You are designing a strategy to optimize the DNS name resolution for the satellite offices that connect to the branch offices by using ISDN lines. What should you do?()
You are planning the migration of a Microsoft SQL Server 2008 database to SQL Azure. You need to recommend an approach for ensuring that database connectivity does not degrade. Which two actions should you recommend?()
You are connecting to an Oracle database server from a client by using the following connect string: SQL> CONNECT hr/hr@pdserver.us.oracle.com:1521/proddb Which naming method is being used in this case?()
You are implementing a very simple TCP/IP network. It rarely changes and you would like to use Oracle Connection Manager to filter client requests. Which naming method can you use?()
You are the administrator of a company with BGP connections to multiple ISP’s. How could youconfigure BGP to make it favor one particular ISP for outbound traffic?()
You are preparing for a new installation of SQL Server 2005. You need to select the protocols that client computers might use to connect to the server. Which two protocols can you use to achieve this goal?()
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
You are creating a shared Internet connection on your Windows 2000 Professional computer. You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet. What should you do?()
You are preparing to create a point to point WAN by connecting a Cisco router with a Juniper router by way of their serial links. Which one of the following commands would you use?()
You are installing a Cisco ONS 15454 in a service provider site. A DS3 cable is to be connected to a digital cross-connect system. What is the maximum distance allowed between the two?()
You are connecting to an Oracle database server from a client by using the following connect string: SQL> CONNECT hr/hr@pdserver.us.oracle.com:1521/proddb Which naming method is being used in this case?()
You are a technician at TestKing. Your newly appointed TestKing trainee is setting up a new frame relay connection to a remote branch and wants to know what the valid options for frame relay LMI types are.What would your reply be?()
Remote users are unable to connect to a shared folder on your computer. You need to allow access to the shared folder. What are the two possible ways to achieve this goal?()
You are using a dialup connection. You want to ensure that your password is encrypted. What protocols from the list below would you disable? ()
What are the three steps you should take to tune a JDBC Connection pool in WebLogic from the initial settings in a production environment?()
You are installing a Cisco ONS 15454 SDH in a service provider site. An E3 cable is being connected to a digital cross-connect system. What is the maximum distance allowed between the two?()
You are designing a strategy to optimize the DNS name resolution for the satellite offices that connect to the branch offices by using ISDN lines. What should you do?()
A Windows Azure application connects to a SQL Azure database. Connections to the database are being dropped due to throttling. You need to recommend an approach for identifying the root cause of the problem. Which two actions should you recommend?()
You are configuring a virtual machine (VM) that is running on a Windows Server 2008 R2 host server. The primary virtual disk is connected to IDE Controller 0. You need to add a virtual disk to the VM without shutting down the VM. What should you do?()
You are implementing a new frame relay network to provide connectivity between you offices. To do this, you set up the frame relay network using point-to-point subinterfaces.Which of the following does NOT need to be configured?()
You are preparing for a new installation of SQL Server 2005. You need to select the protocols that client computers might use to connect to the server. Which two protocols can you use to achieve this goal?()
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003.The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.You need to collect information about which users are connecting to the Web site by using HTTPS.What should you do?()
You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources.You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.Which configuration solves this problem?()