单选题Users at the Charleville Company began experiencing high network delays when Internetconnectivity was enabled for all users. After investigating the traffic flow, you determine that peer-to-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoSmechanism can you implement to improve the network response time?()A Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions. C Use class-based policing to limit the peer-to-peer traffic rate.D Use class-based shaping to delay any excessive peer-to-peer traffic.

单选题
Users at the Charleville Company began experiencing high network delays when Internetconnectivity was enabled for all users. After investigating the traffic flow, you determine that peer-to-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoSmechanism can you implement to improve the network response time?()
A

 Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.

B

 Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions. 

C

 Use class-based policing to limit the peer-to-peer traffic rate.

D

 Use class-based shaping to delay any excessive peer-to-peer traffic.


参考解析

解析: 暂无解析

相关考题:

4 (a) A company may choose to finance its activities mainly by equity capital, with low borrowings (low gearing) or byrelying on high borrowings with relatively low equity capital (high gearing).Required:Explain why a highly geared company is generally more risky from an investor’s point of view than a companywith low gearing. (3 marks)

She is ____ to leave that job, but another company has offered her a high salary. A、willingB、reluctantC、hesitantD、determined

According to the text, newspaper is losing profits in job ads because( )[A] their prices are too high[B] the employment rate is quite high[C] Internet company provides free services[D] competition among newspapers is tight

He was tempted by the high salary offered by the company.A:taughtB:keptC:changedD:attracted

He was tempted by the high salary offered by the company.A: taughtB: kept C: attractedD: changed

Company A is a cloud service provider that provides users with old tenants,customizable office software and customer relationship management software.The cloud service provided by Company A belongs to()service type.A.IaaSB.PaaSC.SaaSD.DaaS

A company has a business application that provides its users with many different reports: receivables reports, payables reports, revenue projects, and so on. The company has just purchased somenew, state-of-the-art, wireless printers, and a programmer has been assigned the task of enhancing all ofthe reports to use not only the company’s old printers, but the new wireless printers as well. When the programmer starts looking into the application, the programmer discovers that because of the design of theapplication, it is necessary to make changes to each report to support the new printers. Which two designconcepts most likely explain this situation? ()A、InheritanceB、Low cohesionC、Tight couplingD、High cohesionE、Loose couplingF、Object immutability

Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()A、Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B、Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.C、Use class-based policing to limit the peer-to-peer traffic rate.D、Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C

A company may use the Windows XP Professional MUI Pack because the company:()A、has offices where users who speak different languages share computers.B、wants to maintain multiple operating systems.C、has users who work remotely at home offices.D、wants to deploy and maintain a single operating system standard.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()A、[Authorize(Users = "")]B、[Authorize(Roles = "")]C、[Authorize(Users = "*")]D、[Authorize(Roles = "*")]

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()A、The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.B、The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.C、The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.D、The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.

Your company has two main offices named Main1 and Main2.An Active Directory site exists for each office. Users connect locally to servers in both offices.  The offices connect to each other by using a high-speed WAN link. You plan to deploy Exchange Server 2010.  You need to plan the deployment of Mailbox servers to meet the following requirements: .Ensure that users can access their mailbox from a server in their site, if a single Mailbox server fails  .Ensure that users can access their mailboxes remotely if a site fails  .Minimize the number of servers How many Mailbox servers should you include in the plan?()A、2B、3C、4D、6

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()A、The best option is to use an A record for FederatedSharing.Company.com.B、The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.C、The best option is to use an A record for autodiscover.Company.com.D、The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.

You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest containing a single domain named Company.com.the Company.com organization makes use of microsoft exchange server 2010 as their messaging  solution.Company.com has recently configured an exchange server named ex01 with a single mailbox database.Company.com is aware that the network users user microsoft office outlook and outlook web app.During your routine maintenance you discover that the network users are unable to restore e-mail messages from the Recover Deleted Items folder. During the course of the business week you receive instruction from Company.com to ensure that the network users are able to restore e-mail messages from the Recover Deleted Items folder. What should you do?()A、You should consider having a management role created and assigned to all users from the Exchange Management Shell.B、You should consider having a retention policy created and assigned to all users from the Exchange Management Shell.C、You should consider having the properties of the mailbox database modified from the Exchange Management Console (EMC).D、You should consider having the properties of the Mailbox server object modified from the Exchange Management Console (EMC).

