-
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
A . Layer 2 Edge mode
B . Layer 2 Central mode
C . Layer 2 In-Band mode
D . Layer 3 mode
-
You are designing the Active Directory site topology to meet the business and technical requirements. Which site or sites will require universal group membership caching?()
A . New York
B . Montreal
C . Quebec
D . San Francisco
E . Seattle
F . Vancouver
-
A user has a computer that runs Windows Vista.
You need to prevent the user from accessing contoso.com Web sites.
What should you do in Windows Internet Explorer?()
https://assets.asklib.com/images/image2/2018073115034297698.jpg
A . A
B . B
C . C
D . D
-
Your company has a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You need to activate SSL for the default Web site. Which two actions should you perform?()
A . Obtain and import a server certificate by using the IIS Manager console.
B . Select the Generate Key option in the Machine Key dialog box for the default Web site.
C . Add bindings for the HTTPS protocol to the default Web site by using the IIS Manager console.
D . Install the Digest Authentication component for the Web server role by using the Server Manager console.
-
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
A . Layer 2 mode
B . Layer 3 Edge mode
C . Layer 3 Central mode
D . Layer 3 In-Band mode
-
A company with three sites (one local production site, one intermediate site, and one remote site) wants to use Metro/Global Mirror. Which statement is correct about the volumes at the intermediate site()
A . the intermediate site volumes are Metro Mirror target volumes for the remote site
B . the intermediate site volumes are Global Mirror target volumes for the remote site
C . the intermediate site volumes are both Global Mirror source and Metro Mirror target at the same time
D . the intermediate site volumes are alsoFlashCopy sources for the remote site
-
You are designing the Active Directory site topology to meet the business and technical requirements. Which site or sites will require universal group membership caching?()
A . New York
B . Montreal
C . Quebec
D . San Francisco
E . Seattle
F . Vancouver
-
A customer has downloaded new firmware files for the IBM support Web Site. Which of the following is the correct method for updating the firmware for the QLogic Intelligent Passthru Module using the command line?()
A . Transfer the file to the FC module using FTP; use Telnet to the FC module to start the update
B . Use Telnet to the AMM to transfer the file using TFTP; start the update
C . Transfer the file to the FC module using Secure Copy Protocol (SCP);use Telnet to the FC module to start the update
D . Start the update and enter FC module IP address when prompted
-
A cluster indicates that a remote site has failed. What facilities exist in HACMP/XD:HAGeo to ensure that the failure is not just a TCP/IP communication failure?()
A . Electronic Service Agent software provides a redundant heartbeat between sites.
B . A non-IP network and Dial Back Fail Safe provide redundant heartbeats between sites.
C . The GeoMirror Devices provide a link validation facility that guarantees the validity between sites.
D . The Site Notification Daemon maintains a heartbeat between sites via short haul Modems/line drivers and dark fibre.
-
A HACMP/XD:HAGeo cluster has been installed with four nodes, two nodes at each site. The cluster is protected from site isolation by the DBFS facility in HACMP/XD:HAGeo. In the event of a site failure,what happens?()
A . The dominate site will always assume the non-dominate site has failed and continue processing.
B . The dominate site initiates a call to the non-dominate site to verify if any of the nodes are functional.
C . The non-dominate site initiates a call to the dominate site to verify if any of the nodes are functional.
D . The nodes are completely independent and can call each other if they detect a total failure of the ZGeo_Primary network.
-
One of your customer has six sites, three of which process a large amount of traffic among them.He plans to grow the number of sites in the future. Which is the most appropriate design topology?()
A . full mesh
B . peer-to-peer
C . partial mesh
D . hub and spoke
-
A developer for the Company.com web site has been told that users may turn off cookie support in their browsers. What must the developer do to ensure that these customers can still use the web application?()
A . The developer must ensure that every URL is properly encoded using the appropriate URL rewriting APIs
B . The developer must provide an alternate mechanism for managing sessions and abandon theHttpSession mechanism entirely
C . The developer can ignore this issue. Web containers are required to support automatic URL rewriting when cookies are not supported
D . The developer must ass the string ?id=
-
You create a Web site. The Web site has many predefined roles and associated users that will be used for security purposes. You need to manage these roles and user accounts. Which tool should you use? ()
A . the Microsoft .NET Framework Configuration tool
B . the Code Access Security Policy tool
C . the ASP.NET IIS Registration tool
D . the Web Site Administration Tool
-
A customer has a web application with HTTP Sessions that need to be replicated to a backup site that is more than 100 miles away from the primary site, connected over the Internet. Which type of session replication in WebLogic is recommended?()
A . MAN Replication
B . WAN Replication
C . Synchronous Replication
D . Asynchronous Replication
E . Database Replicatio
-
Which two features prevent routing loops between the OSPF sites of a customer when the sites aremultihomed or a backdoor link is used between the sites? ()
A . sham link
B . down bit
C . virtual link
D . Site of Origin
E . domain tag
-
If a web site is blocked because it has a low web reputation score, which of the following iscontained in the un-customized End-User Notification?()
A . The authenticated users,if authentication tool place.
