单选题Service Level Agreements (SLA) typically do not address()A Network access and availabilityB Application access and availabilityC Escalation and conflict resolutionD Headcounts and budgets

单选题
Service Level Agreements (SLA) typically do not address()
A

 Network access and availability

B

 Application access and availability

C

 Escalation and conflict resolution

D

 Headcounts and budgets


参考解析

解析: 暂无解析

相关考题:

following code segment.[ServiceContract]public interface ICustomerService{...}public class CustomerService : ICustomerService{...}The service is self-hosted in a console application. Older client applications access the service at http://contoso.com:8080/CustomerService/V1.Newer client applications access the service at http://contoso.com:8080/CustomerService/V2.You need to ensure that any client application can access the service at either address.Which code segment should you use?()A.B.C.D.

How is network layer addressing accomplished in the OSI protocol suite?() A. Internet Protocol addressB. Media Access Control addressC. Packet Layer Proto col addressD. Network Service Access Point addressE. Authority and Format Identifier address

Which service is provided by Cisco SMARTnet?()A、 Investment protection with upgrade discountsB、 around-the clock access to Cisco Technical Access CenterC、 Cisco Learning Credits for IT staff developmentD、 service level agreements to ensure uptime requirements are met

Which of the following is the MOST important consideration when purchasing a new server for a mission critical application?()A、RAID 0 compliantB、Notifying all stakeholders of the server upgradeC、Service Level AgreementD、KVM access

How is network layer addressing accomplished in the OSI protocol suite?()A、Internet Protocol addressB、Media Access Control addressC、Packet Layer Proto col addressD、Network Service Access Point addressE、Authority and Format Identifier address

Comprehensive Service Level Agreements typically do not address:()A、 Roles  responsibilitiesB、 Headcount  budgetsC、 Reporting policiesD、 Penalites

Service Level Agreements (SLA) typically do not address()A、 Network access and availabilityB、 Application access and availabilityC、 Escalation and conflict resolutionD、 Headcounts and budgets

In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()A、to specify the destination addresses to which access is permittedB、to specify the source address permitted to access the resourceC、to specify the services to which access is permittedD、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()A、Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.B、Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.C、Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.D、Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TK1 runs IIS. You install a Web-enabled application on TK1. The application includes a security feature that detects unauthorized attemptsto access the server. Whenever an authorized attempt is detected, the application automatically modifies the IIS configuration file to restrict the unauthorized user's access. To test the security feature, you try to gain unauthorized access to TK1. Twenty seconds after your first attempt, you try again. However, TK1 does not restrict your access on the second attempt. You wait five minutes, and then you examine the IIS configuration file. You verify that it was correctly modified by the application to restrict your access. You need to configure IIS to ensure that changes in the IIS configuration file will result in immediate changes in the behaviour of IIS. What should you do?()A、Select the Enable Direct Metabase Edit option.B、Specify the service account for the Application Pool as the IIS service account.C、Select the Enable Rapid-Fail protection option.D、Specify the status of the Internet Data Connector Web service extension as Allow.

You are the network administrator for your company. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You add eight servers for a new application. You create an organizational unit (OU) named Application to hold the servers and other resources for the application. Users and groups in the domain will need varied permissions on the application servers. The members of a global group named Server Access Team need to be able to grant access to the servers. The Server Access Team group does not need to be able to perform any other tasks on the servers. You need to allow the Server Access Team group to grant permissions for the application servers without granting the Server Access Team group unnecessary permissions.  What should you do?()A、 Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.B、 Grant the Server Access Team group permissions to modify computer objects in the Application OU.C、 Move the Server Access Team group object into the Application OU.D、 Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.

You have two Exchange Server 2010 servers that have the Client Access, Hub Transport, and Mailbox server roles installed.The servers are members of a database availability group (DAG).You need to ensure that all users can access the Client Access server if a single server or service fails.What should you do?()A、from DNS manager, create two new records for the Client Access servers.B、from Failover Cluster Manager, create a new service named Client Access Server and assign a new IP address.C、Install the Network Load Balancing feature on each server and assign a second IP address to each network adapter.D、Deploy a hardware load balancer.Create a DNS record for the virtual IP address and configure a Client Access server array.

Your network consists of a single Active Directory domain. The network contains a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has an application that runs as a service. The application uses a domain service account to access other servers in the domain. Security policies require that users reset their passwords every 30 days. After the application runs for a month, the application fails.You need to ensure that the application starts and can access the remote servers. What should you do?()A、In the Services snap-in, set the service to log on as the Local System account and start the service.B、In the Services snap-in, set the service to log on as the Local Administrator account and start the service.C、In Active Directory Users and Computers, reset the server’s computer account. In the Services snap-in, start the service.D、In Active Directory Users and Computers, set the Account Expires option to Never. In the Services snap-in, start the service.

