As part of fallover testing of a corporate database server, client application connectivity must be verified. Which of the following would best verify the application functionality?() A、 Perform a ping client verification test.B、 Review the number of active application processes.C、 Perform successful reads and writes to the application.D、 Run netstat -an to verify client connections to the listening ports.
As part of fallover testing of a corporate database server, client application connectivity must be verified. Which of the following would best verify the application functionality?()
- A、 Perform a ping client verification test.
- B、 Review the number of active application processes.
- C、 Perform successful reads and writes to the application.
- D、 Run netstat -an to verify client connections to the listening ports.
相关考题:
You want to debug the Windows Communication Foundation (WCF) client and server interaction through message and application tracing.You need to correlate traces generated on the client and the server. Which XML segment should you add to the system.diagnostics configuration element in the client and server application configuration file?()A.B.C.D.
Which correctly describes the tiers of the Oracle Workflow architecture?() A. Oracle Database tier and Application server tier onlyB. Oracle Database tier, Application server tier, and End-user client tier onlyC. Oracle Database tier, Application server tier, and Development client tier onlyD. Oracle Database tier, Application server tier, Development client tier, and End-user client tier
Which tier in Oracle E-Business Suite is responsible for storing application data?() A.database tierB.application tierC.client (desktop) tierD.both database tier and application tier
A cluster administrator decides ti implement application monitoring in order to monitor both a web application and its supporting database. The plan is to use a single resource group prod_rg and to configure one monitor method for the web app and one monitor method for the database. Which of the following statements best describes the need for custom resource monitor?() A、 Multiple application servers must be in a single resource group.B、 Multiple application servers per resource group may be monitored.C、 Multiple resource groups must each contain a single application server.D、 Multiple application servers in a cluster cannot use process monitoring.
Which components are installed on the middle tier in a WebSphere Commerce V 5.6 three-tier configuration (i.e. in a three-node topology)?()A、WebSphere Commerce Server, WebSphere Application Server and Web server pluginB、WebSphere Application Server, Database Client and Web server pluginC、WebSphere Commerce Server, Database Server and WebSphere Application ServerD、WebSphere Commerce Server, WebSphere Application Server and Database ClientE、Web server, WebSphere Commerce Server and WebSphere Application Server
What is the new Oracle Shared Server?()A、An improved version of multithreaded server configuration. B、A connection pooling configuration where several clients are connected to the same server process. C、Two more database servers, which share data by means of database links; the client software is unaware to which server it is connected. D、A configuration of Real Application Cluster where the client connection is routed to the least busy instance.
Your company has 1,000 client computers. You are planning to deploy Windows 7 and a new line-of-business application. You have the following requirements: Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment. The application must be available for use on client computers that are not connected to the network. You need to ensure that the application is installed on all new client computers. What should you do?()A、Publish the application by using Group Policy Software Installation.B、Deploy the application by using Windows Server Update Services (WSUS).C、Service an online image of Windows 7 to add the new application.D、Service an offline image of Windows 7 to add the new application.
During the process of fallover testing, a client/server database needs to be tested. On the AIX Server, start/stop/cleanup scripts and server application functionality have been tested. Before moving onto the next step of fallover testing,what action must be completed?()A、 Run who -a and validate that client connections are restored.B、 Verify that the client side application is functioning properly.C、 Check hacmp.out log file to validate that the application server started.D、 Verify that the application will successfully stop and restart on the fallover node.
An enterprise has three nodes: -Node ’A’ is a production database, -Node ’B’ is a production Application server, and -Node ’C’ is a test and development node. Node ’C’ is used by six programmers to develop and the production application as business critical and would like to make it highly available with HACMP. Application development and testing is not business critical. Which of the following describes the best solution?() A、 There is not an adequate solution because HACMP should not be configured in this environment without a dedicated standby node.B、 Nodes ’A’ and ’B’ should be configured in a cluster with mutual fallover of two cascading resource groups to provide both nodes will deliver acceptable response time with both resource groups.C、 Nodes ’A’ and ’C’ should be configured in one cluster, and Nodes ’B’ and ’C’ in another cluster to prevent both the database and application server from falling over to Node ’C’ at the same time.D、 Nodes ’A’, ’B’, and ’C’ should be configured in a cluster with Node ’C’ the hot standby for both the database and application server resource groups. Workload Manager (WLM) must be configured on database and application developers from over utilizing the CPU resources.
