What are two appropriate uses for Internet Protocol TV broadcasting (IP/TV) technology? ()A、Enabling online collaboration among research personnelB、Delivering a strategic business update from the CEO to all personnelC、Enabling an interactive virtual classroom for sales personnel in remote locationsD、Delivering information about changes in health benefit enrollment to all personnel

What are two appropriate uses for Internet Protocol TV broadcasting (IP/TV) technology? ()

  • A、Enabling online collaboration among research personnel
  • B、Delivering a strategic business update from the CEO to all personnel
  • C、Enabling an interactive virtual classroom for sales personnel in remote locations
  • D、Delivering information about changes in health benefit enrollment to all personnel

相关考题:

Maybe we’ll soon be able to forecast the weather fo______.A.one dayB.two daysC.five daysD.seven days or even longer

Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.) A. LDP uses Down Stream On Demand.B. RSVP uses Down Stream On Demand.C. LDP uses Down Stream Unsolicited.D. RSVP uses Down Stream Unsolicited.

What are two uses of the AS Path attribute?() (Choose two.) A. route selectionB. loop avoidanceC. determining equal cost paths for reachabliltyD. defining the application of other BGP attributes

What are two appropriate uses for Internet Protocol TV broadcasting (IP/TV) technology? () A.Delivering information about changes in health benefit enrollment to all personnelB.Enabling online collaboration among research personnelC.Enabling an interactive virtual classroom for sales personnel in remote locationsD.Delivering a strategic business update from the CEO to all personnel

What are two characteristics of RIPv2?() A. classful routing protocolB. variable-length subnet masksC. broadcast addressingD. manual route summarizationE. uses SPF algorithm to compute path

What are the two benefits of any intelligent network that uses a systems-level approach to integrate applications and services across an infrastructure?()A、 reduce complexityB、 reduced costs for all types of usersC、 packet inspection at wire speedD、 QoS to the desktopE、 LAN encryption services

What are two characteristics of RIPv2? ()A、classful routing protocolB、variable-length subnet masksC、broadcast addressingD、manual route summarizationE、uses SPF algorithm to compute path

When troubleshooting an EIGRP connectivity problem, you notice that two connected EIGRP routers are not becoming EIGRP neighbors. A ping between the two routers was successful.What is the next thing that should be checked?()A、Verify that the EIGRP hello and hold timers match exactly.B、Verify that EIGRP broadcast packets are not being dropped between the two routers with the show ip EIGRP peer command.C、Verify that EIGRP broadcast packets are not being dropped between the two routers with the show ip EIGRP traffic command.D、Verify that EIGRP is enabled for the appropriate networks on the local and neighboring router.

What are two functions that WLAN management provides? ()A、 enhances securityB、 system testsC、 accommodates additional routersD、 simplifies daily operationsE、 uses standalone access points

When arriving at the customers location, two different users describe the problem, and from their description it seems to be two separate problems. Which of the following is an appropriate step to take?()A、Ignore both of them and decide what the real problem is.B、Set up a separate call for each problem.C、Have them duplicate the problem at the device.D、Ask a third person and see if the problem is the same thing.

You are designing a Hyper-V solution. You plan to virtualize an application server. The application server requires failover clustering that uses shared storage. You need to choose the correct storage solution. What should you choose?()A、two child partitions with VHDs stored on an iSCSI SANB、two child partitions with volumes mounted from an iSCSI SANC、two host servers with iSCSI-attached storage enabled for Cluster Shared Volumes (CSVs)D、two host servers with Fibre ChannelCattached storage enabled for Cluster Shared Volumes (CSVs)

Which two statements are true about encrypting RMAN backup?() (Choose two.)A、The transparent encryption of backups uses the encryption walletB、The database uses the same encryption key for every encrypted backupC、The password encryption of backups only uses the password while creating and restoring backupD、If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

单选题A password is made up of two letters followed by two single-digit numbers. If a person is assigned a password at random, what is the probability, rounded to the nearest hundredth, that the password uses only even digits for the numbers?A0.25B0.35C0.5D0.15E0.1

多选题What are two uses of the AS Path attribute?() (Choose two.)Aroute selectionBloop avoidanceCdetermining equal cost paths for reachabliltyDdefining the application of other BGP attributes

