Network access and availability
Application access and availability
Escalation and conflict resolution
Headcounts and budgets
第1题:
Which service is provided by Cisco SMARTnet?()
第2题:
How is network layer addressing accomplished in the OSI protocol suite?()
第3题:
following code segment.[ServiceContract]public interface ICustomerService{...}public class CustomerService : ICustomerService{...}The service is self-hosted in a console application. Older client applications access the service at http://contoso.com:8080/CustomerService/V1.Newer client applications access the service at http://contoso.com:8080/CustomerService/V2.You need to ensure that any client application can access the service at either address.Which code segment should you use?()
A.
B.
C.
D.
第4题:
You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()
第5题:
Service Level Agreements (SLA) typically do not address()
第6题:
Which of the following is the MOST important consideration when purchasing a new server for a mission critical application?()
第7题:
Comprehensive Service Level Agreements typically do not address:()
第8题:
A. Internet Protocol address
B. Media Access Control address
C. Packet Layer Proto col address
D. Network Service Access Point address
E. Authority and Format Identifier address
第9题:
In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()
第10题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TK1 runs IIS. You install a Web-enabled application on TK1. The application includes a security feature that detects unauthorized attemptsto access the server. Whenever an authorized attempt is detected, the application automatically modifies the IIS configuration file to restrict the unauthorized user's access. To test the security feature, you try to gain unauthorized access to TK1. Twenty seconds after your first attempt, you try again. However, TK1 does not restrict your access on the second attempt. You wait five minutes, and then you examine the IIS configuration file. You verify that it was correctly modified by the application to restrict your access. You need to configure IIS to ensure that changes in the IIS configuration file will result in immediate changes in the behaviour of IIS. What should you do?()