The direct way to use XPages in a notes 8.5.1 client is which of the following?()A、Through a composite application componentB、Through use of a file URLC、Client database Launch propertyD、XPages are accessed through eclipse and not a notes client
A user has an application server LPAR with a physical Ethernet adapter. They want to have a database LPAR also connected to the application LPAR via virtual Ethernet. Their security policies require a firewall between the application LPAR and database LPAR. Which of the following virtual Ethernet configurations satisfies the customer’s requirements?()A、The application server,firewall,and database server on the same VLANB、The application server and firewall on one VLAN,and the database server on a second VLANC、The application server on one VLAN,and the database server and firewall on a second VLAND、The application server and firewall on one VLAN,and the firewall and database server on a second VLAN
A customer is developing a custom application that involves a multistep provisioning process for a new account. There is a custom Java client application that is generating multiple JMS messages as part of the process and sending them to the WebLogic tier where they are processed. Which three steps must you take to implement the solution to allow for scalability and parallel processing of multiple simultaneous provisioning requests while ensuring messages for an individual process are not delivered out of order?()A、Update the client application that is creating the JMS messages to use Unit of Work.B、Configure a WebLogic Cluster for Distributed JMS.C、Update the client application that is creating the JMS messages to use Unit of Order.D、Enable XA Transactions on the JMS Connection Factory used by the client application.E、Enable Load Balancing on the JMS connection factory used by the client application.
Which of the following architectures is used to support the agent or the application tier?()A、SimpleB、Two-tierC、N-tierD、Client-server
You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1hosts an ordering application that connects to a database cluster.A number of client computers are shared between employees. You need to implement a licensing solution that meets the following requirements:·Server1 must allow unlimited concurrent connections.·Client access license requirements must be minimized.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)A、Configure a license group for each shared computer.B、Configure a local security group for each shared computer.C、Configure Server1 to support Per Server licensing mode.D、Configure Server1 to support either Per Device or Per User licensing mode.
You are a network administrator for your company. You need to test a new application. The application requires two processors and 2 GB of RAM. The application also requires shared folders on the application server and requires the installation of software on the client computers. You create the test plan. You assemble a server in the test lab. You install Windows Server 2003, Web Edition on theserver. You install the application on the server. You install the client software components for the application on 20 client computers in the test lab. You test the application. You discover that only some of the client computers can run the application. You turn off the client computers that ran the application successfully, and you test again. The client computers that failed in the first test now run the application successfully. You need to identify the cause of the failure and update your test plan. What should you do? ()A、 Increase the Maximum number of worker processes to 20 for the default application pool.B、 Use Add or Remove Programs to add the Application Server Windows component.C、 Change the Application pool identity to Local Service for the default application pool.D、 Change the test server operating system to Windows Server 2003, Standard Edition or Windows Server 2003, Enterprise Edition.
