CompTIA认证考试

An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing

题目

An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()

  • A、Caching engines
  • B、QoS
  • C、Traffic shaping
  • D、Load balancing
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

A.SSH

B.WEP

C.VPN

D.WPA


参考答案:D

第2题:

What’s the steps of implementing MQC?


正确答案: 1、Define a traffic class by using the class-map command.
2、Create a traffic policy by using the policy-map command.
3、Attach the traffic policy (policy map) to the interface by using the service-policy command.

第3题:

ABC Corp. is implementing 11i Oracle Applications. The company has two local administrators in separate locations. They need to ensure that only a relevant set of users is visible to each of these local administrators.Which action will meet the requirement?()

A.create a separate role for each local administrator

B.specify user administration privileges in Oracle User Management

C.use Data Security to provide relevant access to each local administrator

D.use Function Security to provide relevant access to each local administrator


参考答案:B

第4题:

An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again.  Which of the following is the MOST likely reason for this?()

  • A、 The administrator improperly configured the virtual memory settings on the server.
  • B、 The administrator is using incorrect patch switches for the install.
  • C、 The administrator is trying to install security patches for software that is not installed.
  • D、 The administrator is trying to install patches that require hard drive encryption on the server.

正确答案:C

第5题:

Which two statements are true about the implementation of QoS? ()

  • A、 Implementing DiffServ involves the configuration of RSVP.
  • B、 Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.
  • C、 Implementing IntServ involves the utilization of RSVP.
  • D、 Traffic should be classified and marked by the core network devices.
  • E、 Traffic should be classified and marked as close to the edge of the network as possible.

正确答案:C,E

第6题:

An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()

  • A、 Awareness of company policy requirements
  • B、 Differentiating between archiving and backup processes
  • C、 Awareness of potential legal requirements
  • D、 Ensuring that the backups for the retention program cover key business areas

正确答案:C

第7题:

You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information  What should you recommend?()

  • A、Creating cross-forest trusts
  • B、Implementing Federated Sharing
  • C、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007
  • D、Running the Microsoft Exchange Inter-Organization Replication tool

正确答案:B

第8题:

An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()

A. Caching engines

B. QoS

C. Traffic shaping

D. Load balancing


参考答案:D

第9题:

It is a violation of the "separation of duties" principle when which of the fol-lowing individuals access the software on systems implementing security? 下列哪项个人访问对系统安全软件,是违反了“职责分离原则?()

  • A、systems auditor 系统审计员
  • B、systems programmer 系统程序员
  • C、security analyst 安全分析员
  • D、security administrator 安全管理员

正确答案:B

第10题:

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

  • A、SSH
  • B、WEP
  • C、VPN
  • D、WPA

正确答案:D

更多相关问题