During the implement phase, systems acceptance testing does which of the following for the customer? Select exactly 1 answer(s) from the following:()。A、installation, configuration, and testing, as well as the commissioning of tools and processes in accord

题目

During the implement phase, systems acceptance testing does which of the following for the customer? Select exactly 1 answer(s) from the following:()。

  • A、installation, configuration, and testing, as well as the commissioning of tools and processes in accordance with the operations implementation plan
  • B、provision of information regarding customer-specified design requirements and configuration
  • C、the migration of network services from an existing state to a future state in accordance with the migration plan
  • D、the provision of an objective means of measuring system operability and functionality

相似考题
更多“During the implement”相关问题
  • 第1题:

    You are the administrator of a SQL Server 2000 computer. Your company purchased an accounting application from a vendor. The application stores its data in a database named Accounting on the server. The tables in this database contain columns that function as primary keys, but PRIMARY KEY and FOREIGN KEY constraints are not used.

    You need to replicate data from this database to another SQL Server computer. This server will use the replicated data to generate reports. Most reports will run each month, but the accounting department needs to have the ability to run reports at any time. Reports should be accurate through the last full working day.

    You cannot make any changes to the database, but you need to implement replication. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)

    A.Implement merge replication.

    B.Implement snapshot replication.

    C.Implement transactional replication.

    D.Schedule replication to run continuously.

    E.Schedule replication to run during off-peak hours.


    正确答案:BE
    解析:Explanation:
    B: Snapshot replication is the best solution since we will not be making changes to the Accounting database but need to replicate data from the database to another SQL Server computer and as the accounting department needs to have the ability to run reports that only need to be accurate through the last full working day.

    E: Only one snap-shot replication would be necessary per day, and to make as little impact on the daily use of the server this replication should be scheduled during off-peak hours.

    Note: SQL Server 2000 provides three types of replication that can be used in distributed applications. These are snapshot replication, transactional replication and merge replication. Each type provides different capabilities.

    Snapshot replication is the process of copying and distributing data and database objects exactly as they were at the time the snapshot was taken. Snapshot replication does not require continuous monitoring of changes because changes made to published data are not propagated to the Subscriber incrementally. Subscribers are updated with a complete data set and not individual transactions. As snapshot replication replicates an entire data set at one time, it may take longer to propagate data modifications to Subscribers. This type of replication in helpful in situations when data is mostly static and does not change often; it is acceptable to have copies of data that are out of date for a period of time; replicating small volumes of data; and when sites are often disconnected and high latency (the amount of time between when data is updated at one site and when it is updated at another) is acceptable.

    In transactional replication, an initial snapshot of data is propagated to Subscribers, and then when data modifications are made at the Publisher, the individual transactions are captured and propagated to Subscribers. SQL Server 2000 monitors INSERT, UPDATE, and DELETE statements, and changes to stored procedure executions and indexed views. SQL Server 2000 stores the transactions affecting replicated objects and then it propagates those changes to Subscribers continuously or at scheduled intervals. Transaction boundaries are preserved. Transactional replication is used when data modifications must be propagated to Subscribers, often as they occur; transactions must be atomic; subscribers are mostly connected to the Publisher and when the application will not tolerate high latency for Subscribers receiving changes.

    Merge replication allows various sites to work autonomously and merge data modifications made at multiple sites into a single, uniform. result at a later time. The initial snapshot is applied to Subscribers and then SQL Server 2000 tracks changes to published data at the Publisher and at the Subscribers. The data is synchronized between servers either at a scheduled time or on demand. Updates are made independently at more than one server, so the same data may have been updated by the Publisher or by more than one Subscriber. Therefore, conflicts can occur when data modifications are merged. This type of replication is helpful when multiple Subscribers need to update data at various times and propagate those changes to the Publisher and to other Subscribers; Subscribers need to receive data, make changes offline, and synchronize changes later with the Publisher and other Subscribers; the application latency requirement is either high or low, and when site autonomy is critical.

    Incorrect Answers:
    A: No data at the second server will not be changed so there is no need to use merge replication.

    C: We don’t need the accuracy of transactional replication. In this scenario high latency is permissible as the reports must be accurate only through the last full working day.

    Note: Transactional replication is used when data modifications must be propagated to Subscribers, often as they occur; transactions must be atomic; subscribers are mostly connected to the Publisher and when the application will not tolerate high latency for Subscribers receiving changes.

    D: As the reports must be accurate through the last full working day, it not necessary to run replication continuously. Running replication continuously will place locks on the destination database, which would hamper the performance of queries and actions run against the destination database.

  • 第2题:

    What are two methods of mitigating MAC address flooding attacks?()

    • A、Place unused ports in a common VLAN.
    • B、Implement private VLANs.
    • C、Implement DHCP snooping.
    • D、Implement port security.
    • E、Implement VLAN access maps.

