●A management domain typically contains a large amount of management information. Each individual item of( 71)information is an instance of a managed object type. The definition of a related set of managed (72) types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB( 73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domain(71) A.rotationB.switchC.managementD.transmission(72) A.pathB.objectC.routeD.packet(73) A.connectionB.windowC.moduleD.destination(74) A.packetsB.searchesC.statesD.instances(75) A.deviceB.stateC.typeD.packet

●A management domain typically contains a large amount of management information. Each individual item of( 71)information is an instance of a managed object type. The definition of a related set of managed (72) types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB( 73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domain

(71) A.rotation

B.switch

C.management

D.transmission

(72) A.path

B.object

C.route

D.packet

(73) A.connection

B.window

C.module

D.destination

(74) A.packets

B.searches

C.states

D.instances

(75) A.device

B.state

C.type

D.packet


相关考题:

The principles of risk management should be followed only for:A complex projectsB simple projectsC large projectsD A and CE All of the above.

Which three elements must be used when you configure a router interface for vlan trunking?() A. one IP network or subnetwork for each subinterfaceB. subinterface numbering that matches vlan tagesC. subinterface encapsulation identifiers that match vlan tagsD. a management domain for each subinterfaceE. one physical interface for each subinterfaceF. one subinterface per vlan

A management domain typically contains a large amount of management information. Each individual item of(71) information is an instance of a managed object type. The definition of a related set of managed (72)types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB (73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple () of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domainA.packetsB.searchesC.statesD.instances

A management domain typically contains a large amount of management information. Each individual item of() information is an instance of a managed object type. The definition of a related set of managed (72)types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB (73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domainA.rotation B.switchC.management D.transmission

A management domain typically contains a large amount of management information. Each individual item of(71) information is an instance of a managed object type. The definition of a related set of managed (72)types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB (73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object () within a management domainA.device B.state C.type D.packet

What action should you execute if you wanted to enable VTP pruning on your entire management  domain?()A、 Enable VTP pruning on any client switch in the management domain.B、 Enable VTP pruning on any switch in the management domain.C、 Enable VTP pruning on every switch in the management domain.D、 Enable VTP pruning on a VTP server in the management domain.E、 Disable VTP pruning on a VTP server in the management domain.

Which three elements must be used when you configure a router interface for vlan trunking?()A、one IP network or subnetwork for each subinterfaceB、subinterface numbering that matches vlan tagesC、subinterface encapsulation identifiers that match vlan tagsD、a management domain for each subinterfaceE、one physical interface for each subinterfaceF、one subinterface per vlan

RBTelco is a large multinational company that outsources health care benefit management to RBBenefits. RBTelco employees access RBBenefits resources through an authenticate-able account at each company. RBBenefit and RBTelco will use SAML V1.0. Which IBM Tivoli Access Manager for e-business (ITAMeb) and IBM Tivoli Federated Identity Manager (ITFIM) components are required to be installed at RBTelco?()A、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console B、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit C、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit D、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, ITFIM Demonstration Scenarios, WebSEAL Application Developer Kit

To perform management activities, each domain requires its own()A、 Administration ServerB、 Configuration WizardC、 Ant TaskD、 Node Server

You have an Exchange Server 2010 that contains five mailbox servers.Mailbox server Server1 host a mailbox database named DB1.DB1 contains 300 user mailboxes.You create a new public folder database named Public2 on Server1.You need to ensure that all users that have mailboxes in DB1 store new public folders in Public2. What should you do?()A、From Exchange Management Console, modify the propierties of DB1.B、From Exchange Management Console, modify the propierties of Public.C、From Exchange Management Console, modify the propierties of Server1.D、From Exchange Management Shell, modify the propierties of each mailbox.

Your network contains an Active Directory domain that contains five domain controllers. You have  a management computer that runs Windows 7.   From the Windows 7 computer, you need to view all account logon failures that occur in the  domain.     The information must be consolidated on one list.   Which command should you run on each domain controller()A、Wecutil.exe qcB、Wevtutil.exe gliC、Winrm.exe quickconfigD、Winrshost.exe

You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization that contains a number of Hub Transport servers. During the course of day you receive an instruction form management to recommend a messaging hygiene solution. Your recommendation should ensure that servers known to send spam is blocked andthat the administrative efforts are reduced. What should you do?()A、You should recommend to management recipient filtering.B、You should recommend to management an IP Block list.C、You should recommend to management IP Block list providers.D、You should recommend to management sender filtering.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 mailbox server named -ex20 that contains a mailbox database.a Company.com manager wants the see the last logon time of the employees at Company.com. What should you do?()A、The best option is to run the Get-MailboxDatabase from the Exchange Management Shell.B、The best option is to run the Get-MailboxStatistics from the Exchange Management Shell.C、The best option is to create and export a filter from the Exchange Management Console.D、The best option is to run the Remote Connectivity Analyzer from the Exchange Management Console.

