You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A、set security zones management interfaces ge-0/0/0.0B、set zones functional-zone management interfaces ge-0/0/0.0C、set security zones functional-zone management interfaces ge-0/0/0.0D、set security zones functional-zone out-of-band interfaces ge-0/0/0.0
You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()
- A、set security zones management interfaces ge-0/0/0.0
- B、set zones functional-zone management interfaces ge-0/0/0.0
- C、set security zones functional-zone management interfaces ge-0/0/0.0
- D、set security zones functional-zone out-of-band interfaces ge-0/0/0.0
相关考题:
You are the administrator of a SQL Server 2000 computer. Each evening after business hours, you perform. database maintenance tasks. You create a Data Transformation Services package to populate the data warehouse. MAPI is not installed on the server.You want to schedule the DTS package to run each night. You want to attend to other duties while the DTS package is executing. You also want to be notified if the DTS package fails.What should you do?A.Select the DTS packages log package execution to SQL server check box. Create a SQL server event alert to notify you if the package fails.B.Select the DTS packages write completion status to event log check box. Create a SQL server event alert to notify you if the package fails.C.Configure the DTS package to include an on failure precedence constraint and a send mail task. Configure the send mail task to notify you if the package fails.D.Configure the DTS package to include an on failure precedence constraint and a send mail task. Configure the execute process task to execute a not send command that will notify you if the package fails.
You create a Web application for your company‘s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time.Which two code segments should you use?()A.B.C.D.
You are the administrator of a SQL Server 2000 computer in your company's personnel department. Employee data is stored in a SQL Server 2000 database. A portion of the database schema is shown in the exhibit.You want to create a text file that lists these data columns in the following format title, FirstName, LastName, WorkPhone, PositionName, DepartmentName.You want to create the text file as quickly as possible. You do not expect to re-create this file, and you want to avoid creating new database objects if possible.What should you do?A.Use the bcp utility to export data from each table to a separate text file. Use format files to select the appropriate columns. Merge the data from each text file into a single text file.B.Create a view that joins data from all three tables include only the columns you want to appear in the text file. Use the bcp utility to export data from the view.C.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a local temporary table. Use the bcp utility to export data from the local temporary table to a text file.D.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a global temporary table. Use the bcp utility to export data from the global temporary table to a text file.
You are the administrator of a SQL Server 2000 computer. You want to set up snapshot replication on the server. The server will serve as Publisher and Distributor for a minimum of 40 Subscribers.Currently, you want to publish 3GB of data, but the data is expected to grow over time. Subscribers will receive a new snapshot each month.You want to minimize the workload on the Publisher/Distributor. Which two actions should you take to configure snapshot replication? (Each correct answer presents part of the solution. Choose two)A.Store the snapshot in the default folder on the Publisher/Distributor.B.Store the snapshot in an alternative folder on the Publisher/Distributor.C.Store the snapshot in a shared folder on a file server.D.Create pull subscriptions.E.Create push subscriptions.
You want to create the Recovery Manager (RMAN) Virtual Private Catalog (VPC) to maintain a separation of responsibilities along with a consolidation of RMAN repository. Which condition must be met before you create the VPC?()A、A base catalog existsB、The recovery catalog is emptyC、The base recovery catalog must be droppedD、A target database is registered in the recovery catalog
In which three cases would you use the USING clause?()A、You want to create a nonequijoin.B、The tables to be joined have multiple NULL columns.C、The tables to be joined have columns of the same name and different data types.D、The tables to be joined have columns with the same name and compatible data types.E、You want to use a NATURAL join, but you want to restrict the number of columns in the join condition.
What are two reasons to create synonyms?()A、You have too many tables.B、Your tables are too long.C、Your tables have difficult names.D、You want to work on your own tables.E、You want to use another schema's tables.F、You have too many columns in your tables.
