You are using standalone Cisco Aironet 1400 Series Wireless Bridges for a nine-mile point-to-pointwireless link between two buildings. Which distance setting should you use for the bridgeconfigured as theroot?()A、20 km [12.4 miles]B、10 km [6.2 miles]C、5 km [3.1 miles]D、25 km [15.5 miles]E、15 km [9.3 miles]
You are using standalone Cisco Aironet 1400 Series Wireless Bridges for a nine-mile point-to-pointwireless link between two buildings. Which distance setting should you use for the bridgeconfigured as theroot?()
- A、20 km [12.4 miles]
- B、10 km [6.2 miles]
- C、5 km [3.1 miles]
- D、25 km [15.5 miles]
- E、15 km [9.3 miles]
相关考题:
An administrator account is granted the CREATE SESSION and SET CONTAINER system privileges.A multitenant container database (CDB) instant has the following parameter set:THREADED_EXECUTION = FALSEWhich four statements are true about this administrator establishing connections to root in a CDB that has been opened in read only mode?()A. You can conned as a common user by using the connect statement.B. You can connect as a local user by using the connect statement.C. You can connect by using easy connect.D. You can connect by using OS authentication.E. You can connect by using a Net Service name.F. You can connect as a local user by using the SET CONTAINER statement.
When you are designing a Web application, which options define how rich text displays in a browser?()A、"Using HTML"B、"Using Java Applet"C、"Using AJAX Control"D、"Using Best Fit for OS"
You want to check the EMP table in the user, Scott’s schema for block corruption. You also want to fix the corrupted blocks, if any. How will you accomplish the required task?()A、by using the ANALYZE utilityB、by using the DBVERIFY utilityC、by using the DB_BLOCK_CHECKING parameterD、by using the DBMS_REPAIR package
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table
You issued the following command to analyze the SCOTT.EMP table for block corruption: ANALYZE TABLE SCOTT.EMP VALIDATE STRUCTURE; You received the following error: ORA-01578: ORACLE data block corrupted (file # %s, block # %s) How will you resolve the block corruption problem?()A、 by using the DBMS_REPAIR packageB、 by using the DB_BLOCK_CHECKING parameterC、 by using the DBVERIFY utilityD、 will not be completely resolved until the hardware fault is corrected
You are maintaining your database in Oracle10g. You find that the INDEXES index tablespace should be recovered. How will you recover the index tablespace?()A、 by using the Flashback Database featureB、 by using RMAN incomplete recoveryC、 by performing a user-managed incomplete recoveryD、 by dropping and re-creating the index tablespace
You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()A、You should consider using the healthMonitoring enabled="true"/ configuration.B、You should consider using the deployment retail="true"/ configuration.C、You should consider using the customErrors mode="On"/ configuration.D、You should consider using the trace enabled="true"/ configuration.
Your company has an Active Directory domain. The company has two domain controllers named DC1 and DC2. DC1 holds the schema master role. DC1 fails. You log on to Active Directory by using the administrator account. You are not able to transfer the schema master role. You need to ensure that DC2 holds the schema master role. What should you do()A、Register the Schmmgmt.dll. Start the Active Directory Schema snap-in.B、Configure DC2 as a bridgehead server.C、On DC2, seize the schema master role.D、Log off and log on again to Active Directory by using an account that is a member of the Schema Admins group. St
You need to recommend a solution for managing administrative rights for the branch office client computers. The solution must meet the companys technical requirements.What should you recommend configuring?()A、Account Policies by using GPOsB、Local Users and Groups by using Group Policy preferencesC、Restricted Groups by using GPOsD、Security Options by using Group Policy preferences
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You create an Automated System Recovery (ASR) backup of the server. You restart the server and receive a critical error. You need to restore the server by using ASR. What should you do first? ()A、Start the computer by using Safe mode.B、Start the server by using the ASR floppy disk.C、Start the computer by using the Last Known Good Configuration option.D、Start the server by using the Windows Server 2003 SP2 installation media.
You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 is configured as an enterprise root certification authority (CA). You need to back up the CA's database and log files. You must achieve this goal by using the minimum amount of disk space. What should you run? ()A、Certreq.exe by using the –new parameterB、Certutil.exe by using the -backup parameterC、Cipher.exe by using the /k parameterD、Ntbackup.exe by using the systemstate parameter
You develop a Web application. Your application contains two settings in the Web.config file. You deploy your application to production. You need to modify the application settings in the production environment without manually editing the XML markup in the Web.config file. What should you do? ()A、Modify the application settings by using the Web Site Administration Tool.B、Modify the application settings by using the Visual Studio property page editor for the project.C、Modify the application settings by using the resource editor.D、Modify the application settings by using the Visual Studio start options editor.