B . The DVS engine verdict.
C . The web reputation score.
D . The Treat Type.
-
The Silk Road has been listed as a world heritage by UNESCO, it includes 33 historical sites along the road and 22 of them distribute in ____, Henan, Gansu and Xinjiang.
-
听力原文:Many interesting sites have come up on the Internet in recent years, but one of the most successful sites has been "oldfriends. com". Like all good ideas, this one is very simple. It's just a database of schools that you can add your name and e-mail address or phone number to, so that old friends can log on, find your details and contact you. In the studio today, we have two guests Mark Sorenson, a sociologist who has been investigating this phenomenon and Dr. Julie Arnforth, a psychologist who has recently produced a study of how and why friendships from the past can become very important to us in later life.
Who is speaking?
A.A sociologist
B.An old friend
C.Dr. Julie Arnforth
D.A radio or TV presenter
-
In computing, passwords are commonly used to limit access to official users. Yet the widespread use of passwords has serious drawbacks. Office workers now have to remember an average of twelve system passwords. In theory they should use different passwords for each site, but in reality these would be impossible to remember, so many people use the same password for all.
An additional problem is that the majority use simple words such as "hello", or names of family members, instead of more secure combinations of numbers and letters, such as 6ANV76Y. This permits computer hackers to download dictionaries and quickly find the word that allows them access.
When system users forget their passwords there is extra expense in supplying new ones, while if people are forced to change passwords frequently they often write them down, making systems even less secure. Therefore, it is clear that the idea of passwords, which have been used as security devices for thousands of years, may need rethinking.
One possible alternative has been developed by the American firm Real User, and is called "passfaces". In order to access the system a worker has to select a series of photographs of faces from a randomly (随机地) generated sequence. If the pictures are selected in the correct order, access is granted. This concept depends on the human ability to recognize and remember a huge number of different faces, and the advantage is that such a sequence cannot be told to anyone or written down, so is more secure. It is claimed that the picture sequence, which used photographs of university students, is easier to remember than passwords, and it has now been adopted for the United States Senate.
What is the disadvantage of passwords as mentioned in Paragraph 1?
A.They do not ensure security.
B.They are difficult to remember.
C.They have to be changed frequently.
D.They limit computer accessibility.
-
Several years ago, Simon Ma, CFA, founded an investment club with three friends. The investment clubs account grew rapidly to a substantial size, but the club has not actively traded the account for a
A、Yes,with respect to fiduciary duty.
B、Yes,with respect to selective disclosure.
C、Yes,with respect to conflicts of interest.
-
A BJT has measured dc current values of IB = 0.1 mA and IC = 8.0 mA. When IB is varied by 100 μA, IC changes by 10 mA. What is the value of the βac for this device?____()
A.80
B.10
C.100
D.800
-
A BJT has measured dc current values of IB = 0.1 mA and IC = 8.0 mA. When IB is varied by 100 μA, IC changes by 10 mA. What is the value of the βdc for this device()
A.80
B.10
C.100
D.800
-
Nora is a site administrator for a large e-commerce site.She notices that the site is running slower and taking longer to process transactions.What should Nora first do to trouble shoot the problem?()
A.Identify any bottlenecks in the current system by using the site diagnostic tools such as web trends.
B.Apply any necessary patches to the software running the site.
C.Monitor the CPU usage of the server running the site by using Windows NT performance monitor.
D.Test the site using different connection speeds to verify whether the connection is running more slowly.
-
Jeanne is the administrator of a very large e-commerce site.She notices that the site still contains many hypertext links to pages that were deleted from the site.What can Jeanne do to minimize customer impact of this oversight?()
A.Restrict access to pages that have broken links
B.Design a custom 404 error message page with a hyperlink that sends users back to the site
C.Set HTTP so it never redirects to error pages
D.Design a Multipurpose Internet Mail Extensions (MIME) type to solve the problem