the change user /execute command on Server2. Install the application and run the change user /install command on Server2.CRun the change user /install command on Server2. Install the application and run the change user /execute command on Server2.DRun the change logon /disable command on Server2. Install the application and run the change logon /enable command on Server2.

单选题A system administrator periodically receives calls from users who complain about poor performance with their application. Use the following sar command output to answer the question: Which of the following system resources need more investigation?()A CPUsB DiskC MemoryD NetworkX

单选题The nfsstat -c command shows zero badxid, but retrans and timeouts are sizeable, what is the most probable cause of the problem?()A Too many nfsd’s runningB Client and server with different buffer sizesC Bridges, routers or gateways are receiving too many fragmentated packetsD Too few nfsd’s running

单选题Which correctly describes the tiers of the Oracle Workflow architecture?()AOracle Database tier and Application server tier onlyBOracle Database tier, Application server tier, and End-user client tier onlyCOracle Database tier, Application server tier, and Development client tier onlyDOracle Database tier, Application server tier, Development client tier, and End-user client tier

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The server has a very large database named DB1. An application which is constantly available uses DB1. Now you get a report from users, in the report users complain that server has a poor performance. As the technical support, you have to improve the performance of the application by using the Database Engine Tuning Advisor. Besides this, you must make sure that the action of analyzing the workload will not affect the performance of the production server.So what should you do?()AOn the local server, enable the XP_MSVER stored procedure BOn the remote server, enable the XP_MSVER stored procedure. COn the production server, use the dta.exe utility along with an XML input file. DYou should configure a test server that has a similar hardware configuration. Use the dta.exe utility on the test server along with an XML input file

单选题You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  Server1 runs an application named App1. All client computers run Windows XP Professional Service Pack 3 (SP3). Users from a remote network segment report poor performance when they run App1. You need to identify whether the cause of the poor network performance is packet loss.  Which tool should you use?()ANetcap.exeBNetstat.exeCPathping.exeDTracert.exe

单选题An application or user experiences poor performance, yet examination of the nfsstat -c output indicates no or very few timeouts and retransmits. This means that the client is receiving responses from the server as fast as it is asking for them. What is the first thing to be checked?()AThere is an appropriate number of NFS daemons running on the server machineBThere is an appropriate number of biod daemons running on the client machineCThe server is not CPU boundDThere is an appropriate number of biod daemons running on the server machine

单选题You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1runs an application named App1. All client computers run Windows XP Professional Service Pack 3 (SP3). Users from a remote network segment report poor performance when they run App1. You need to identify whether the cause of the poor network performance is packet loss.  Which tool should you use?()ANetcap.exe BNetstat.exe CPathping.exe DTracert.exe

单选题Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance.  Which J2EE pattern can help with this performance issue?()A Transfer ObjectB Service LocatorC Intercepting FilterD Model-View-Controller