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to have the permission of a public folder named KingPublic modified.What should you do?()A、You should consider using the Microsoft Office Outlook tool.B、You should consider using the Public Folder Management Console tool.C、You should consider using the Exchange Control Panel (ECP) tool.D、You should consider using the Exchange Management Console (EMC) tool.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 server named -sr14.-sr14 is configured to with outlook anywhere.you have received instructions from the cio to make sure that the users can connect to -sr14, using outlook anywhere. What should you do?()A、You should consider using the Exchange Remote Connectivity Analyzer.B、You should consider checking the properties of the WEB Outlook Provider.C、You should consider using the Mail Flow Troubleshooter.D、You should consider using the Test-OwaConnectivity cmdlet.
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The ABC.com network has a domain controller named ABC_DC01.Which of the following tools would you use to manually remove Active Director from ABC_DC01?()A、You should consider using the dism.exe command-line tool.B、You should consider using the dsadd.exe command-line tool.C、You should consider using the pcpromo.exe command-line tool.D、You should consider using the ntdsutil.exe command-line tool.E、You should consider using the netsh.exe command-line tool.F、You should consider using the rexec.exe command-line tool.
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. How would you achieve this()Aby using triggersBby using Data PumpCby using external tablesDby using anonymous PL/SQL blocks
单选题You need to recommend a deployment strategy for App1. What should you recommend?()AAssign App1 to users by using a Group Policy.BPublish App1 to users by using a Group Policy.CDeploy App1 as a RemoteApp program by using an MSI file.DDeploy App1 as a RemoteApp program by using an RDP file.
单选题You disabled the Flashback Database feature by using the following command: SQL ALTER DATABASE FLASHBACK OFF; What would be the effect of this command on the existing flashback logs?()A Flashback logs are not deleted.B Flashback logs are deleted automatically.C Flashback logs are deleted only if you are using Recovery Manager (RMAN)D Flashback logs are deleted only if you are using Oracle Manager Files (OFM)E Flashback logs are deleted only if you are using Automatic Storage Management (ASM)
单选题On Monday, you dropped the DEPT table from your schema and then you re-created the DEPT table in your schema. On Wednesday, you have a requirement to restore the DEPT table from the recycle bin. Which statement is correct?()A You cannot restore the DEPT table by using the Oracle Flashback Drop feature because a table with the name DEPT already exists in your schema.B You can restore the DEPT table by using the Oracle Flashback Drop feature, provided you use the RENAME TO clause.C You cannot restore the DEPT table by using the Oracle Flashback Drop feature because the contents of the recycle bin are purged every 12 hours by default.D You can restore the DEPT table by using the Oracle Flashback Drop feature and a system-generated name will be assigned to the restored table.
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()Aby using triggersBby using external tablesCby using anonymous PL/SQL blocksDby auditing all DML operations on the table
单选题You are maintaining your database in ARCHIVELOG mode. An important table, SCOTT.EMPLOYEE, is dropped and purged from the Recycle Bin on Monday at 2:00 P.M. You do not use RMAN to perform backups. You performed the last full user-managed backup at 9:00 P.M. on Sunday. How will you recover the dropped table, SCOTT.EMPLOYEE?()A by using the Flashback Table featureB by using the Flashback Database featureC by performing incomplete recovery using RMAN utilityD by performing incomplete recovery using user-managed recovery
单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()ARun ipconfig /flushdns at the command prompt. BReset the password for the local administrator user account. CFrom the Internet Options in Internet Explorer, clear the AutoComplete history.DFrom the Internet Options in Internet Explorer, delete the Temporary Internet Files.
单选题You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()AYou should consider using the healthMonitoring enabled=true/ configuration.BYou should consider using the deployment retail=true/ configuration.CYou should consider using the customErrors mode=On/ configuration.DYou should consider using the trace enabled=true/ configuration.
单选题You want a record of all queries that are not using indexes. How would you achieve this?()ABy enabling the Slow Query Log because all queries that are not using indexes will be logged automaticallyBBy enabling the Error Log because not using indexes is an errorCBy enabling the Slow Query Log and using the – log-queries-not-using-indexes optionDBy enabling the Error Log and using the – log-queries-not-using-indexes option
单选题You want to check the EMP table in the user, Scott’s schema for block corruption. You also want to fix the corrupted blocks, if any. How will you accomplish the required task?()Aby using the ANALYZE utilityBby using the DBVERIFY utilityCby using the DB_BLOCK_CHECKING parameterDby using the DBMS_REPAIR package
单选题You disabled the Flashback Database feature by using the following command: SQL ALTER DATABASE FLASHBACK OFF; What would be the effect of this command on the existing flashback logs?()AFlashback logs are not deleted.BFlashback logs are deleted automatically.CFlashback logs are deleted only if you are using Recovery Manager (RMAN).DFlashback logs are deleted only if you are using Oracle Managed Files (OMF).EFlashback logs are deleted only if you are using Automatic Storage Management (ASM).