单选题A just announced two-port Ethernet card has been installed on a system and it is not recognized. On the HMC the slot shows empty. The device driver has been installed and cfgmgr runs normally. What is the most appropriate action to solve this problem?()AUpdate the HMC softwareBUpdate the system firmwareCRe-install the device driverDFlash update the two-port card

多选题What are two appropriate uses for Internet Protocol TV broadcasting (IP/TV) technology? ()AEnabling online collaboration among research personnelBDelivering a strategic business update from the CEO to all personnelCEnabling an interactive virtual classroom for sales personnel in remote locationsDDelivering information about changes in health benefit enrollment to all personnel

单选题You need to design a method for junior IT administrators to perform more IT support tasks. Your solution must meet business and security requirements. What should you do?()ADelegate appropriate Active Directory permissions to the junior IT administratorsBAdd the junior IT administrators’ user accounts to the Domain Admins user groupCCreate a custom Microsoft Management Console (MMC) that uses taskpad views to enable the appropriate tasks for the junior IT administratorsDMake the junior IT administrators’ domain user accounts member of the local Administrators group on all client computersECreate new domain user accounts for each junior IT administrator. Make the new accounts members of the Domain Admins group and instruct junior IT administrators to use the new accounts only for appropriate administrative tasks

多选题Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that aresupported by the IETF?()AVPLS uses LDP for signaling.BVPLS uses BGP for autodiscovery and signaling.CVPLS uses extended IS-IS for signalingDVPLS uses OSPF version 3 for auto discovery and signalingEVPLS uses spanning tree for signaling

多选题What are the two advantages of any intelligent network that uses a systems-level approach?()AimproveQosBreduced costs for all types of usersCpacket inspection at wire speedDreduced complexity

多选题Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)ALDP uses Down Stream On Demand.BRSVP uses Down Stream On Demand.CLDP uses Down Stream Unsolicited.DRSVP uses Down Stream Unsolicited.

多选题What are the two benefits of any intelligent network that uses a systems-level approach to integrate applications and services across an infrastructure?()Areduce complexityBreduced costs for all types of usersCpacket inspection at wire speedDQoS to the desktopELAN encryption services

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()AServiceGreatUser should be added to the appropriate fixed database roles. BYou should assign the appropriate object-level permissions to ServiceGreatUser CYou should assign the appropriate server-level permissions to ServiceGreatLogin DYou should assign the appropriate database-level permissions to ServiceGreatUser

单选题What channel is general communication used?()Aany appropriate channel except public communicationBany appropriate channel except for public communicationsCany appropriate channel besides public communicationDany appropriate channel beside public communication

多选题What are two benefits of the modular design of the Junos OS?()AEach module uses application-specific integrated circuits (ASICs).BEach module runs in its own protected memory space.CEach module can be individually restarted.DEach module is supported across all Junos platforms.

多选题What are two uses of NAT?()Aconserving public IP addressesBallowing stateful packet inspectionCpreventing unauthorized connections from outside the networkDallowing networks with overlapping private address space to communicate

单选题You are the administrator of a Windows Server 2003 computer named Testking1. An application on Testking1 gradually uses more and more memory until it causes Testking1 to stop responding. If you restart the application before it uses the available memory, there is no interruption of user services. You need to configure Testking1 to notify you when it encounters a low-memory condition. What should you do?()AUsing Task Scheduler, schedule a repeating task that runs the tracert command.BUsing Performance Logs and Alerts, configure an alert for the appropriate performance object.CUsing System Monitor, configure the appropriate performance object to display.DUsing Startup and Recovery Settings, configure Testking1 to send an Administrative Alert.

多选题Which two statements correctly identify factors to consider when Configuring WAN QoS?()AVoice Traffic uses Assured ForwardingBVoice Signaling traffic uses Assured ForwardingCVoice Signaling traffic uses priority queuingDVoice Traffic uses priority queuingEVoice signaling traffic should use priority queuing with Assured Forwarding

多选题What are three security problems with Wi-Fi Protected Access (WPA)?()AWPA is based on the outdated IEEE 802.11i standard.BWPA uses RSN,which uses the same base encryption algorithm as RC4.CWPA requires a hardware upgrade that may not be supported by all vendors.DWPA uses TKIP,which uses the same base encryption algorithm as WEP.EWPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.FWPA is susceptible to a security weakness when preshared keys are used.