    正确答案:D,E

  • 第3题:

    You need to design a PKI solution that meets business and security requirements. What should you do?()

    • A、Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offline
    • B、Implement an enterprise root CA in the corp.woodgrovebank.com domain
    • C、Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offline
    • D、Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains

    正确答案:A

  • 第4题:

    Which of the following should be the FINAL step according to the troubleshooting theory?()

    • A、Verify full system functionality
    • B、Implement preventative measures
    • C、Implement the solution
    • D、Document findings and outcomes

    正确答案:D

  • 第5题:

    Which three best practices should be implemented at the campus backbone submodule to supportthe server farm module? ()

    • A、 Implement highly redundant switching and links with no single points or paths of failure.
    • B、 Implement server load balancing.
    • C、 Implement the Hot Standby Router Protocol (HSRP) for failover protection.
    • D、 Implement intrusion detection with automatic notification of intrusion attempts in place.

    正确答案:A,C,D

  • 第6题:

    An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits? ()

    • A、 Implement an intrusion detection system (IDS).
    • B、 Implement a dual-factor authentication method.
    • C、 Implement a patch management process.
    • D、 Implement stronger user passwords.

    正确答案:C

  • 第7题:

    Company.com has a four-node cluster (nodes ’A’, ’B’, ’C’, and ’D’). The nodes are set up in  Resource group pairs. Node ’A’ falls over to Node ’B’, and Node ’C’ falls over to Node ’C’. During a maintenance windows, it was discovered that the six resource groups on Node ’A’ are too much to be adequately handled by Node ’B’.  What could be done to better utilize the available resources during fallover?()  

    • A、 Implement Work Load manager so that the application monitors for additional resource      requirements.
    • B、 Add a fifth node to function as a load leveler in order to control the dispatching of the resource jobs.
    • C、 Implement Dynamic Node Priorities in the resource groups in order to find a node with suitable system resources.
    • D、 Reduce the number of resource groups on Node ’A’ to 1 in order to ensure faster and more robust fallover to a single system.

    正确答案:C

  • 第8题:

    Which of the following is true about job chains?()

    • A、They consist of one or more Scheduler programs.
    • B、They are used to implement dependency scheduling.
    • C、They are used to implement time-based scheduling.
    • D、They are used to implement event-based scheduling.
    • E、None of the above.

    正确答案:B

  • 第9题:

    You need to recommend a solution for promoting the RODC in the new branch office.What should you include in the recommendations?()

    • A、Implement the Windows Search service and implement a custom iFilter.
    • B、Implement File Server Resource Manager (FSRM) and configure file classifications.
    • C、Implement Microsoft SharePoint Foundation 2010 and create a custom workflow.
    • D、Implement a Distributed File System (DFS) namespace and configure folder targets.

    正确答案:B

  • 第10题:

    单选题
    Which of the following is true about job chains?()
    A

    They consist of one or more Scheduler programs.

    B

    They are used to implement dependency scheduling.

    C

    They are used to implement time-based scheduling.

    D

    They are used to implement event-based scheduling.

    E

    None of the above.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Your web application requires the adding and deleting of many session attributes during a complex usecase. A bug report has come in that indicates that an important session attribute is being deleted too soonand a NullPointerException is being thrown several interactions after the fact. You have decided to create asession event listener that will log when attributes are being deleted so you can track down when theattribute is erroneously being deleted. Which listener class will accomplish this debugging goal?()
    A

    Create an HttpSessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getName method on the event object.

    B

    Create an HttpSessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getName method on the event object.

    C

    Create an SessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getAttributeName method on the event object.

    D

    Create an SessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getAttributeName method on the event object.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    多选题
    Which two service components are performed during the wireless implement phase?()
    A

    project planning

    B

    configuration management

    C

    wireless readiness assessment

    D

    systems acceptance testing

    E

    site readiness specification


    正确答案: D,C
    解析: 暂无解析

  • 第13题:

    下列各宏命令中,应该放在类实现中以支持序列化特性的宏命令是()。 

    • A、IMPLEMENT_DYNAMIC(class_Name)
    • B、IMPLEMENT_DYNCREATE(class_Name)
    • C、IMPLEMENT_SERIAL(class_Name)
    • D、IMPLEMENT_MESSAGE_MAP()

    正确答案:C

  • 第14题:

    Which two service components are performed during the wireless implement phase?()

    • A、project planning
    • B、configuration management
    • C、wireless readiness assessment
    • D、systems acceptance testing
    • E、site readiness specification

    正确答案:A,D

  • 第15题:

    You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()

    • A、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.
    • B、Implement IEndpointldentityProvider in the message contract class.
    • C、Implement ISecureConversationSession in the message contract class.
    • D、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.

    正确答案:D

  • 第16题:

    Which of these correctly identifies the six phases of the Cisco Lifecycle Services framework? ()

    • A、Prepare, Plan, Create, Implement, Operate, and Improve
    • B、Prepare, Plan, Design, Implement, Operate, and Optimize
    • C、Prepare, Plan, Design, Apply, Operate, and Manage
    • D、Prepare, Plan, Design, Implement, Operate and Manage

    正确答案:B

  • 第17题:

    Which of the following is the BEST way to allow web software through the server firewall?()

    • A、Implement an application exception.
    • B、Implement an access control list (ACL).
    • C、Open the corporate firewall to allow port 80.
    • D、Implement port blocking on port 80.