Which Cisco SDM feature allows you to specify whether you want SDM files installed on your PC or on your router?() A、 Install Shield WizardB、 Cisco SDM Express WizardC、 Cisco SDM Image ManagerD、 Create Connection Wizard
You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict enabling of such roles()A、Create the role with global authentication.B、Create the role with external authentication.C、Create the role as a secure application role.D、Create the role as a password-protected role.E、Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
You completed the development of a new application and want to create a new domain in a new environment for functional testing. You want to have the same settings for your new domain as your old domain, with the option of changing the configuration in the new target environment. Which two actions should you execute?()A、Use the introspect () command in WLST to gather the configuration information from the original domain.B、Use pack/unpack to transfer the domain from one machine to another.C、Create a domain template from the original domain using the Domain Template Builder and use the Configuration Wizard to create a new domain from the template.D、Use the Admin Console of the original domain to create a domain template from the original domain and use the Configuration Wizard to create a new domain from the template.
You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?()A、Use the CREATE DATABASE .. command to create the database with Oracle-managed files. B、Use the Database Configuration Assistant (DBCA) to create the database with Oracle-managed files. C、Use Enterprise Manager to create a new database with the Online Transaction Processing (OLTP) option. D、Use Database Configuration Assistant (DBCA) to create the database with Transaction Processing template. E、Use the CREATE DATABASE .. command to create the database with Automatic Storage Management (ASM) file system.
You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()A、Create the role with external authentication.B、Create the role as a secure application role.C、Create the role as a password-protected role.D、Create a role and use Fine-Grained Access Control (FGAC) to secure the role
You want to create a shortcut to a folder named Project on a network share. You want this shortcut to be available when you are not connected to the network. You attempt to configure the shortcut to be available offline. However, you do not see any option, which will let you do so. What should you do?()A、Use Windows Explorer to enable caching for the Project folder.B、Use Windows Explorer to configure the Project folder on the network share with the full control permission for your user account.C、Connect to the network before trying to make the shortcut available offlineD、Create shortcuts to each file in the Project folder and make the shortcuts to the files available offline.
You are a network administrator of your network. You want to install Windows 2000 professional on 100 computers from a central location. You want to copy a customized application with theinstallation process to all the 100 computers. What should you do to copy that application during the installation process to the computers.()A、 It cannot be done.B、 Copy the application to the temp folder of the distribution server.C、 Create a folder named $OEM$ as a sub folder in the distribution folder of source files.D、 Create a folder named $COPYDIR$ as a sub folder in the distribution folder of source files.
You have just added three new hard disks to your Windows 2000 Professional computer. You want to configure all of the disks as two drives. You want the two drives to be as equal in size as possible. You want to configure the non-system drive for the best optimal performance. What should you do?()A、Extend the system volume onto disk1. Create a single, stripe volume from disk2 and disk3.B、Extend the system volume onto disk2. Create a single, stripe volume from disk1 and disk2C、Extend the system volume onto disk1. Create a single, spanned volume from disk2 and disk3. D、Extend the system volume onto disk1. Create a single, spanned volume from disk1 and disk2.E、Create a single, stripe volume from disk1, disk2, and disk3. F、Create a single spanned volume from disk1, disk2, and disk3.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a management data warehouse that uses the data collector to collect performance data. You intend to maintain the management data. You want to implement a data collection process. The process can gather and upload data in the management data warehouse on different schedules. What process should you implement?() A、You should create a cached data collectionB、You should create an on-demand non-cached data collection C、You should create a scheduled non-cached data collection D、You should create two different SQL Agent jobs that are scheduled stimultaneously
You are the administrator of a Windows 2000 domain. You develop a graphics software application for users in the Graphics organizational unit (OU). You want to create a custom installation for three users named Carlos, Carmen, and Maria, who are members of the Graphics OU. You want these three users to be able to access additional text, filters, and other graphics options for the software. What should you do? ()A、 Create the Graphic Users OU in the domain. Add a custom .msi file to the Graphics OUB、 Create the Graphic Users OU in the domain. Add a custom .mst file to the Graphics OUC、 Create the Advanced Software OU within the Graphics OU, and add Carlos, Carmen, and Maria.Create an .msi file, including changes, and apply the modifications to the Advanced Software OUD、 Create the Advanced Software OU within the Graphics OU, and add Carlos. Carmen, and Maria. Create an: mst file, including changes, and apply the modifications to the Advanced Software OU
You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()A、Configure each computer to join a workgroup. Create a user account and a local profile for each user. B、Configure each computer to join a workgroup. Create a domain user account that uses roaming user profiles. C、Configure each computer to join the domain. Create a user account for each user on a domain controller. D、Configure each computer to join the domain. Create domain user accounts that use roaming user profiles.