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()A、You should consider changing the EWS virtual directory.B、You should consider changing the Federation Trust.C、You should consider changing the Organizational Relationship.D、You should consider changing the default sharing policy.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. The Web Server (IIS) server role should be installed on a new server, and Windows Server 2008 is run by the IIS server role. A Microsoft .NET Framework 1.0 application is installedon a Web site on the Web server. According to the company requirements, all applications must run withthe least amount of permission utilized. Since you are the technical support, you should configure the Website application so as to give it enough permission to perform with no other content created and with nooperating system components accessed. Which action should be performed to achieve the goal?()A、To achieve the goal, the .NET Framework trust level should be set to Medium for the Web site.B、To achieve the goal, the .NET Framework trust level should be set to Full for the Web site.C、To achieve the goal, the .NET Framework trust level should be set to Low for the Web site.D、To achieve the goal, the .NET Framework trust level should be set to High for the Web site.

A system is experiencing performance problems.  After checking the CPU usage, the problem identified is that the system is "CPU Bound".  Which of the following outcomes will determine if there is a possible CPU constraint?()A、 Low paging B、 High paging C、 Workload manager is not turned on D、 A high run queue length

单选题A system is experiencing performance problems.  After checking the CPU usage, the problem identified is that the system is "CPU Bound".  Which of the following outcomes will determine if there is a possible CPU constraint?()A Low paging B High paging C Workload manager is not turned on D A high run queue length

多选题You are implementing an ASP.NET Web application. Users will authenticate to the application with an ID. The application will allow new users to register for an account. The application will generate an ID for the user based on the users full name. You need to implement this registration functionality. Which two actions should you perform?()AConfigure the SqlMembershipProvider in the web.config file.BConfigure the SqlProfileProvider in the web.config file.CCreate an ASP.NET page that contains a default CreateUserWizard control to create a new user account.DCreate an ASP.NET page that contains a custom form that collects the user information and then uses the Membership.CreateUser method to create a new user account.

单选题You are a DBA of your company. You created a database named SALES on an Oracle 10g instance. You have defined an index named INDEX1 on the database table named INVENTORY. Users are complaining that queries accessing the INVENTORY table are running slow. Upon investigation you determine that the tablespace where the index is located is experiencing high I/O and you decide to relocate the index to another tablespace. Which of these will be the best way to accomplish this objective?()A Rebuild the index.B Coalesce the index.C Drop and re-create the index in the new tablespace.D Relocate the index using the ALTER INDEX...MOVE statement.

单选题It was in 2005 _____ we began to introduce this new technique into our company.AwhichBthenCwhenDthat

多选题You work as an ASP.NET Web Application Developer for SomeCompany.  The company uses Visual Studio .NET 2010 as its application development platform.You create an ASP.NET Web site using .NET Framework 4.0. Only registered users of the company will be able to use the application. The application holds a page named UserAccount.aspx that enables new users to register them to the registered users„ list of the company. The UserAccount page hold numerous TextBox controls that accept users personal details, such as user name, password, home address, zipcode, phone number, etc.  One of the TextBox controls on the page is named ZipCode in which a user enters a zip code.  You must ensure that when a user submits the UserAccount page, ZipCode must contain five numeric digits.  What will you do to accomplish this?()AUse RangeValidator.BUse RegularExpressionValidatorCUse RequiredValidatorDUse CompareValidatorEUse RequiredFieldValidator

单选题You install the Web Server (IIS) role on a new server that runs Windows Server 2008.  You install a Microsoft .NET Framework 1.0 application on a Web site on the Web server. The company security policy states that all applications must run by using the minimum level of permission.  You need to configure the Web site application so that it has the permissions to execute without creating any other content and without accessing any operating system components. What should you do?()ASet the .NET Framework trust level to Full for the Web site.BSet the .NET Framework trust level to Low for the Web site.CSet the .NET Framework trust level to High for the Web site.DSet the .NET Framework trust level to Medium for the Web site.

单选题You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. One of the servers,Server01 has the Web Server (IIS) role installed and all theWeb Server role services on it. Which of the following features would you configure on the server toprovide a user the ability to administer a website?()AConfigure .Net Users feature on Server01BConfigure.Net Roles feature on Server01CConfigure IIS Manager Permissions feature on Server01DConfigure Authentication feature on Server01