Your network contains an Active Directory domain named contoso.com. The network contains  client computers that run either Windows Vista or Windows 7. Active Directory Rights  Management Services (AD RMS) is deployed on the network.     You create a new AD RMS template that is distributed by using the AD RMS pipeline. The  template is updated every month.   You need to ensure that all the computers can use the most up-to-date version of the AD RMS  template. You want to achieve this goal by using the minimum amount of administrative effort.     What should you do()A、Upgrade all of the Windows Vista computers to Windows 7.B、Upgrade all of the Windows Vista computers to Windows Vista Service Pack 2 (SP2).C、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all users by usinD、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all computers by

Your network consists of a single Active Directory forest that contains a root domain and two child domains. All servers run Windows Server 2008 R2.  A corporate policy has the following requirements:   èAll local guest accounts must be renamed and disabled. èAll local administrator accounts must be renamed.   You need to recommend a solution that meets the requirements of the corporate policy. What should you recommend?()A、Implement a Group Policy object(GPO) for each domain.B、Implement a Group Policy object(GPO) for the root domain.C、Deploy Network Policy and Access Services(NPAS)on all domain controllers in each domain. D、Deploy Active Directory Rights Management Services(AD RMS)on the root domain controllers.

Your company has a main office and a branch office. All branch office administrators are members of a custom management role group.The role group is configured to allow members to manage recipients.The branch office administrators are also members of The Domain Admins security group. The organization contains one Exchange Server 2010 server. You discover that the branch office administrators can manage recipients in both offices. You need to ensure that the branch office administrators can manage recipients in their assigned branch office only.What should you do?()A、Create a new management role entry for the role group.B、Create a management role assignment policy and associate the policy to the role group.C、Create a management scope and associate the scope to the role group.Set a recipient filter for the management scope.D、Remove the branch office administrators from the Domain Admins group.Add the branch office recipients to the role group.

单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1. Which tool should you use?()AFile Server Resource Manager (FSRM)BNew-StoragePoolCDiskpartDShare and Storage Management

单选题An Organization has Exchange 2010 with 50 Hub Transport Servers.Minimize amount of disk space used on Hub Transport Servers to store shadow copies of messages.What should you do?()AFrom the Exchange Management Shell, run set-transportconfig cmdletBFrom the Exchange Management Shell, run set-transportservers cmdletCFrom the Exchange Management Console (EMC), modify transport settingsDFrom the Exchange Management Console (EMC), modify properties of Hub Transport Servers

单选题You have an Exchange Server 2010 organization that contains five Mailbox servers and five Client Access servers.All users in the organization connect to their mailboxes by using Outlook Anywhere.You create a Client Access server array.You need to ensure that all users can connect to the Client Access server array.What should you do?()AFrom the Exchange Management Shell, run the Set-Mailbox cmdletBFrom the Exchange Management Shell, run the Set-MailboxDatabase cmdletCFrom the Exchange Management Console (EMC), modify the properties of each mailbox databaseDFrom the Exchange Management Console (EMC), modify the properties of each Client Access server object

单选题What action should you execute if you wanted to enable VTP pruning on your entire management  domain?()A Enable VTP pruning on any client switch in the management domain.B Enable VTP pruning on any switch in the management domain.C Enable VTP pruning on every switch in the management domain.D Enable VTP pruning on a VTP server in the management domain.E Disable VTP pruning on a VTP server in the management domain.

单选题Your network consists of a single Active Directory domain. The domain contains a server that runs Windows Server 2008. The server has the Windows SharePoint Services (WSS) server role installed.You need to allow users to create distribution lists from a SharePoint site. What should you do on the WSS server?()ASet the outgoing mail character set to 1200(Unicode).BEnable the SharePoint Directory Management Service.CConfigure the site to accept messages from authenticated users only.DConfigure the site to use the default Rights Management server in Active Directory Domain Services.

单选题To perform management activities, each domain requires its own()A Administration ServerB Configuration WizardC Ant TaskD Node Server

多选题You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()ADelegate the password management controls to the help desk staff.BDelegate the password management controls to the Domain Users group.CConfigure the Default Domain Policy to enforce password expiration settings.DConfigure the Default Domain Controller Policy to enforce password expiration settings.

单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()AYou should recommend that management make use of DAG network encryption.BYou should recommend that management make use of Encrypted File System (EFS)CYou should recommend that management make use of Windows BitLocker Drive Encryption.DYou should recommend that management make use of Rights Management Service RMS.

多选题What are two important guidelines to follow when implementing VTP?()ACDPmust be enabled on all switches in theVTP management domain.BAll switches in the VTPdomain must run the same version of VTP.CWhen using secure mode VTP, only configure management domain passwords onVTP servers.DEnablingVTP pruning on a server willenable the feature for the entire management domain.EUse of theVTPmulti-domain feature should be restricted to migration and temporary implementation.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 mailbox server named -ex20 that contains a mailbox database.a Company.com manager wants the see the last logon time of the employees at Company.com. What should you do?()AThe best option is to run the Get-MailboxDatabase from the Exchange Management Shell.BThe best option is to run the Get-MailboxStatistics from the Exchange Management Shell.CThe best option is to create and export a filter from the Exchange Management Console.DThe best option is to run the Remote Connectivity Analyzer from the Exchange Management Console.

多选题Which three elements must be used when you configure a router interface for vlan trunking?()Aone IP network or subnetwork for each subinterfaceBsubinterface numbering that matches vlan tagesCsubinterface encapsulation identifiers that match vlan tagsDa management domain for each subinterfaceEone physical interface for each subinterfaceFone subinterface per vlan