You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been direct

题目

You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()

  • A、Apply the new license to the passive node of the cluster.
  • B、Configure an external load balancer to hold the V IP.
  • C、Disable the active node in the cluster.
  • D、Remove the IF-MAP server configuration.

相似考题
更多“You are an administrator of an ”相关问题
  • 第1题:

    You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()

    A. Configuration register

    B. NVRAM

    C. Boot flash

    D. CMOS

    E. Flash


    参考答案:A, B

  • 第2题:

    You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?()

    • A、Bandwidth 56000
    • B、Bandwidth 56000000
    • C、Bandwidth 56
    • D、Bandwidth 56kbps

    正确答案:C

  • 第3题:

    Your network contains a single Active Directory domain. All servers on the network are members of the domain. You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has two NTFS partitions. You create and share a folder named Data in the root of a partition on Server1. You log on to your computer by using the domain Administrator account and discover that you cannot modify files in the Data share. You need to ensure that the Administrator can modify files in the Data share. The solution must use the minimum amount of permissions. What should you do? ()

    • A、Modify the NTFS permissions on the Data folder.
    • B、Modify the share permissions on the Data share.
    • C、Add the domain administrator to the local Administrator’s group on Server1.
    • D、Move the Data folder to a new file allocation table (FAT) partition. Share the folder by using the default permissions.

    正确答案:B

  • 第4题:

    You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack.   The messaging infrastructure is configured to support the remote wipe feature.   When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message.   You need to ensure that the administrator is authorized to perform remote wipes only.   What should you do?()

    • A、Grant the administrator membership in the Domain Administrators group.
    • B、Grant the administrator membership in the Exchange Administrators group.
    • C、Add the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.
    • D、Select the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.

    正确答案:C

  • 第5题:

    You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()

    • A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.
    • B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. 
    • C、Use Windows Explorer to turn on auditing for the specific files.
    • D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.
    • E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.
    • F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on. 

    正确答案:E

  • 第6题:

    You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()

    • A、In the Web.config file, enable impersonation.
    • B、In IIS, enable anonymous access.
    • C、In IIS, disable anonymous access.
    • D、In the Web.config file, set the authentication mode to Windows.

    正确答案:C,D

  • 第7题:

    You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to use administrative delegation on a series of cmdlets?()

    • A、You must implement log transactions
    • B、You must set up new management role
    • C、You must implement Mailbox journaling
    • D、You must set up a Role Based Access Control (RBAC) role

    正确答案:B

  • 第8题:

    多选题
    You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()
    A

    Configuration register

    B

    NVRAM

    C

    Boot flash

    D

    CMOS

    E

    Flash


    正确答案: E,D
    解析: 暂无解析

  • 第9题:

    单选题
    You set up scheduled tasks to run and notify you of any failures. 3 days later you see that none of the tasks ran and you received no notifications. What should you do?()
    A

    Set the schedule service to run under the administrator account.

    B

    Set the scheduled tasks to run under the administrator account.

    C

    Enable the messenger service

    D

    Set the schedule service to run under the local system account and set it to start automatically.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()
    A

    msi

    B

    mst

    C

    zap

    D

    zip


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You are developing an application that runs by using the credentials of the end user. Only users who are members of the Administrator group get permission to run the application. You write the following security code to protect sensitive data within the application.bool isAdmin=false;  WindowsBuiltInRole role=WindowsBuiltInRole.Administrator; ......  if(!isAdmin)          throw new Exception("User not permitted");   You need to add a code segment to this security code to ensure that the application throws an exception if a user is not a member of the Administrator group. Which code segment should you use?()
    A

    A

    B

    B

    C

    C

    D

    D


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()
    A

    Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.

    B

    Log on by using your Administrator account and run the ntbackup /D command.

    C

    Log on by using your Administrator account and run the schtasks /delete command.

