Softswitch与Application Server之间通过API接口相连。两者之间使用的通信协议是()协议。
Softswitch与Application Server之间通过API接口相连。两者之间使用的通信协议是()协议。
相关考题:
Which correctly describes the tiers of the Oracle Workflow architecture?() A. Oracle Database tier and Application server tier onlyB. Oracle Database tier, Application server tier, and End-user client tier onlyC. Oracle Database tier, Application server tier, and Development client tier onlyD. Oracle Database tier, Application server tier, Development client tier, and End-user client tier
Which of the following describes a server that is hosting only an Anti-virus program?() A. Distributed Application ServerB. Dedicated Application ServerC. Peer-to-Peer Application ServerD. File and Print Server
Which of the following describes a server that is hosting only an Anti-virus program?()A、 Distributed Application ServerB、 Dedicated Application ServerC、 Peer-to-Peer Application ServerD、 File and Print Server
A user has an application server LPAR with a physical Ethernet adapter. They want to have a database LPAR also connected to the application LPAR via virtual Ethernet. Their security policies require a firewall between the application LPAR and database LPAR. Which of the following virtual Ethernet configurations satisfies the customer’s requirements?()A、The application server,firewall,and database server on the same VLANB、The application server and firewall on one VLAN,and the database server on a second VLANC、The application server on one VLAN,and the database server and firewall on a second VLAND、The application server and firewall on one VLAN,and the firewall and database server on a second VLAN
What does the term application partitioning refer to?()A、The feature of a forms application enabling it to run both in client-server mode and on the Web. B、Storing PL/SQL program units between the Oracle server and the application to make optimal use of available resources. C、The nature of a three-tier architecture, where the form module and processing software reside on an application server. D、The feature of a forms application that is able to use Ethernet, twisted pair, and wireless data connections.
Oracle Fusion Middleware Control runs as:()A、 a module in Oracle HTTP ServerB、 a PL/SQL module in Oracle DatabaseC、 an application in WebLogic Server Administration ServerD、 an application in WebLogic Server Managed Server
You are a network administrator for your company. You need to test a new application. The application requires two processors and 2 GB of RAM. The application also requires shared folders on the application server and requires the installation of software on the client computers. You create the test plan. You assemble a server in the test lab. You install Windows Server 2003, Web Edition on theserver. You install the application on the server. You install the client software components for the application on 20 client computers in the test lab. You test the application. You discover that only some of the client computers can run the application. You turn off the client computers that ran the application successfully, and you test again. The client computers that failed in the first test now run the application successfully. You need to identify the cause of the failure and update your test plan. What should you do? ()A、 Increase the Maximum number of worker processes to 20 for the default application pool.B、 Use Add or Remove Programs to add the Application Server Windows component.C、 Change the Application pool identity to Local Service for the default application pool.D、 Change the test server operating system to Windows Server 2003, Standard Edition or Windows Server 2003, Enterprise Edition.
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor. B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.
In a two-tier configuration, it is recommended to put which of the following components on different nodes?()A、Database client and database serverB、WebSphere Application Server and Database ServerC、WebSphere Commerce Server and WebSphere Application ServerD、Web server and WebSphere Application Server
多选题A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()ADisabling connections from named pipes or socket files (depending on the operating system of the server)BEnabling and using SSL for connections to the Mysql databaseCInstalling Mysql on the application server, and running the database and application on the same serverDStarting the server with – bind- address=0.0.0.0 specifiedERunning the server with – skip-networking specifiedFLimiting logins to originate from the application server or the server's subnet'
单选题You are the network administrator for your company. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You add eight servers for a new application. You create an organizational unit (OU) named Application to hold the servers and other resources for the application. Users and groups in the domain will need varied permissions on the application servers. The members of a global group named Server Access Team need to be able to grant access to the servers. The Server Access Team group does not need to be able to perform any other tasks on the servers. You need to allow the Server Access Team group to grant permissions for the application servers without granting the Server Access Team group unnecessary permissions. What should you do?()A Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.B Grant the Server Access Team group permissions to modify computer objects in the Application OU.C Move the Server Access Team group object into the Application OU.D Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.
