Company.com has a single pSeries server with two shared processor logical partitions. The first partition has peak resource requirements during weekdays. The second partition has peak resource requirements during weekends. During the peak times, the total workload between the partitions does NOT exceed the capacity of the server. However, the partitions are not able to utilize the full capacity of the system during peak times, because the necessary CPU and memory resources are not always allocated to the busiest partition. Which of the following options would best balance these resources?()A、Configure AIX Workload ManagerB、Configure Partition Load ManagerC、Configure eServer Workload ManagerD、Use DLPAR from the HMC
Company.com has a single pSeries server with two shared processor logical partitions. The first partition has peak resource requirements during weekdays. The second partition has peak resource requirements during weekends. During the peak times, the total workload between the partitions does NOT exceed the capacity of the server. However, the partitions are not able to utilize the full capacity of the system during peak times, because the necessary CPU and memory resources are not always allocated to the busiest partition. Which of the following options would best balance these resources?()
- A、Configure AIX Workload Manager
- B、Configure Partition Load Manager
- C、Configure eServer Workload Manager
- D、Use DLPAR from the HMC
相关考题:
Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem.Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A. dig company.com nsB. ipconfig/allC. ifconfig-aD. dig company.com mx
Company.com has a cluster with nodes that support "hot swap" adapters. During an upgrade of The network infrastructure,an additional network adapter has been added to the nodes and configured in AIX. What is the next step required to add this adapter to HACMP?() A、 Stop the node.B、 Stop the cluster.C、 Run autodiscovery.D、 Configure the IP adapter.
Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A、dig company.com nsB、ipconfig/allC、ifconfig-aD、dig company.com mx
Company.com has non-IBM fibre attached storage. The storage is connected to a node in the cluster that has multiple adapters and virtual paths. There is a concern about detecting the loss of one of the fibre adapters since there is no indication to the administrator that one has failed. What feature of HACMP can be sued to assist with this issue?() A、 Disk heartbeatB、 Error notificationC、 Event notificationD、 Application monitor
Company.com has decided to implement the "Fast Disk Takeover" and "Disk Heart Beat" features of HACMP. What IBM distribution media will be required for a default installation?() A、 AIX media onlyB、 HACMP media onlyC、 AIX and HACMP mediaD、 HACMP and Concurent Resource Manager media
Company.com has purchased a 2-way p5-520 and would like to create three Micro-Partitions on the server. Which feature of Advanced POWER Virtualization would allow them to create the desired number of partitions?()A、Virtual EthernetB、Shared Ethernet AdapterC、Dedicated ProcessorsD、Shared Processor Pool
Company.com has decided to implement virtual hosts in their web server. The current estimate is to create six virtual hosts with unique URL’s and IP addresses. The solution is going to use the IP aliasing faction in HACMP. How many resource groups are required to support this configuration?()A、 1B、 2C、 6D、 7
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com makes use of an Edge Transport server.The employees at Company.com usually receive e-mail from another company named Courseware Publishers.The employees at Courseware Publishers uses the uses the courseware.com e-mail address suffix.However, due to unforeseen circumstances, Company.com, has acquired Courseware Publishers.You have received instructions from the CIO to make sure that the messages sent from Courseware Publishers have their courseware.com e-mail address suffix in their source address. What should you do?()A、The best option is to create an accepted domain.B、The best option is to create an e-mail address policy.C、The best option is to create a Receive connector.D、The best option is to create an address rewrite entry.
Company.com has employed you as their exchange administrator.The Company.com network contains an exchange server 2010 organization.the Company.com organization contains a hub transport server as well as an edge transport server.the hub transport server is named -ex01 and the edge transport server is named -ex02.-ex02 is used to send smtp mail to the internet.a new Company.com directive requires that a disclaimer is added to all internal and external mail messages sent by employees. What should you do?()A、your best option would be to have the properties of a send connector modified from -ex02.B、your best option would be to have a transport rule created from -ex01.C、your best option would be to have a transport rule created from -ex02.D、your best option would be to have the properties of a send connector modified from -ex01.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 mailbox server named -ex20 that contains a mailbox database.a Company.com manager wants the see the last logon time of the employees at Company.com. What should you do?()A、The best option is to run the Get-MailboxDatabase from the Exchange Management Shell.B、The best option is to run the Get-MailboxStatistics from the Exchange Management Shell.C、The best option is to create and export a filter from the Exchange Management Console.D、The best option is to run the Remote Connectivity Analyzer from the Exchange Management Console.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()A、The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.B、The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.C、The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.D、The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to company growth Company.com, has acquired an accepted domain named courseware.com.You have received instructions from the CIO to automatically forward the e-mail messages sent to courseware.com to another server that does not resides in Company.com.What should you do?()A、The best option is to change the default e-mail address policy properties.B、The best option is to change the default Receive connector properties.C、The best option is to change the accepted domain properties.D、The best option is to change the default remote domain properties.
Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()A、You should consider changing the EWS virtual directory.B、You should consider changing the Federation Trust.C、You should consider changing the Organizational Relationship.D、You should consider changing the default sharing policy.
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A Company.com employee named Mia Hamm has sent a message to one of the other users at Company.com.You need to make sure that the message was delivered.What should you do?()AYou should run the Office Diagnostics in the Microsoft Outlook.BYou should run the Get-MessageTrackingReport cmd.CYou should choose the options in the Outlook Web App.DYou should run the Search- Message Tracking Report cmdlet.
单选题Company.com has decided to implement the "Fast Disk Takeover" and "Disk Heart Beat" features of HACMP. What IBM distribution media will be required for a default installation?()A AIX media onlyB HACMP media onlyC AIX and HACMP mediaD HACMP and Concurent Resource Manager media
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()AThe best option is to create an Outlook Protection Rule to comply with the Company.com security policy.BThe best option is to set up a content filtering feature to comply with the Company.com security policy.CThe best option is to create a transport rule to comply with the Company.com security policy.DThe best option is to set up a sender reputation feature to comply with the Company.com security policy.
单选题Company.com has recently received a new p5-570 in the data center and wants to Micro-Partition the server. The customer already has an existing HMC connected to a p690. Which of the following actions should the technical specialist take?()AOrder a POWER5 HMCBConnect to the existing HMCCInstall an 8-port asynchronous card in the managed server to connect to the existing HMCDInstall an additional network card to the existing HMC and connect to the POWER5 service processor
单选题Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. Company.com has acquired a new Exchange Server 2010 server and moved the mailboxes to it.However, the employees find a problem to access their mailboxes. What should you do?()AYou should consider using Outlook Anywhere and configure it.BYou should consider creating and set up a Client Access array.CYou should consider renaming the OWA virtual directory to Exchange.DYou should consider the Switchover Server option.
单选题Company.com has non-IBM fibre attached storage. The storage is connected to a node in the cluster that has multiple adapters and virtual paths. There is a concern about detecting the loss of one of the fibre adapters since there is no indication to the administrator that one has failed. What feature of HACMP can be sued to assist with this issue?()A Disk heartbeatB Error notificationC Event notificationD Application monitor
单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com. What should you do?()AYou should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.BYou should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.CYou should consider having mail enabled for KingPublic.DYou should consider having the author role assigned to Anonymous.
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to circumstances, Company.com has acquired a new Internet domain name.This results in that the employees cannot receive e-mail that is sent to the new Internet domain name.The new Internet domain name is set up as an e-mail address suffix.The Company.com employees need to receive e-mail sent from the new Internet domain name. What should you do?()AYou should consider using an External Relay Accepted Domain.BYou should consider using an Authoritative Accepted Domain.CYou should consider using a remote domain.DYou should consider using a new Receive connector.
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com contains an exchange server 2010 server named -sr15 that has the following roles installed: client access, hub transport, and mailbox server.the Company.com also has a windows server 2008 r2 certification authority (ca).Company.com has merged with another company named Courseware Publishers that contains an internal root C A.You have received instructions from the CIO to install a certificate to create the federated trust as well as to reduce the cost. What should you do?()AYou need to set up a computer certificate request on -sr15; thereafter you should submit the request to a third-party trusted caBYou need to use -sr15 and generate a self-signed certificateCYou need to use request a computer certificate from the Company.com.com ca from -sr15DYou need to set up a computer certificate request on -sr15; thereafter you should submit the request to courseware publishers ca
单选题Company.com has a large network control center with an SNMP based monitoring tool running on a non-IBM Unix like system. It has become desirable for the network control center to monitor the activity of an HACMP cluster. What feature in HACMP can assist with this?()A hacmp.myB hacmp.mibC hacmp.defsD hacmp.snmp
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to company growth Company.com, has acquired a new company named Courseware Publishers.You have configured new mail boxes for the employees at Courseware Publishers.You have received instructions from the CIO to make sure that the mailboxes can receive e-mail sent to them, however, the users at Company.com should not received the e-mail that is sent to Courseware Publishers.What should you do?()AThe best option is to set up a remote domain and change the default e-mail address policy.BThe best option is to set up an accepted domain and make a new e-mail address policy.CThe best option is to set up a Receive connector and make a managed folder mailbox policy.DThe best option is to change the default accepted domain and change the default e-mail address policy.