You are evaluating whether to add an iSCSI target in the main office to add storage to the file servers.   Which technical requirement cannot be met when using an iSCSI target?()A、Ensure that the data on the file servers is protected by using BitLocker.B

题目

You are evaluating whether to add an iSCSI target in the main office to add storage to the file servers.   Which technical requirement cannot be met when using an iSCSI target?()

  • A、Ensure that the data on the file servers is protected by using BitLocker.
  • B、Ensure that the file servers can access additional storage as a local drive.
  • C、Ensure that new storage solutions are supported by Windows Failover Clustering.
  • D、Ensure that storage can be provisioned without causing any downtime of the file servers.

相似考题
更多“You are evaluating whether to add an iSCSI target in the main office to add storage to the file servers.   Which technical requirement cannot be met when using an iSCSI target?()A、Ensure that the data on the file servers is protected by using BitLocker.B、”相关问题
  • 第1题:

    your company has a main office and two branch offices. Domain controllers in the main office host an active directory-integrated zone. The DNS servers in the branch office host a secondary zone for the domain and use the main office DNS servers as their DNS master servers for the zone. The company adds a new branch office. You add a member server named branch3 and install the DNS service on the server. You configure a secondary zone for the domain. The zone transfer fails. You need to configure DNS to provide zone data to the DNS server in the new branch office. What should you do?()

    • A、Run dnscmd using the zoneresetmasters option.
    • B、Run dnscmd by using the zoneresetsecondaries option.
    • C、Add the new DNS server to the zone transfers tab on one of the DNS servers in the main office.
    • D、Add the new DNS server to the DNSUpdateProxy global security group in active directory users and computers.

    正确答案:C

  • 第2题:

    Which statements are true regarding the creation of an incident package file by using the EM Workbench Support?()

    • A、 You can add or remove the trace files to the package.
    • B、 You can create the incremental incident package ZIP file for new or modified diagnostic information for the incident package already created.
    • C、 You can add SQL test cases to the incident package.
    • D、 You cannot create an incremental incident package when the physical files are purged rom the ADR.

    正确答案:A,B,C

  • 第3题:

    You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) to perform backups in your databases. Which four backup operations can be performed using RMAN?()

    • A、A backup of the target database when it is mounted
    • B、A backup of online redo log files when the database is open
    • C、A backup of only used data blocks in the file beingbeingbackup up
    • D、A backup of online, read/write data files when the database is open
    • E、A backup of only those data blocks that have changed since a previous backup
    • F、A backup of online, read/write data files when the database is in the NOMOUNT state.

    正确答案:A,C,D,E

  • 第4题:

    You are using the control file to maintain information about the database backups that are being performed by Recovery Manager (RMAN).Identify two scenarios is which you must have a recovery catalog. ()(Choose two.)

    • A、To store the backup information of multiple database
    • B、To restrict the amount of space that is used by the backups
    • C、To maintain a backup for a certain time is set by the CONTROL_FILE_RECORD_KEEP_TIME parameter.
    • D、To list the data files that were in a target database at a given time by using the AT option of REPORT SCHEMA command.

    正确答案:A,D

  • 第5题:

    You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()

    • A、 rman TARGET / NOCATALOG
    • B、 rman TARGET sys/password
    • C、 rman TARGET sys/password AS SYSDBA
    • D、 rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat

    正确答案:B

  • 第6题:

    Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App - V). You are deploying servers to five new branch offices. Each branch office will stream virtual applications from a local file server and perform application sequencing locally. You need to replicate application packages to all file servers and minimize bandwidth usage. What should you do?()

    • A、Create a Distributed File System (DFS) root on each file server.
    • B、On each file server, add the BranchCache for network files role service.
    • C、Create an Active Directory Distributed Fi le System (DFS) root target folder.
    • D、Create a Distributed File System Replication (DFSR) full mesh replication group.

    正确答案:D

  • 第7题:

    You are evaluating whether to deploy Hyper-V.Which technical requirement is NOT met by a Hyper-V deployment?()

    • A、Allocate CPU resources between VMs.
    • B、Simplify the management of all hardware.
    • C、Ensure that the VMs can connect to multiple VLANs.
    • D、Minimize the amount of administrative effort required to convert physical servers to VMs.