单选题Which components are installed on the middle tier in a WebSphere Commerce V 5.6 three-tier configuration (i.e. in a three-node topology)?()AWebSphere Commerce Server, WebSphere Application Server and Web server pluginBWebSphere Application Server, Database Client and Web server pluginCWebSphere Commerce Server, Database Server and WebSphere Application ServerDWebSphere Commerce Server, WebSphere Application Server and Database ClientEWeb server, WebSphere Commerce Server and WebSphere Application Server
单选题A server named Server2 runs Windows Server 2008. The Terminal Services server role is installed on Server2. You plan to deploy a new Terminal Services application on Server2. The application vendor confirms that the application can be deployed in a Terminal Services environment. The application does not use Microsoft Windows Installer packages for installation. The application makes changes to the current user registry during installation. You need to install the application to support multiple user sessions. What should you do?()ARun the mstsc /v:Server2 /console command from the client computer to log on to Server2. Install the application.BRun the change user /execute command on Server2. Install the application and run the change user /install command on Server2.CRun the change user /install command on Server2. Install the application and run the change user /execute command on Server2.DRun the change logon /disable command on Server2. Install the application and run the change logon /enable command on Server2.
单选题Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. The test and development teams are developing a distributed application. The application requires a domain controller, a server that runs Microsoft SQL Server, an application server, and a client computer. The application uses pass-through authentication. You need to ensure that at the time of a failure, the test team can reproduce the error and provide the application in the state in which it existed when the error occurred to the development team for continued analysis. You must achieve this goal while minimizing storage requirements. What should you do?()ASnapshot and export all serversBSnapshot and export only the application serverCSnapshot the application server, and back up the SQL Server databaseDSnapshot and export only the domain controller and the client computer
单选题A user has an application server LPAR with a physical Ethernet adapter. They want to have a database LPAR also connected to the application LPAR via virtual Ethernet. Their security policies require a firewall between the application LPAR and database LPAR. Which of the following virtual Ethernet configurations satisfies the customer’s requirements?()AThe application server,firewall,and database server on the same VLANBThe application server and firewall on one VLAN,and the database server on a second VLANCThe application server on one VLAN,and the database server and firewall on a second VLANDThe application server and firewall on one VLAN,and the firewall and database server on a second VLAN
单选题An administrator is in charge of a server that houses various applications. Which of the following BEST explains this server type?()ADedicated Application ServerBFile ServerCShared Application ServerDPeer-to-Peer Application Server
单选题You are a network administrator for your company. You install Windows Server 2003 on two servers named Server1 and Server2. You configure Server1 and Server2 as a two-node cluster. You configure a custom application on the cluster by using the Generic Application resource, and you put all resources in the Application group. You test the cluster and verify that it fails over properly and that you can move the Applications group from one node to the other and back again. The application and the cluster run successfully for several weeks. Users then report that they cannot access the application. You investigate and discover that Server1 and Server2 are running but the Application group is in a failed state. You restart the Cluster service and attempt to bring the Application group online on Server1. The Application group fails. You discover that Server1 fails, restarts automatically, and fails again soon after restarting. Server1 continues to fail and restart until the Application group reports that it is in a failed state and stops attempting to bring itself back online. You need to configure the Application group to remain on Server2 while you research the problem on Server1. What should you do? ()A On Server2, configure the failover threshold to 0.B On Server2, configure the failover period to 0.C Remove Server1 from the Possible owners list.D Remove Server1 from the Preferred owners list.
单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server that runs Windows Server 2008. The Terminal Services server role is installed on theserver. You have a new application deployed on the server. The application creates files that have anextension of .xyz. You have to make sure that users are able to launch the remote application from theircomputers by double-clicking a file that has the .xyz extension. What action should you perform?()AThe Remote Desktop Connection Client on the users’ computers should be configured to point to theserver.BConfigure the application as a published application You should use a Remote Desktop Program file.CConfigure the application as a published application by using a Microsoft Windows Installer packagefile.DConfigure the application as a published application by using a Terminal Server Web Access Web site.
单选题Which correctly describes the tiers of the Oracle Workflow architecture?()AOracle Database tier and Application server tier onlyBOracle Database tier, Application server tier, and End-user client tier onlyCOracle Database tier, Application server tier, and Development client tier onlyDOracle Database tier, Application server tier, Development client tier, and End-user client tier
单选题Which of the following describes a server that is hosting only an Anti-virus program?()A Distributed Application ServerB Dedicated Application ServerC Peer-to-Peer Application ServerD File and Print Server
单选题Oracle Fusion Middleware Control runs as:()A a module in Oracle HTTP ServerB a PL/SQL module in Oracle DatabaseC an application in WebLogic Server Administration ServerD an application in WebLogic Server Managed Server