You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

单选题Comprehensive Service Level Agreements typically do not address:()A Roles  responsibilitiesB Headcount  budgetsC Reporting policiesD Penalites

单选题Your network consists of a single Active Directory domain. The network contains a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has an application that runs as a service. The application uses a domain service account to access other servers in the domain. Security policies require that users reset their passwords every 30 days. After the application runs for a month, the application fails. You need to ensure that the application starts and can access the remote servers.  What should you do?()AIn the Services snap-in, set the service to log on as the Local System account and start the service.BIn the Services snap-in, set the service to log on as the Local Administrator account and start the service.CIn Active Directory Users and Computers, reset the servers computer account. In the Services snap-in, start the service.DIn Active Directory Users and Computers, set the Account Expires option to Never. In the Services snap-in, start the service.

单选题Which service is provided by Cisco SMARTnet?()A Investment protection with upgrade discountsB around-the clock access to Cisco Technical Access CenterC Cisco Learning Credits for IT staff developmentD service level agreements to ensure uptime requirements are met

单选题You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()AConfigure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.BConfigure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.CConfigure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.DConfigure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.

单选题You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  When you access the application in a Web browser, you receive the following error message: "Service Unavailable".  You need to access the application successfully.  What should you do?()AStart Microsoft IIS 6.0.BStart the Application pool.CSet the .NET Framework version.DAdd the Web.config file for the application.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A Configure the system event log to Do not overwrite.B In IAS, in Remote Access Logging, enable the Authentication requests setting.C Configure the Remote Access server to Log all events.D Create a custom remote access policy and configure it for Authentication-Type.

单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

单选题In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()Ato specify the destination addresses to which access is permittedBto specify the source address permitted to access the resourceCto specify the services to which access is permittedDto inform the enforcer to expect policy information from the Junos Pulse Access Control Service

单选题You are the network administrator for your company. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You add eight servers for a new application. You create an organizational unit (OU) named Application to hold the servers and other resources for the application. Users and groups in the domain will need varied permissions on the application servers. The members of a global group named Server Access Team need to be able to grant access to the servers. The Server Access Team group does not need to be able to perform any other tasks on the servers. You need to allow the Server Access Team group to grant permissions for the application servers without granting the Server Access Team group unnecessary permissions.  What should you do?()A Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.B Grant the Server Access Team group permissions to modify computer objects in the Application OU.C Move the Server Access Team group object into the Application OU.D Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.

单选题How is network layer addressing accomplished in the OSI protocol suite?()AInternet Protocol addressBMedia Access Control addressCPacket Layer Proto col addressDNetwork Service Access Point addressEAuthority and Format Identifier address

单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has the Routing and Remote Access service enabled and is configured as a network address translation (NAT) router. You need to view a list of the current sessions on the Routing and Remote Access server and the private and public IP addresses and ports that are being used. What should you do?()ARun Nbtstat –S. BRun Netstat –ano. CFrom the Routing and Remote Access snap-in, right-click NAT/Basic Firewall and select Export List. DFrom the Routing and Remote access snap-in, right-click the interface connected to the Internet and click Show Mappings.

单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TK1 runs IIS. You install a Web-enabled application on TK1. The application includes a security feature that detects unauthorized attemptsto access the server. Whenever an authorized attempt is detected, the application automatically modifies the IIS configuration file to restrict the unauthorized user's access. To test the security feature, you try to gain unauthorized access to TK1. Twenty seconds after your first attempt, you try again. However, TK1 does not restrict your access on the second attempt. You wait five minutes, and then you examine the IIS configuration file. You verify that it was correctly modified by the application to restrict your access. You need to configure IIS to ensure that changes in the IIS configuration file will result in immediate changes in the behaviour of IIS. What should you do?()ASelect the Enable Direct Metabase Edit option.BSpecify the service account for the Application Pool as the IIS service account.CSelect the Enable Rapid-Fail protection option.DSpecify the status of the Internet Data Connector Web service extension as Allow.

单选题You have two Exchange Server 2010 servers that have the Client Access, Hub Transport, and Mailbox server roles installed.The servers are members of a database availability group (DAG).You need to ensure that all users can access the Client Access server if a single server or service fails.What should you do?()Afrom DNS manager, create two new records for the Client Access servers.Bfrom Failover Cluster Manager, create a new service named Client Access Server and assign a new IP address.CInstall the Network Load Balancing feature on each server and assign a second IP address to each network adapter.DDeploy a hardware load balancer.Create a DNS record for the virtual IP address and configure a Client Access server array.