    正确答案:D

  • 第8题:

    Your company has a main office and two branch offices.Domain controllers in the main office host an Active Directory-integrated zone.The DNS servers in the branch offices host a secondary zone for the domain and use the main office DNS servers as their DNS Master servers for the zone.The company adds a new branch office. You add a member server named Branch3 and install the DNS Server server role on the server. You configure a secondary zone for the domain. The zone transfer fails.You need to configure DNS to provide zone data to the DNS server in the new branch office.What should you do?()

    • A、Run dnscmd by using the ZoneResetMasters option.
    • B、Run dnscmd by using the ZoneResetSecondaries option.
    • C、Add the new DNS server to the Zone Transfers tab on one of the DNS servers in the main office.
    • D、Add the new DNS server to the DNSUpdateProxy Global security group in Active Directory Users and Computers.

    正确答案:C

  • 第9题:

    Your network contains the servers shown in the following table. Server name S erver role Server location Server share Server1 File server Office1 Data1 Server2 File server Office2 Data2 Office1 and Office2 connect to each other by using a WAN link. Users in Office2 frequently access the same set of files stored in Data1. You need to reduce the amount of file transfer traffic across the WAN link. What should you add to Server1?()

    • A、the Background Intelligent Transfer Service (BITS) feature
    • B、the BranchCache feature
    • C、the BranchCache for network files role service
    • D、the Distributed File System (DFS) role service

    正确答案:C

  • 第10题:

    You need to recommend a file access solution for the Templates share.   Which two actions should you recommend?()

    • A、Add File2 as a namespace server for //fabrikam.com/dfs.
    • B、Add //File2/templates as a folder target for //fabrikam.com/dfs/templates.
    • C、In the Group Policy preferences of GPO2 and GPO3, add new mapped drives.
    • D、Create a DFS Replication group that contains //File1/templates and //File2/templates.

    正确答案:B,D

  • 第11题:

    单选题
    You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()
    A

     rman TARGET / NOCATALOG

    B

     rman TARGET sys/password

    C

     rman TARGET sys/password AS SYSDBA

    D

     rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    You are evaluating whether to add an iSCSI target in the main office to add storage to the file servers.   Which technical requirement cannot be met when using an iSCSI target?()
    A

    Ensure that the data on the file servers is protected by using BitLocker.

    B

    Ensure that the file servers can access additional storage as a local drive.

    C

    Ensure that new storage solutions are supported by Windows Failover Clustering.

    D

    Ensure that storage can be provisioned without causing any downtime of the file servers.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    A customer has one IBM System Storage DS8700 in their main data center with one DS6800 at a secondary site. They are using the Global Copy feature between the sites. They want to bring up a test image at the secondary site using the primary site data. Which sequence of actions will properly bring up the secondary site?()

    • A、bring up the secondary site on the target disks
    • B、suspend and bring up the secondary site on the target disks
    • C、perform a FlashCopy and bring up the secondary site on the target disks
    • D、"go-to-sync", perform aFlashCopy, and bring up the secondary site on the target disks

    正确答案:D

  • 第14题:

    You are using the control file to maintain information about the database backups that are being performed by Recovery Manager (RMAN). Identify two scenarios is which you must have a recovery catalog.()

    • A、To store the backup information of multiple database
    • B、To restrict the amount of space that is used by the backups
    • C、To maintain a backup for a certain time is set by the CONTROL_FILE_RECORD_KEEP_TIME parameter.
    • D、To list the data files that were in a target database at a given time by using the AT option of REPORT SCHEMA command.

    正确答案:A,D

  • 第15题:

    It is a holiday and no transactions are being performed on the database. You took a consistent backup of your database without using Recovery Manager (RMAN). How would you make use of this consistent backup in RMAN?()

    • A、cannot be used in RMAN
    • B、by starting up the database again
    • C、by using the CATALOG command of RMAN
    • D、by using the RECOVER CATALOG command in RMAN
    • E、by re-creating the target control file to rebuild the RMAN repository

    正确答案:C

  • 第16题:

    In Recovery Manager (RMAN), you have set control file autobackup to ON by using the following command: CONFIGURE CONTROLFILE AUTOBACKUP ON; Which two events would cause the control file to be backed up automatically? ()

    • A、 A tablespace is taken offline.
    • B、 The database instance is restarted.
    • C、 A new data file is added to an existing tablespace.
    • D、 A successful backup is recorded in the RMAN repository.
    • E、 The RMAN connection is disconnected from the target database.

    正确答案:C,D

  • 第17题:

    You are evaluating whether to add an additional hard disk drive to each file server and create a striped volume for the data files.   Which storage requirement is met by adding the hard disk drive and creating the striped volume?()

    • A、Improve data availability on the file servers.
    • B、Improve the performance of the file servers.
    • C、Provide additional storage on the file servers without causing downtime.
    • D、Enable users to access the previous versions of all the files stored on the file servers.

