Which two requirements would lead towards a high availability solution?()A、When uptime is criticalB、When data must be refactoredC、When application concurrency is staticD、When data loss is unacceptableE、When application is a single point of failure
Which two requirements would lead towards a high availability solution?()
- A、When uptime is critical
- B、When data must be refactored
- C、When application concurrency is static
- D、When data loss is unacceptable
- E、When application is a single point of failure
相关考题:
Which two requirements would lead towards a high availability solution?() A.When uptime is criticalB.When data must be refactoredC.When application concurrency is staticD.When data loss is unacceptableE.When application is a single point of failure
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()A. Junos PulseB. Java AgentC. Odyssey Access ClientD. Native 802.1X supplicant
Which two networking infrastructure characteristics are most likely to distinguish video requirements (such as Cisco TelePresence) from voice requirements?()A、jitterB、delayC、PoED、bandwidthE、packet loss
You are designing the forest and domain structure to meet the business and technical requirements. Which structure should you use?()A、A single forest with one tree, and one domainB、A single forest with one tree two domainC、A single forest with two trees, each with a single domainD、Two forests, each with a single tree and a single domainE、Two forests, each with two trees, with a single domain in each tree
You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions. And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)A、no single point of failureB、determine which protocol to useC、trading database server locationD、deterministic response to all failures
During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()A、PerformB、PositionC、DevelopD、PrepareE、PlanF、Design
Which two aspects of a UCS solution enable fast response to growth requirements in the data center?()A、UCS ManagerB、fabric interconnectC、service profilesD、expansion modulesE、virtual interface cards
Which of the following would be used to connect two IDFs in the same building with the LAN, whileminimizing crosstalk?()A、RG-6B、STPC、CAT3D、UTP
Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A、tracertB、netstatC、nslookupD、ping
A customer is planning to buy a two enclosure Power 770, and will implement 4 LPARs with the following requirements:Each LPAR must have a private, dedicated connection to the network.The adapter for this network connection must be hot-swappable.The customer wants to minimize the number of I/O slots used. Which of the following fulfills the customer requirements?()A、Two dual-port PCIe adaptersB、A four-port PCIe Ethernet adapterC、Four separate PCIe Ethernet adaptersD、Two embedded Integrated Virtual Ethernet adapters (IVE)
A customer needs a new Microsoft Windows 2003 Server. They are running an application that requires substantial memory. They would like a rack mountable system, which will support four Xeon processors with 2MB of L3 cache. Which of the following is the minimum configuration to satisfy the customer’s requirements?()A、x445 with four Xeon MP processors and 8GB of memoryB、x445 with four Xeon MP processors and 16GB of memory in a single SMP moduleC、x445 with four Xeon DP processors and 16GB of memory in a single SMP moduleD、x445 with two SMP modules each containing two Xeon DP processors and 8GB of memory
A customer needs a new database server. The database application has a high memory overhead but does not benefit from 8-way processing. They would like a rack mountable system, which will support four Xeon processors with 512KB of L2 cache and 16GB of main system memory. Which of the following will satisfy the customer’s requirements?()A、x445 with four Xeon DP processors and 16GB of memory in a single SMP moduleB、x445 with four Xeon MP processors and 16GB of memory in a single SMP moduleC、x445 with two SMP modules each containing two Xeon DP processors and 8GB of memoryD、x445 with two SMP modules each containing two Xeon MP processors and 8GB of memory
A space-constrained customer is currently running AIX 5.2 on a number of p650 servers and a pair of new p5-550 servers. They have four identical new applications each requiring a minimum of seven processors and 96GB of memory. Which solution would best meet the customer’s requirements?()A、Two p670 serversB、Four p650 serversC、Two p5-570 serversD、Four p5-550 servers
多选题Which two environments would take advantage of TCP Acceleration (AFP)? ()(Choose two.)Asatellite networksBlow-latency networksClong-haul link with 95% compressibility.Dlong-haul link with 10% compressibility.
多选题If a SONET/SDH interface transmit link fails between two JUNOS devices, which two alarms or defects would be seen on those devices?()ALOSBREICBIP-B3DRDI
多选题You work as a database administrator for Certkiller .com. In your development environmentenvironment, the developers are responsible for modifying the table structure according to the application requirements. However, you want to keep track of the ALTER TABLE commands being executed by developers, so you enable auditing to achieve this objective. Which two views would you refer to find out the audit information?()ADBA_AUDIT_TRAILBDBA_AUDIT_SESSIONCDBA_FGA_AUDIT_TRAILDDBA_COMMON_AUDIT_TRAIL
单选题During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()APerformBPositionCDevelopDPrepareEPlanFDesign
单选题You are designing the forest and domain structure to meet the business and technical requirements. Which structure should you use?()A A single forest with one tree, and one domainB A single forest with one tree two domainC A single forest with two trees, each with a single domainD Two forests, each with a single tree and a single domainE Two forests, each with two trees, with a single domain in each tree.
单选题Which of the following would be used to connect two IDFs in the same building with the LAN, whileminimizing crosstalk?()ARG-6BSTPCCAT3DUTP
多选题Which two aspects of a UCS solution enable fast response to growth requirements in the data center?()AUCS ManagerBfabric interconnectCservice profilesDexpansion modulesEvirtual interface cards
多选题Your customer wants to build a network for a financial trading floor that has a requirement formultiple high-value transactions, which are also vital to the customer. What are the two mostcritical requirements?() (Choose two.)Ano single point of failureBtrading database server locationCredundant application servers locationDdeterministic response to all failuresEdetermine which protocol to use
多选题You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()AJunos PulseBJava AgentCOdyssey Access ClientDNative 802.1X supplicant
多选题Which two commands would you use to discard a candidate configuration?()ArollbackBdeleteCdelete 0Drollback 0
单选题A customer would like to implement an IBM System Storage DS8000 solution. A Capacity Magic study has determined that 500 drives of 450 GB are required to meet the customer’s capacity requirements. Limited space is available for additional systems in the data center. Which solution best meets the customer’s requirements()ADS8800 system with three framesBDS8800 system with one frameCDS8700 system with two framesDDS8800 system with two frames
单选题Final exams were incredibly comprehensive, and went on for two weeks, which length made it seem as if they would never end.Acomprehensive, and went on for two weeks, which length madeBcomprehensive and since they went on for two weeks, that madeCcomprehensive and, since they went on for two weeks, to makeDcomprehensive and went on for two weeks, which madeEcomprehensive and, by going on for two weeks, it made
多选题Which two networking infrastructure characteristics are most likely to distinguish video requirements (such as Cisco TelePresence) from voice requirements?()AjitterBdelayCPoEDbandwidthEpacket loss
多选题Which two requirements would lead towards a high availability solution?()AWhen uptime is criticalBWhen data must be refactoredCWhen application concurrency is staticDWhen data loss is unacceptableEWhen application is a single point of failure