单选题In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an applicati

题目
单选题
In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()
A

Citrix workstation

B

personal workstation

C

shared workstation, private desktop

D

shared workstation, shared desktop


相似考题
更多“单选题In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an applicati”相关问题
  • 第1题:

    Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment. However,employees there have been experiencing problems when tracking objects using active RFIDtags. The RFID beacon rate is 10 seconds and you have discovered an issue with the RFID timeout value. Where and how should the RFID value be changed?()

    • A、on the Cisco WCS, to 95 seconds
    • B、on the Cisco WCS, to 45 seconds
    • C、on the wireless controller, to 95 seconds
    • D、on the wireless controller, to 45 seconds

    正确答案:C

  • 第2题:

    You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()

    • A、Require employees to access e-mail only over connections that use SSL
    • B、Place Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the stores
    • C、Use the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mail
    • D、Use the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them

    正确答案:C

  • 第3题:

    A new floor has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, a few desktop PCs have limited corporate access but not Internet access. Most other desktop PCs, all laptops, and IP phones are working correctly. Additional information indicates that the desktop PCs are obtaining IP host addresses from the DHCP server, which is intended for only the IP phones.  Where should troubleshooting about this connectivity issue be focused?()

    • A、DNS
    • B、first-hop redundancy protocol
    • C、DHCP server and options
    • D、VLAN mapping
    • E、client network configuration
    • F、routing protocols

    正确答案:D

  • 第4题:

    Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment. However,employees there have been experiencing problems when tracking objects using active RFIDtags. The RFID tag data is not being collected. On which device would you verify that RFIDs have beenenabled?()

    • A、Cisco WCS
    • B、access point
    • C、location manager
    • D、wireless controller

    正确答案:D

  • 第5题:

    In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()

    • A、Citrix workstation
    • B、personal workstation
    • C、shared workstation, private desktop
    • D、shared workstation, shared desktop

    正确答案:C

  • 第6题:

    A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()

    • A、SSL
    • B、PGP
    • C、File encryption program
    • D、Public key encryption

    正确答案:A

  • 第7题:

    单选题
    Your customer has deployed a Cisco Wireless Location Appliance within its warehouseenvironment. However, employees there have been experiencing problems when tracking objects using activeRFID tags. You use an access point scan to determine if the Location Appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct theproblem?()
    A

    ensure channels are deployed such that they do not overlap

    B

    allow for the automatic containment of rogue access points

    C

    ensure each area is covered by a minimum of three access points

    D

    ensure a minimum RSSI value of -50


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    Your customer has deployed a cisco wireless location appliance within its warehouse  environment. however,employees there have been experiencing problems when tracking objects using active rfid tags. the rfid beacon rate is 10 seconds and you have discovered an issue with the rfid timeout value. Where and how should the rfid value be changed?()
    A

    on the cisco wcs, to 95 seconds

    B

    on the wireless controller, to 45 seconds

    C

    on the wireless controller, to 95 seconds

    D

    on the cisco wcs, to 45 seconds


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment. However,employees there have been experiencing problems when tracking objects using active RFIDtags. The RFID tag data is not being collected. On which device would you verify that RFIDs have beenenabled?()
    A

    Cisco WCS

    B

    access point

    C

    location manager

    D

    wireless controller


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    A new floor has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, a few desktop PCs have limited corporate access but not Internet access. Most other desktop PCs, all laptops, and IP phones are working correctly. Additional information indicates that the desktop PCs are obtaining IP host addresses from the DHCP server, which is intended for only the IP phones.  Where should troubleshooting about this connectivity issue be focused?()
    A

    DNS

    B

    first-hop redundancy protocol

    C

    DHCP server and options

    D

    VLAN mapping

    E

    client network configuration

    F

    routing protocols


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Your customer has deployed a Cisco Wireless Location Appliance within its warehouseenvironment. However, employees there have been experiencing problems when tracking objects using activeRFID tags.The RFID tag data is not being collected. On which device would you verify that RFIDs have been enabled?()
    A

    access point

    B

    location manager

    C

    wireless controller

    D

    Cisco WCS


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()
    A

    Citrix workstation

    B

    personal workstation

    C

    shared workstation, private desktop

    D

    shared workstation, shared desktop


    正确答案: C
    解析: 暂无解析

  • 第13题:

    When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?()

    • A、PCs will attempt to use the last address assigned to them
    • B、PCs will pull from a static address pool
    • C、PCs will use APIPA
    • D、PCs will prompt the user for an address

    正确答案:C

  • 第14题:

    You are the network administrator for Company.  Five of Company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity. You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building.  You need to configure the portable computers to always allow the employees to choose which network environment to use when they start their portable computers.   What should you do?()

    • A、Configure three different hardware profiles on each portable computer.
    • B、Configure a single hardware profile and rename it to Universal Profile.
    • C、Configure the wireless PC Card network adapters to use Automatic Private IP Addressing      (APIPA) when they cannot detect a DHCP server.
    • D、Instruct each employee to unplug the wireless PC Card network adapter whenever the      portable computer is attached to a network-enabled docking station.
    • E、Configure the hardware profiles selection to wait until a hardware profile is selected.
    • F、Configure the hardware profiles selection to select the first profile listed and set the wait time to zero seconds.
    • G、 Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.

    正确答案:A,E

  • 第15题:

    Your customer has deployed a cisco wireless location appliance within its warehouse  environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. you use an access point scan to determine if the location appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct the problem?()

    • A、ensure channels are deployed such that they do not overlap
    • B、allow for the automatic containment of rogue access points
    • C、ensure each area is covered by a minimum of three access points
    • D、ensure a minimum rssi value of -50

    正确答案:C

  • 第16题:

    Yours truly,customer has deployed a cisco wireless location appliance within its warehouse  environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. the rfid tag data is not being collected. On which device would you verify  that rfids have been enabled?()

    • A、access point
    • B、location manager
    • C、wireless controller
    • D、cisco wcs

    正确答案:C

  • 第17题:

    An architectural design company with 45 employees has their office located within 5 kilometers oftheir disaster recovery center. They have an IBM System Storage N6040 installed at bothlocations. In this customer environment what protocol would be used for disaster recovery?()

    • A、NFS
    • B、CIFS
    • C、iFCP
    • D、iSCSI

    正确答案:D

  • 第18题:

    Five of your company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network-enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity.   You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building.   You need to configure the portable computers for optimum performance in all of the working environments. What should you do? ()

    • A、Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.
    • B、Configure three different hardware profiles on each portable computer.
    • C、Configure the wireless PC Card network adapters to use Automatic Private IP Addressing (APIPA) when they cannot detect a DHCP server.
    • D、Instruct each employee to unplug the wireless PC Card network adapter whenever the portable computer is attached to a network-enabled.

    正确答案:B

  • 第19题:

    单选题
    An architectural design company with 45 employees has their office located within 5 kilometers oftheir disaster recovery center. They have an IBM System Storage N6040 installed at bothlocations. In this customer environment what protocol would be used for disaster recovery?()
    A

    NFS

    B

    CIFS

    C

    iFCP

    D

    iSCSI


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment.However, employees there have been experiencing problems when tracking objects using active RFIDtags. You use an access point scan to determine if the Location Appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct the problem?()
    A

    allow for the automatic containment of rogue access points

    B

    ensure each area is covered by a minimum of three access points

    C

    ensure channels are deployed such that they do not overlap

    D

    ensure a minimum RSSI value of -50


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Yours truly,customer has deployed a cisco wireless location appliance within its warehouse  environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. the rfid tag data is not being collected. On which device would you verify  that rfids have been enabled?()
    A

    access point

    B

    location manager

    C

    wireless controller

    D

    cisco wcs


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()
    A

    SSL

    B

    PGP

    C

    File encryption program

    D

    Public key encryption


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Five of your company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network-enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity.   You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building.   You need to configure the portable computers for optimum performance in all of the working environments. What should you do? ()
    A

    Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.

    B

    Configure three different hardware profiles on each portable computer.

    C

    Configure the wireless PC Card network adapters to use Automatic Private IP Addressing (APIPA) when they cannot detect a DHCP server.

    D

    Instruct each employee to unplug the wireless PC Card network adapter whenever the portable computer is attached to a network-enabled.


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()
    A

    Require employees to access e-mail only over connections that use SSL

    B

    Place Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the stores

    C

    Use the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mail

    D

    Use the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them


    正确答案: C
    解析: 暂无解析