You are creating a view to join the Customers and Orders tables in a SQL Server 2005 database. You need to ensure that the view cannot be affected by modifications to underlying table schemas. You want to accomplish this goal by using the least possible amount of overhead. What should you do?()A、Create CHECK constraints on the tables. B、Create a DDL trigger to roll back any changes to the tables if the changes affect the columns in the view. C、Create the view, specifying the WITH SCHEMABINDING option. D、Create the view, specifying the WITH CHECK option.
单选题You want to create the Recovery Manager (RMAN) Virtual Private Catalog (VPC) to maintain a separation of responsibilities along with a consolidation of RMAN repository. Which condition must be met before you create the VPC?()A A base catalog existsB The recovery catalog is emptyC The base recovery catalog must be droppedD A target database is registered in the recovery catalog
单选题You need to base a data block on the EMP table, but you do not want to give the users of the application access privileges on the table. Which type of data source would you use to create the data block?()Atable Btransactional trigger Cstored procedure DFROM clause query
多选题In which three cases would you use the USING clause?()AYou want to create a nonequijoin.BThe tables to be joined have multiple NULL columns.CThe tables to be joined have columns of the same name and different data types.DThe tables to be joined have columns with the same name and compatible data types.EYou want to use a NATURAL join, but you want to restrict the number of columns in the join condition.
单选题You want to create the Recovery Manager (RMAN) Virtual Private Catalog (VPC) to maintain a separation of responsibilities along with a consolidation of RMAN repository. Which condition must be met before you create the VPC?()AA base catalog existsBThe recovery catalog is emptyCThe base recovery catalog must be droppedDA target database is registered in the recovery catalog
单选题You are the administrator of a Windows 2000 domain. You develop a graphics software application for users in the Graphics organizational unit (OU). You want to create a custom installation for three users named Carlos, Carmen, and Maria, who are members of the Graphics OU. You want these three users to be able to access additional text, filters, and other graphics options for the software. What should you do? ()A Create the Graphic Users OU in the domain. Add a custom .msi file to the Graphics OUB Create the Graphic Users OU in the domain. Add a custom .mst file to the Graphics OUC Create the Advanced Software OU within the Graphics OU, and add Carlos, Carmen, and Maria.Create an .msi file, including changes, and apply the modifications to the Advanced Software OUD Create the Advanced Software OU within the Graphics OU, and add Carlos. Carmen, and Maria. Create an: mst file, including changes, and apply the modifications to the Advanced Software OU
单选题You are a network administrator of your network. You want to install Windows 2000 professional on 100 computers from a central location. You want to copy a customized application with theinstallation process to all the 100 computers. What should you do to copy that application during the installation process to the computers.()A It cannot be done.B Copy the application to the temp folder of the distribution server.C Create a folder named $OEM$ as a sub folder in the distribution folder of source files.D Create a folder named $COPYDIR$ as a sub folder in the distribution folder of source files.
单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons. Which profile must you edit?()AThe SetupUser profileBThe Default User profileCThe Administrator profileDThe System profileEThe All Users profile
单选题You have just added three new hard disks to your Windows 2000 Professional computer. You want to configure all of the disks as two drives. You want the two drives to be as equal in size as possible. You want to configure the non-system drive for the best optimal performance. What should you do?()A Extend the system volume onto disk1. Create a single, stripe volume from disk2 and disk3. B Extend the system volume onto disk2. Create a single, stripe volume from disk1 and disk2. C Extend the system volume onto disk1. Create a single, spanned volume from disk2 and disk3. D Extend the system volume onto disk1. Create a single, spanned volume from disk1 and disk2. E Create a single, stripe volume from disk1, disk2, and disk3.F Create a single spanned volume from disk1, disk2, and disk3.
单选题You completed the development of a new application and want to create a new domain in a new environment for functional testing. You want to have the same settings for your new domain as your old domain, with the option of changing the configuration in the new target environment. Which two actions should you execute?()AUse the introspect () command in WLST to gather the configuration information from the original domain.BUse pack/unpack to transfer the domain from one machine to another.CCreate a domain template from the original domain using the Domain Template Builder and use the Configuration Wizard to create a new domain from the template.DUse the Admin Console of the original domain to create a domain template from the original domain and use the Configuration Wizard to create a new domain from the template.