You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()
第1题:
You have just reinstalled a VIP 6-80 in a Cisco 7500 Series router. What must you do to bring up the port adapter interfaces?()
第2题:
You are maintaining the SALES database for eSoft Corporation. You have not configured ASMM on the database. You want to know what size of the SGA will provide the best performance. Which advisor would you use to determine the suitable size of the SGA?()
第3题:
You work as a database administrator for Supportcenter.cn. In your production database, the size of Database Buffer Cache needs to be increased immediately for the current as well as future instances of the database. The Oracle instance has been configured to accommodate any changes in the size of the memory structures. At this is production database, you want to accomplish this task with no impact on the user’s connections. Which activity must you have completed before accomplishing this task?()
第4题:
You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()
第5题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The Web Server(IIS) server role and the FTP Publishing Service role service are installed on the server. You have a newFTP site added to the server. You have to make sure that the new FTP site is available. In order to makesure of this,what action should you perform?()
第6题:
set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-Spam
set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-Spam
set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policy
set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam
第7题:
parallel image copy backup
backup with MAXPIECESIZE configured for the channel
parallel backup with MAXPIECESIZE configured for the channel
intrafile parallel backup
第8题:
SQL Tuning Advisor
Undo Advisor
ADDM
Memory Advisor
第9题:
show security utm anti-virus status
show security anti-virus database status
show security utm anti-virus database
show security utm anti-virus update
第10题:
multiplexed control files
RMAN obsolete backups
multiplexed online redo log files
archived redo logs that have not been copied to tape
第11题:
Best practice analyzer
Remote connectivity analyzer
Test-MAPIconnectivity cmdlet
Test-outlookWeb services cmdlet
第12题:
duplex mismatch
a routing loop
trunking mode mismatch
improperly configured root bridge
improperly configured static VLAN
第13题:
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()
第14题:
You have configured the flash recovery area to store online redo log files, control files, archived redo logs and RMAN backups. Which of the following files can you successfully delete from the flash recovery area if you want to reclaim the space within it?()
第15题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single site named KingSite1.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured the mailbox server as members of a database availability group (DAG) with a public folder database. During the course of the business week you receive instruction from Company.com to create a new Active Directory site and install Exchange server in the site whilst ensuring the public folders are stored on servers in both sites. What should you do?()
第16题:
You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company. You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers. You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails. What should you recommend?()
第17题:
The interface is not plumbed.
The interface is not configured.
The interface does not have valid routes configured.
The interface is not marked as
第18题:
In order to make sure of this, the iisreset command should be run on the server.
In order to make sure of this, a host header file should be configured in the default Web site properties.
In order to make sure of this, an alternate IP address should be configured in the default Web siteproperties.
In order to make sure of this, an alternate TCP port should be configured in the FTP site properties.
In order to make sure of this, an alternate IP address should be configured in the FTP site properties.
第19题:
parallel image copy backup
backup with MAXPIECESIZE configured for the channel
parallel backup with MAXPIECESIZE configured for the channe
intrafile parallel backup
第20题:
whether the password is set in the listener or a file or not
the number of client connections the service handler has refused
the information will be displayed whether the instance can accept connections or not
the protocol addresses on which the listener is configured to listen
第21题:
802.1x
WPA-Personal
WPA2-Enterprise
WPA2-Personal
第22题:
AES
PSK
SSID
TKIP
WEP
第23题:
Start a data collector
Start an event viewer subscription
Add a task to the application event log
Modify the properties of the mailbox database
第24题:
Server configured with the Client Access server role.
Server configured with the Hub Transport role.
Server configured with the Mailbox role.
Server configured with the Unified Messaging server role.