Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()  A、 Use C-SPOC to add the file system while the cluster is run

题目

Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()  

  • A、 Use C-SPOC to add the file system while the cluster is running.
  • B、 Add the file system,and them perform the exportvg and importvg on the required nodes.
  • C、 Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.
  • D、 Break the reservation locks on the disk drives while the cluster is active and add the file system.

相似考题
更多“Company.com needs to”相关问题
  • 第1题:

    船舶需要装卸货。()

    • A、The ship needs loading.
    • B、The ship needs discharging.
    • C、The ship needs unloading.
    • D、The ship needs loading and discharging.

    正确答案:D

  • 第2题:

    My car()

    • A、needs towash
    • B、needs wash
    • C、needs washing
    • D、needs being washed

    正确答案:C

  • 第3题:

    Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()

    • A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
    • B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
    • C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
    • D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

    正确答案:B

  • 第4题:

    Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()

    • A、dig company.com ns
    • B、ipconfig/all
    • C、ifconfig-a
    • D、dig company.com mx

    正确答案:A

  • 第5题:

    Company.com has several network adapters configured as backup paths using the Virtual IP Addressing and dynamic routing of AIX. A second node needs to be added to the environment to crate a cluster. What considerations must be addressed during the planning session?()  

    • A、 HACMP supports most types of networks,including Virtual IP Addressing by AIX.
    • B、 If HACMP IP aliasing is used,the devices may be the Virtual IP type used by AIX.
    • C、 Using the AIX Virtual IP Addressing scheme HACMP can provide near fault tolerant availability of the network.
    • D、 The AIX Virtual Addressing mechanism is not supported by HACMP,but a similar configuration can be created in HACMP.

    正确答案:D

  • 第6题:

    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()

    • A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.
    • B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.
    • C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.
    • D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

    正确答案:A

  • 第7题:

    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()

    • A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.
    • B、The best option is to set up a content filtering feature to comply with the Company.com security policy.
    • C、The best option is to create a transport rule to comply with the Company.com security policy.
    • D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

    正确答案:C

  • 第8题:

    单选题
    With time going on, _____.
    A

    a luxury may change into a need which most people want to get

    B

    the basic needs are getting smaller and smaller

    C

    a luxury and the basic needs can be exchanged

    D

    the basic needs can be changed into a luxury


    正确答案: C
    解析:
    推理题。最后一段首句指出“But as time goes on, what we think of as our basic needs changes.”在不同的时代,人们的基本需要是不一样的,几十年前的奢侈品几十年后也许就成了普通物品了。

  • 第9题:

    单选题
    A company needs to implement an offsite backup method that is replicated and needs toguarantee that the data cannot be changed once it is replicated.  Which of the following would meet the company’s needs?()
    A

    SAN

    B

    WORM

    C

    NAS

    D

    CD-RW


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    The network printer is locking up and printing garbled text. When the user cancels the job fromtheir local print queue, nothing happens. Which of the following is the MOST likely cause?()
    A

    The printer needs to be power cycled to clear the job.

    B

    The print server’s queue needs to be checked.

    C

    The printer needs to be set to factory defaults.

    D

    The user’s workstation needs to be rebooted.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()
    A

     Use C-SPOC to add the file system while the cluster is running.

    B

     Add the file system,and them perform the exportvg and importvg on the required nodes.

    C

     Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.

    D

     Break the reservation locks on the disk drives while the cluster is active and add the file system.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    船舶需要装卸货。()
    A

    The ship needs loading.

    B

    The ship needs discharging.

    C

    The ship needs unloading.

    D

    The ship needs loading and discharging.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    My car()

    • A、needs to wash
    • B、needs washing
    • C、needs being washed
    • D、need swash

    正确答案:B

  • 第14题:

    A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests.  Which design patterns, working together, address these issues?()

    • A、 Front Controller and Transfer Object
    • B、 Front Controller and Service Locator
    • C、 Business Delegate and Transfer Object
    • D、 Business delegate and Intercepting Filter
    • E、 Model-View-Controller and Intercepting Filter

    正确答案:C

  • 第15题:

    Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook to connect to their mailboxes.A Company.com employee named Rory Allen complains that he is unable to send encrypted e-mail messages to an external recipient client.Furthermore, both of these users use e-mail encryption certificates.Rory Allen needs to send encrypted e-mail messages to the external recipient client.What should you do?()

    • A、The best option is to inform Rory Allen to change the sensitivity settings of the e-mail message.
    • B、The best option is to inform the external recipient client to add a delegate.
    • C、The best option is to inform the external recipient client to send a signed e-mail message to Rory Allen.
    • D、The best option is to inform Rory Allen to send a signed e-mail message to the external recipient client.

    正确答案:C

  • 第16题:

    When setting up a new store, which of the following steps is required in order to use the PasswordInvalidation feature?()

    • A、The ChangePassword page needs to be implemented.
    • B、The password policy needs to be defined.
    • C、The account lockout policy needs to be defined.
    • D、The LoginTimeoutError view and ReLogonForm view need to be defined.

    正确答案:A

  • 第17题:

    User2 is complaining that he is unable to list the contents of a directory. What is the most likely cause?()

    • A、User2 needs write permission to the directory.
    • B、User2 needs both read and write permissions to the directory.
    • C、User2 needs both read and execute permissions to the directory.
    • D、User2 needs both write and execute permissions to the directory.

    正确答案:C

  • 第18题:

    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()

    • A、The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.
    • B、The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.
    • C、The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.
    • D、The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.

    正确答案:A

  • 第19题:

    Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()

    • A、You should consider configuring the sender reputation.
    • B、You should consider configuring the sender filtering.
    • C、You should consider configuring the content filtering.
    • D、You should consider configuring the recipient filtering.

    正确答案:C

  • 第20题:

    单选题
    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()
    A

    The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.

    B

    The best option is to set up a content filtering feature to comply with the Company.com security policy.

    C

    The best option is to create a transport rule to comply with the Company.com security policy.

    D

    The best option is to set up a sender reputation feature to comply with the Company.com security policy.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    User2 is complaining that he is unable to list the contents of a directory. What is the most likely cause?()
    A

    User2 needs write permission to the directory.

    B

    User2 needs both read and write permissions to the directory.

    C

    User2 needs both read and execute permissions to the directory.

    D

    User2 needs both write and execute permissions to the directory.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook to connect to their mailboxes.A Company.com employee named Rory Allen complains that he is unable to send encrypted e-mail messages to an external recipient client.Furthermore, both of these users use e-mail encryption certificates.Rory Allen needs to send encrypted e-mail messages to the external recipient client.What should you do?()
    A

    The best option is to inform Rory Allen to change the sensitivity settings of the e-mail message.

    B

    The best option is to inform the external recipient client to add a delegate.

    C

    The best option is to inform the external recipient client to send a signed e-mail message to Rory Allen.

    D

    The best option is to inform Rory Allen to send a signed e-mail message to the external recipient client.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()
    A

    You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.

    B

    You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.

    C

    You should consider having mail enabled for KingPublic.

    D

    You should consider having the author role assigned to Anonymous.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    To succeed in a scientific research project ______ .
    A

    one needs to be persistent

    B

    persistence is needed

    C

    one needs be a persistent person

    D

    persistence is what one needs


    正确答案: D
    解析:
    to succeed in a scientific research project是动词不定式短语,在句子中作目的状语,其逻辑主语是句子的主语,主语必须是人。need为实义动词(情态动词没有第三人称单复数变化),与另一动词连用时后接不定式符号构成need to be,故A项为正确答案。