You use Microsoft .NET Framework 4 to create an application. The application contains a partially trusted client assembly and a server assembly. You create a custom sandboxed application domain. You need to ensure that the application can be executed in a partial-trust environment. What should you do?()A、Apply the following attribute to the server assembly. [assembly: AllowPartiallyTrustedCallers(PartialTrustVisibilityLevel=VisibleToAllHosts)]B、Apply the following attribute to the server assembly. [assembly: AllowPartiallyTrustedCallers(PartialTrustVisibilityLevel=NotVisibleByDefault)]C、Apply the following attribute to the client assembly. [assembly: AllowPartiallyTrustedCallers(PartialTrustVisibilityLevel=VisibleToAllHosts)]D、Apply the following attribute to the client assembly. [assembly: AllowPartiallyTrustedCallers(PartialTrustVisibilityLevel=NotVisibleByDefault)]
Your network consists of a single Active Directory domain. Your network contains 10 servers and 500 client computers. All domain controllers run Windows Server 2008 R2. A Windows Server 2008 R2 server has Remote Desktop Services installed. All client computers run Windows XP Service Pack 3. Youplan to deploy a new line-of-business application. The application requires desktop themes to be enabled. You need to recommend a deployment strategy that meets the following requirements: èOnly authorized users must be allowed to access the application. èAuthorized users must be able to access the application from any client computer. èYour strategy must minimize changes to the client computers. èYour strategy must minimize software costs. What should you recommend?()A、Migrate all client computers to Windows 7. Deploy the application to all client computers by using a Group Policy object (GPO).B、Migrate all client computers to Windows 7. Deploy the application to the authorized users by using a Group Policy object (GPO).C、Deploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Install the application on the Remote Desktop Services server. Implement Remote Desktop Connection Broker (RD Connection Broker).D、Deploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Enable the Desktop Experience feature on the Remote Desktop Services server. Install the application on the Remote Desktop Services server.
Your network has client computers that run Windows XP. All users access a custom line-of- business application. The line-of-business application is not compatible with Windows 7. You are planning to deploy Windows 7. You have the following requirements: The application must run on all client computers. The application executable must reside on each client computer. You need to manage application compatibility to meet the requirements. What should you do?()A、Install the application on a Remote Desktop Services server.B、Install a shim for the application on each client computer.C、Install the Windows Compatibility Evaluator on each client computer.D、Virtualize the application by using Microsoft Application Virtualization (App-V).
Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The deployment must meet the following requirements: èUsers must access the application from an icon on their desktops. èUsers must have access to the application when they are not connected to the network. What should you do?()A、Publish the application as a RemoteApp.B、Publish the application by using Remote Desktop Web Access (RD Web Access).C、Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).D、Assign the application to all client computers by using a Group Policy object (GPO).
In a two-tier configuration, it is recommended to put which of the following components on different nodes?()A、Database client and database serverB、WebSphere Application Server and Database ServerC、WebSphere Commerce Server and WebSphere Application ServerD、Web server and WebSphere Application Server
单选题As part of fallover testing of a corporate database server, client application connectivity must be verified. Which of the following would best verify the application functionality?()A Perform a ping client verification test.B Review the number of active application processes.C Perform successful reads and writes to the application.D Run netstat -an to verify client connections to the listening ports.
单选题What is the new Oracle Shared Server?()AAn improved version of multithreaded server configuration. BA connection pooling configuration where several clients are connected to the same server process. CTwo more database servers, which share data by means of database links; the client software is unaware to which server it is connected. DA configuration of Real Application Cluster where the client connection is routed to the least busy instance.
单选题Which correctly describes the tiers of the Oracle Workflow architecture?()AOracle Database tier and Application server tier onlyBOracle Database tier, Application server tier, and End-user client tier onlyCOracle Database tier, Application server tier, and Development client tier onlyDOracle Database tier, Application server tier, Development client tier, and End-user client tier
多选题In a two-tier configuration, it is recommended to put which of the following components on different nodes?()ADatabase client and database serverBWebSphere Application Server and Database ServerCWebSphere Commerce Server and WebSphere Application ServerDWeb server and WebSphere Application Server
单选题During the process of fallover testing, a client/server database needs to be tested. On the AIX Server, start/stop/cleanup scripts and server application functionality have been tested. Before moving onto the next step of fallover testing,what action must be completed?()A Run who -a and validate that client connections are restored.B Verify that the client side application is functioning properly.C Check hacmp.out log file to validate that the application server started.D Verify that the application will successfully stop and restart on the fallover node.
单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()ATransfer ObjectBSession FacadeCIntercepting FilterDTemplate MethodEModel-View-Controller
单选题The direct way to use XPages in a notes 8.5.1 client is which of the following?()AThrough a composite application componentBThrough use of a file URLCClient database Launch propertyDXPages are accessed through eclipse and not a notes client