    正确答案:B

  • 第18题:

    An administrator needs to implement a security patch policy on the network that adheres to an internal SLA. Which of the following actions BEST achieves this task?()

    • A、Define a test server group, install the patches and if successful schedule installation on production servers.
    • B、Define a test server group, schedule installation on production servers and then install all updates and patches.
    • C、Install the patches during a non-working hour.
    • D、Send an email to all company users and request the best time for installation.

    正确答案:A

  • 第19题:

    A network for a two-node cluster has been planned. The network administrator has explained that the networkdoes not support gratuitous ARP. Which of the following steps will ensure that clients are able to connect tothe cluster after a failover takes place?()

    • A、Implement heartbeating over IP aliases
    • B、Implement persistent service IP addresses
    • C、Implement IPAT aliasing with hardware address takeover (HWAT)
    • D、Implement IPAT replacement with hardware address takeover (HWAT)

    正确答案:D

  • 第20题:

    You are a network administrator for your company. The company has a main office and two branch offices. The branch offices are connected to the main office by T1 lines. The network consists of three Active Directory sites, one for each office. All client computers run either Windows 2000 Professional or Windows XP Professional. Each office has a small data center that contains domain controllers, WINS, DNS, and DHCP servers, all running Windows Server 2003.   Users in all offices connect to a file server in the main office to retrieve critical files. The network team reports that the WAN connections are severely congested during peak business hours. Users report poor file server performance during peak business hours. The design team is concerned that the file server is a single point of failure. The design team requests a plan to alleviate the WAN congestion during business hours and to provide high availability for the file server.   You need to provide a solution that improves file server performance during peak hours and that provides high availability for file services. You need to minimize bandwidth utilization.   What should you do? ()

    • A、 Purchase two high-end servers and a shared fiber-attached disk array. Implement a file server cluster in the main office by using both new servers and the shared fiber-attached disk array.
    • B、 Implement Offline Files on the client computers in the branch offices by using Synchronization Manager. Schedule synchronization to occur during off-peak hours.
    • C、 Implement a stand-alone Distributed File System (DFS) root in the main office. Implement copies of shared folders for the branch offices. Schedule replication of shared folders to occur during off-peak hours by using scheduled tasks.
    • D、 Implement a domain Distributed File System (DFS) root in the main office. Implement DFS replicas for the branch offices. Schedule replication to occur during off-peak hours.

    正确答案:D

  • 第21题:

    Which two can be used to create a new Thread? ()

    • A、 Extend java.lang.Thread and override the run method.
    • B、 Extend java.lang.Runnable and override the start method.
    • C、 Implement java.lang.thread and implement the run method.
    • D、 Implement java.lang.Runnable and implement the run method.
    • E、 Implement java.lang.Thread and implement the start method.

    正确答案:A,D

  • 第22题:

    单选题
    During the implement phase, systems acceptance testing does which of the following for the customer? Select exactly 1 answer(s) from the following:()。
    A

    installation, configuration, and testing, as well as the commissioning of tools and processes in accordance with the operations implementation plan

    B

    provision of information regarding customer-specified design requirements and configuration

    C

    the migration of network services from an existing state to a future state in accordance with the migration plan

    D

    the provision of an objective means of measuring system operability and functionality


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    You are a network administrator for your company. The company has a main office and two branch offices. The branch offices are connected to the main office by T1 lines. The network consists of three Active Directory sites, one for each office. All client computers run either Windows 2000 Professional or Windows XP Professional. Each office has a small data center that contains domain controllers, WINS, DNS, and DHCP servers, all running Windows Server 2003.   Users in all offices connect to a file server in the main office to retrieve critical files. The network team reports that the WAN connections are severely congested during peak business hours. Users report poor file server performance during peak business hours. The design team is concerned that the file server is a single point of failure. The design team requests a plan to alleviate the WAN congestion during business hours and to provide high availability for the file server.   You need to provide a solution that improves file server performance during peak hours and that provides high availability for file services. You need to minimize bandwidth utilization.   What should you do? ()
    A

     Purchase two high-end servers and a shared fiber-attached disk array. Implement a file server cluster in the main office by using both new servers and the shared fiber-attached disk array.

    B

     Implement Offline Files on the client computers in the branch offices by using Synchronization Manager. Schedule synchronization to occur during off-peak hours.

    C

     Implement a stand-alone Distributed File System (DFS) root in the main office. Implement copies of shared folders for the branch offices. Schedule replication of shared folders to occur during off-peak hours by using scheduled tasks.

    D

     Implement a domain Distributed File System (DFS) root in the main office. Implement DFS replicas for the branch offices. Schedule replication to occur during off-peak hours.


    正确答案: C
    解析: 暂无解析