    D

    Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()

    • A、Configuration register
    • B、NVRAM
    • C、Boot flash
    • D、CMOS
    • E、Flash

    正确答案:A,B

  • 第14题:

    You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

    • A、Repeater
    • B、Wireless router
    • C、Hub
    • D、Wireless network adapter

    正确答案:D

  • 第15题:

    You are the Exchange administrator for the Xxx Corporation’s Exchange 2010 organization.You want to test connectivity for Outlook Anywhere through the Autodiscover service.What should you use to test it?()

    • A、Mail Flow Troubleshooter
    • B、The Test-OutlookConnectivity cmdlet
    • C、Message Tracking
    • D、Performance Troubleshooter

    正确答案:B

  • 第16题:

    You have an Exchange Server 2010 organization.  You plan to delegate Exchange administrative rights to some users in the organization.  You need to recommend a solution that tracks all changes made to the Exchange organization.  What should you include in the solution?()

    • A、administrator audit logging
    • B、circular logging
    • C、diagnostic logging
    • D、Windows Security Auditing

    正确答案:A

  • 第17题:

    You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution. The Xxx contains an Exchange Server 2010 Mailbox server named XXX- EX02.What actions must you take to check when last employees logged on to XXX- EX02?()

    • A、You must configure real time block lists (RBLs).
    • B、You must use the Exchange Server User Monitor (ExMon).
    • C、You must use the Get-MailboxStatistics.
    • D、You must use the administrator audit logging.

    正确答案:C

  • 第18题:

    You are a network administrator for ExamSheet.net's Windows 2000 network.  You use a user account named User1 to log on tot a Windows 2000 Professional computer. The computer is used by different students in a classroom. User1 does not have administrative rights. However, you prefer to use this account for your daily activities. Using the Task Scheduler you schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. You configure the task to run as the administrator account.  After the task was scheduled to have run you open the Task Scheduler and discover a status of "Could not start" for the task. You also discover account logon failure audit events in the computer's Security log.You want the scheduled task to successfully run AddUsers.cmd. You want to accomplish this with the least amount of administrative effort.  What should you do?()

    • A、Schedule the task using theATcommand.
    • B、Reenter the password for the administrator account using the Task Scheduler.
    • C、Log on with an administrative account and reschedule the task.
    • D、Log on by using the local Administrator account. Then schedule the task to run under User1.

    正确答案:B

  • 第19题:

    You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. You utilize the SP:Recompile event class to run SQL Server Profiler. You find that a great amount of recompiles occurring. The possible causes of the large number of recompiles should be identified.  From the flowing four options, which one is the most possible cause of the problem?()

    • A、The sp_executesql batches are not being recovered from the procedure cache.
    • B、A database administrator executed UPDATE STATISTICS statements on all tables, and the most common stored procedures reference all the tables.
    • C、One new stored procedure is created by a database administrator.
    • D、Ad hoc batches are not being recovered from the procedure cache.

    正确答案:B

  • 第20题:

    单选题
    While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior  administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore.  How can you determine which files are already marked for extraction and restore? ()
    A

     You can use the ls subcommand of ufsrestore.

    B

     You can use the add subcommand of ufsrestore.

    C

     You can use the select subcommand of ufsrestore.

    D

     You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name <> "CONTOSO/Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()
    A

    In the Web.config file, enable impersonation.

    B

    In IIS, enable anonymous access.

    C

    In IIS, disable anonymous access.

    D

    In the Web.config file, set the authentication mode to Windows.


    正确答案: B,C
    解析: 暂无解析

  • 第22题:

    单选题
    You are the administrator of a Windows 2000 Professional computer.  You schedule a task to run after 15 minutes. One hour later, the task still has not run. Using the Task Scheduler you check the status of the task. The status says "Could not start". You also notice that your Event Viewer Security Log has a logon failure event. You want to run the scheduled task.  What should you do?()
    A

    Restart the RunAs service.

    B

    Verify the account and password information for the task.

    C

    Set the Task Scheduler service to allow the service to interact with the desktop.

    D

    Set the Task Scheduler service to log on as the local Administrator account.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()
    A

    The SetupUser profile

    B

    The Default User profile

    C

    The Administrator profile

    D

    The System profile

    E

    The All Users profile


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do?()
    A

    Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.

    B

    Log on by using your Administrator account and run the ntbackup /D command.

    C

    Log on by using your Administrator account and run the schtasks /delete command.

    D

    Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.


    正确答案: D
    解析: 暂无解析