单选题A TCP/IP application is transferring files from a personal machine to a remote machine.  The application writes 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size.  Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A Increase the size of thewallB Increase the size of sb_maxC Increase the size of tcp_recvspaceD Increase the size of tcp_sendspace

单选题
A TCP/IP application is transferring files from a personal machine to a remote machine.  The application writes 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size.  Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()
A

 Increase the size of thewall

B

 Increase the size of sb_max

C

 Increase the size of tcp_recvspace

D

 Increase the size of tcp_sendspace


参考解析

解析: 暂无解析

相关考题:

Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?() A.Add the list of files to /etc/exclude.rootvg.B.Modify the image.data file and add the files to be excluded form the backup.C.Modify the bosinst.data file and specify which files are to be excluded from the backup.D.Specify the files to be excluded on the command line when executing the mksysb command.

A TCP/IP application receives files from a remote machine.  The application reads 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size. Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A、 Increase the size of thewallB、 Increase the size of sb_maxC、 Increase the size of tcp_recvspaceD、 Increase the size of tcp_sendspace

A TCP/IP application is transferring files from a personal machine to a remote machine.  The application writes 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size.  Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A、 Increase the size of thewallB、 Increase the size of sb_maxC、 Increase the size of tcp_recvspaceD、 Increase the size of tcp_sendspace

Which three of the following OSI model layers also belong to the TCP/IP model?()A、The application layerB、The session layerC、The data link layerD、The transport layerE、The network interface layerF、The physical layer

The TCP/IP network model differs from the more popular OSI model. Which of the layers below belong to the TCP/IP model?()A、application layerB、session layerC、transport layerD、internet layerE、network layerF、data link layerG、physical layer

A server is connected to a gigabit Ethernet switch and has negotiated 1Gbps / Full Duplex. When transferring large files to and from other servers on the segment via FTP slow performance is noticed.All network cabling,network hardware and server hardware were verified to be working correctly.  Which of the following could be done to improve performance?()A、 Decrease the TCP window size.B、 Increase the UDP window size.C、 Increase the TCP window size.D、 Decrease the UDP window size.

An administrator receives a call from an end user reporting that the application they are using keeps giving them an error on port 23. Which of the following is being used?()A、SSHB、Remote Desktop ConnectionC、TelnetD、VPN

A customer with a small IT budget has one data center. Their main application is a database running on an IBM System Storage DS8000. The database has a data change rate of 50% per day. Once a week, they must do a point-in-time backup from the database to tape. The time it takes to run the backup now exceeds the backup window allowed. The customer requests a proposal to reduce database downtime caused by running backups, with nearly no impact to production volumes.    In addition to the tape backup, which DS8000 feature should a technical specialist propose()A、FlashCopyB、FlashCopy SEC、Metro MirrorD、Global Mirror

Company.com is implementing an HACMP solution. The application ahs a license key based on  The hostname. The hostname is also the name used for one of the TCP/IP interfaces. The application vendor has worked with HACMP systems before and is aware of the issue. The preferred method for resolving this issue is to:()  A、 include the hostname in the resource group definition.B、 include the license key in the resource group definition.C、 obtain a second license key for a "standby" system from the application vendor.D、 Set the hostname to be one of the TCP/IP interface included in a resource group.

Which of the following is a feature of a unit of work?()A、It applies to a single data server.B、It is a recoverable sequence of operations.C、Its value can be queried from the system catalog tables.D、It begins when the application connects to the data server.

A customer asked a consultant to create the infrastructure for an application.  The application is designed to charge customers for conferencing services based on usage.  To determine if a Storage Area Network (SAN) is the best storage solution, which of the following questions is most appropriate?()A、Will the application require a database?B、Which operating system does the application require?C、Will the data need to be backed up in real time?D、Does the application share data among the servers?

A user wants to connect to the database instance from an application that is running on a remote machine. Which tools should the DBA use to establish the required configuration to ensure that the user is able to connect to the database instance?()A、Data PumpB、Oracle Net ManagerC、Oracle Enterprise ManagerD、Oracle Universal Installer (OUI)E、Database Configuration Assistant (DBCA)

You run a 16-bit scientific data analysis package on your Windows 2000 Professional computer. The package consists of three components. The first component is a data acquisition application that monitors continuous data output from scientific instruments. The second component is a data analysis application that receives data from the data acquisition application by using shared memory. The third component is a data graphing application that displays the processed data in real time.  The data analysis application communicates with the data graphing application by using OLE. When you attempt to analyze large data sets, your computer is not able to display data in real time. You install a second processor in your computer; only one processor is used while the package is running, even though task manager shows both processors.   You want your data analysis package to use both processors. What should you do?()A、Configure the data acquisition application to run in its own virtual DOS machine (VDM).B、Configure the data analysis application to run in its own virtual DOS machine (VDM).C、Configure the data graphing application to run in its own virtual DOS machine (VDM).D、Configure the virtual DOS machine for the data acquisition and data analysis applications to.have a hard affinity for processor 0. Configure the VDM for the data graphing application to.have a hard affinity for processor1. E、Configure the virtual DOS machine for the data acquisition to have a hard affinity for processor 0. Configure the VDM for the data graphing application to have a hard affinity for processor1.

