An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()
第1题:
A.SSH
B.WEP
C.VPN
D.WPA
第2题:
What’s the steps of implementing MQC?
第3题:
ABC Corp. is implementing 11i Oracle Applications. The company has two local administrators in separate locations. They need to ensure that only a relevant set of users is visible to each of these local administrators.Which action will meet the requirement?()
A.create a separate role for each local administrator
B.specify user administration privileges in Oracle User Management
C.use Data Security to provide relevant access to each local administrator
D.use Function Security to provide relevant access to each local administrator
第4题:
An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?()
第5题:
Which two statements are true about the implementation of QoS? ()
第6题:
An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()
第7题:
You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010. You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010. You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts .Provide cross-organizational access to free/busy information What should you recommend?()
第8题:
A. Caching engines
B. QoS
C. Traffic shaping
D. Load balancing
第9题:
It is a violation of the "separation of duties" principle when which of the fol-lowing individuals access the software on systems implementing security? 下列哪项个人访问对系统安全软件,是违反了“职责分离原则?()
第10题:
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()