    正确答案:B

  • 第18题:

    Cer-tech .com hosts a single Active Directory domain. All servers have Windows Server 2008. You areinstructed to install an iSCSI storage area network (SAN) for a group of file servers. Corporate securitypolicy requires that all data communication to and from iSCSI SAN must be very secure. You are assignedthe task to implement the highest security available for communications to and from the iSCSI SAN. Whatshould you do to achieve this task?()

    • A、Create a Group Policy Object (GPO) to enable System objects
    • B、Create a Microsoft Challenge Handshake Authentication Protocol (MS-CHAPv2) authentication in iSCSIInitiator Properties.
    • C、Open iSCSI Initiator Properties and implement IPSec security. Set up inbound and outbound rules byusing Windows Firewall
    • D、Open iSCSI Initiator Properties and implement Secure Mode transition. Set outbound and inbound rulesby using Windows Defender

    正确答案:C

  • 第19题:

    You are the network administrator for ExamSheet.  You plan to upgrade 550 computers from Windows 95 to Windows 2000 Professional. You create an Unattend.txt file by using Setup Manager. You copy the file to the network share that will be used to install Windows 2000 Professional. You start the installation on a test computer by using a network shared folder and an answer file. When the installation is complete, you realize that the upgraded computers are not utilizing their entire hard disks.  You want to ensure that the unattended installation utilizes the entire hard drive on all computers. What should you do? ()

    • A、Add an [Unattended] section to Unattend.txt, and set theFileSystemparameter toConvertNTFS. 
    • B、Rename Unattend.txt to Cmdlines.txt and copy it to the /$OEM$ subdirectory.
    • C、Add a [GUIRunOnce] section to answer file, and add an entry for the Unattend.txt file.
    • D、Create a /$OEM$/S$ folder on the hard disk of the test computer, and copy Unattend.txt to thefolder.
    • E、Add an [Unattended] section to Unattend.txt, and set theExtendOEMPartitionto1.
    • F、Add an [Unattended] section to Unattend.txt, and set theExtendOEMPartitionparameter to999.

    正确答案:A,E

  • 第20题:

    You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Your network includes domain controllers, file and print servers, and application servers. The application servers run a variety of programs, including Microsoft SQL Server 2000 and Microsoft Exchange Server 2003. Your staff are responsible for monitoring current system performance on all servers. You need to enable your staff to use System Monitor to gather performance data for each unique server type. The data will be used for trend analysis and forecasting. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)

    • A、For each server, add the most common performance counters and save them as an HTML file.
    • B、For each server, add the most common performance counters and save them as a counter report file.
    • C、Create trace logs based on the file and schedule and trace logs to gather data.
    • D、Create alerts on the file and schedule the alerts to gather data.
    • E、Create counter logs based on the file and schedule the counter logs to gather data.

    正确答案:A,E

  • 第21题:

    Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App-V). You are deploying servers to five new branch offices. Each branch office will stream virtual applications from a local file server and perform application sequencing locally. You need to replicate application packages to all file servers and minimize bandwidth usage. What should you do?()

    • A、Create a Distributed File System (DFS) root on each file server.
    • B、On each file server, add the BranchCache for network files role service.
    • C、Create an Active Directory Distributed File System (DFS) root target folder.
    • D、Create a Distributed File System Replication (DFSR) full mesh replication group.

    正确答案:D

  • 第22题:

    多选题
    You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) to perform backups in your databases. Which four backup operations can be performed using RMAN?()
    A

    A backup of the target database when it is mounted

    B

    A backup of online redo log files when the database is open

    C

    A backup of only used data blocks in the file beingbeingbackup up

    D

    A backup of online, read/write data files when the database is open

    E

    A backup of only those data blocks that have changed since a previous backup

    F

    A backup of online, read/write data files when the database is in the NOMOUNT state.


    正确答案: C,F
    解析: 暂无解析

  • 第23题:

    多选题
    In Recovery Manager (RMAN), you have set control file autobackup to ON by using the following command:  CONFIGURE CONTROLFILE AUTOBACKUP ON;  Which two events would cause the control file to be backed up automatically? ()
    A

    a tablespace is taken offline

    B

    the database instance is restarted

    C

    a new data file is added to an existing tablespace

    D

    a successful backup is recorded in the RMAN repository

    E

    the RMAN connection is disconnected from the target database


    正确答案: A,E
    解析: 暂无解析