You have a server that runs Windows Server 2008. The server has the Windows Server virtualization role service installed and has one virtual machine. The virtual machine runs Windows Server 2008. You plan to install a new application on the virtual machine.  You need to ensure that you can restore the virtual machine to its original state in the event the application installation fails. What should you do?()A、Log on to the virtual host and enable the Remote Differential Compression Features.B、Log on to the virtual host and enable the Windows Recovery Disk feature.C、From Virtualization Management Console, create a snapshot.D、From Virtualization Management Console, save the state of the virtual machine.

单选题Company.com is implementing an HACMP solution. The application ahs a license key based on  The hostname. The hostname is also the name used for one of the TCP/IP interfaces. The application vendor has worked with HACMP systems before and is aware of the issue. The preferred method for resolving this issue is to:()A include the hostname in the resource group definition.B include the license key in the resource group definition.C obtain a second license key for a standby system from the application vendor.D Set the hostname to be one of the TCP/IP interface included in a resource group.

单选题You have a server that runs Windows Server 2008. The server has the Windows Server virtualization roleservice installed and has one virtual machine. The virtual machine runs Windows Server 2008. You plan to install a new application on the virtual machine. You need to ensure that you can restorethe virtual machine to its original state in the event the application installation fails. What should you do?()ALog on to the virtual host and enable the Remote Differential Compression Features.BLog on to the virtual host and enable the Windows Recovery Disk feature.CFrom Virtualization Management Console, create a snapshot.DFrom Virtualization Management Console, save the state of the virtual machine.

多选题Which three of the following OSI model layers also belong to the TCP/IP model?()AThe application layerBThe session layerCThe data link layerDThe transport layerEThe network interface layerFThe physical layer

单选题You develop a service application named PollingService that periodically calls long-running procedures.These procedures are called from the DoWork method.You use the following service application code:   When you attempt to start the service, you receive the following error message: Could not start the PollingService service on the local computer.Error 1053: The service did not respond to the start or control request in a timely fashion. You need to modify the service application code so that the service starts properly.What should you do?()A Move the loop code into the constructor of the service class from the OnStart method.B Drag a timer component onto the design surface of the service. Move the calls to the long-running procedure from the OnStart method into the Tick event procedure of the timer, set the Enabled property of the timer to True, and call the Start method of the timer in the OnStart method.C Add a class-level System.Timers.Timer variable to the service class code. Move the call to the DoWork method into the Elapsed event procedure of the timer, set the Enabled property of the timer to True, and call the Start method of the timer in the OnStart method.D Move the loop code from the OnStart method into the DoWork method.

单选题Which statement is true about IP telephony calls?()A A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and  Layer 2 link header.B The voice carrier stream uses H323 to set up, maintain, and tear down call endpoints.C Call control signaling uses Real-Time Transport Protocol (RTP) packets that contain actual voice  samples.D The sum of bandwidth necessary for each major application, including voice, video, and data, should not exceed 75 percent of the total available bandwidth for each link.

单选题A TCP/IP application is transferring files from a personal machine to a remote machine.  The application writes 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size.  Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A Increase the size of thewallB Increase the size of sb_maxC Increase the size of tcp_recvspaceD Increase the size of tcp_sendspace

单选题A server is connected to a gigabit Ethernet switch and has negotiated 1Gbps / Full Duplex. When transferring large files to and from other servers on the segment via FTP slow performance is noticed.All network cabling,network hardware and server hardware were verified to be working correctly.  Which of the following could be done to improve performance?()A Decrease the TCP window size.B Increase the UDP window size.C Increase the TCP window size.D Decrease the UDP window size.

单选题Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App - V). You are creating an application virtualization package. Which sh ould you use?()AMicrosoft Application Virtualization SequencerBMicrosoft Application Virtualization Desktop ClientCMicrosoft System Center Application Virtualization Streaming ServerDMicrosoft System Center Application Virtualization Management Server

单选题A customer with a small IT budget has one data center. Their main application is a database running on an IBM System Storage DS8000. The database has a data change rate of 50% per day. Once a week, they must do a point-in-time backup from the database to tape. The time it takes to run the backup now exceeds the backup window allowed. The customer requests a proposal to reduce database downtime caused by running backups, with nearly no impact to production volumes.    In addition to the tape backup, which DS8000 feature should a technical specialist propose()AFlashCopyBFlashCopy SECMetro MirrorDGlobal Mirror

多选题A user wants to connect to the database instance from an application that is running on a remote machine. Which tools should the DBA use to establish the required configuration to ensure that the user is able to connect to the database instance?()AData PumpBOracle Net ManagerCOracle Enterprise ManagerDOracle Universal Installer (OUI)EDatabase Configuration Assistant (DBCA)

单选题A TCP/IP application receives files from a remote machine.  The application reads 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size. Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()A Increase the size of thewallB Increase the size of sb_maxC Increase the size of tcp_recvspaceD Increase the size of tcp_sendspace

单选题A customer asked a consultant to create the infrastructure for an application.  The application is designed to charge customers for conferencing services based on usage.  To determine if a Storage Area Network (SAN) is the best storage solution, which of the following questions is most appropriate?()AWill the application require a database?BWhich operating system does the application require?CWill the data need to be backed up in real time?DDoes the application share data among the servers?

单选题Which of the following is a feature of a unit of work?()AIt applies to a single data server.BIt is a recoverable sequence of operations.CIts value can be queried from the system catalog tables.DIt begins when the application connects to the data server.

单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()AAdd the list of files to /etc/exclude.rootvg.BModify the image.data file and add the files to be excluded form the backup.CModify the bosinst.data file and specify which files are to be excluded from the backup.DSpecify the files to be excluded on the command line when executing the mksysb command.