itgle.com

●A management domain typically contains a large amount of management information. Each individual item of( 71)information is an instance of a managed object type. The definition of a related set of managed (72) types is contained in a Management Informati

题目

●A management domain typically contains a large amount of management information. Each individual item of( 71)information is an instance of a managed object type. The definition of a related set of managed (72) types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB( 73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domain

(71) A.rotation

B.switch

C.management

D.transmission

(72) A.path

B.object

C.route

D.packet

(73) A.connection

B.window

C.module

D.destination

(74) A.packets

B.searches

C.states

D.instances

(75) A.device

B.state

C.type

D.packet


相似考题
参考答案和解析
正确答案:C,B,C,D,C
更多“●A management domain typically contains a large amount of management information. Each ind ”相关问题
  • 第1题:

    A management domain typically contains a large amount of management information. Each individual item of(71) information is an instance of a managed object type. The definition of a related set of managed (72)types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB (73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object () within a management domain

    A.device
    B.state
    C.type
    D.packet

    答案:C
    解析:
    网络管理体系工作机制。

  • 第2题:

    Which three elements must be used when you configure a router interface for vlan trunking?()

    • A、one IP network or subnetwork for each subinterface
    • B、subinterface numbering that matches vlan tages
    • C、subinterface encapsulation identifiers that match vlan tags
    • D、a management domain for each subinterface
    • E、one physical interface for each subinterface
    • F、one subinterface per vlan

    正确答案:A,C,F

  • 第3题:

    To perform management activities, each domain requires its own()

    • A、 Administration Server
    • B、 Configuration Wizard
    • C、 Ant Task
    • D、 Node Server

    正确答案:A

  • 第4题:

    Your network contains an Active Directory domain that contains five domain controllers. You have  a management computer that runs Windows 7.   From the Windows 7 computer, you need to view all account logon failures that occur in the  domain.     The information must be consolidated on one list.   Which command should you run on each domain controller()

    • A、Wecutil.exe qc
    • B、Wevtutil.exe gli
    • C、Winrm.exe quickconfig
    • D、Winrshost.exe

    正确答案:C

  • 第5题:

    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 mailbox server named -ex20 that contains a mailbox database.a Company.com manager wants the see the last logon time of the employees at Company.com. What should you do?()

    • A、The best option is to run the Get-MailboxDatabase from the Exchange Management Shell.
    • B、The best option is to run the Get-MailboxStatistics from the Exchange Management Shell.
    • C、The best option is to create and export a filter from the Exchange Management Console.
    • D、The best option is to run the Remote Connectivity Analyzer from the Exchange Management Console.

    正确答案:B

  • 第6题:

    Your network consists of a single Active Directory forest that contains a root domain and two child domains. All servers run Windows Server 2008 R2.  A corporate policy has the following requirements:   èAll local guest accounts must be renamed and disabled. èAll local administrator accounts must be renamed.   You need to recommend a solution that meets the requirements of the corporate policy. What should you recommend?()

    • A、Implement a Group Policy object(GPO) for each domain.
    • B、Implement a Group Policy object(GPO) for the root domain.
    • C、Deploy Network Policy and Access Services(NPAS)on all domain controllers in each domain. 
    • D、Deploy Active Directory Rights Management Services(AD RMS)on the root domain controllers.

    正确答案:A

  • 第7题:

    单选题
    Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1. Which tool should you use?()
    A

    File Server Resource Manager (FSRM)

    B

    New-StoragePool

    C

    Diskpart

    D

    Share and Storage Management


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    You have an Exchange Server 2010 organization that contains five Mailbox servers and five Client Access servers.All users in the organization connect to their mailboxes by using Outlook Anywhere.You create a Client Access server array.You need to ensure that all users can connect to the Client Access server array.What should you do?()
    A

    From the Exchange Management Shell, run the Set-Mailbox cmdlet

    B

    From the Exchange Management Shell, run the Set-MailboxDatabase cmdlet

    C

    From the Exchange Management Console (EMC), modify the properties of each mailbox database

    D

    From the Exchange Management Console (EMC), modify the properties of each Client Access server object


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Your network consists of a single Active Directory domain. The domain contains a server that runs Windows Server 2008. The server has the Windows SharePoint Services (WSS) server role installed.You need to allow users to create distribution lists from a SharePoint site. What should you do on the WSS server?()
    A

    Set the outgoing mail character set to 1200(Unicode).

    B

    Enable the SharePoint Directory Management Service.

    C

    Configure the site to accept messages from authenticated users only.

    D

    Configure the site to use the default Rights Management server in Active Directory Domain Services.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    多选题
    You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()
    A

    Delegate the password management controls to the help desk staff.

    B

    Delegate the password management controls to the Domain Users group.

    C

    Configure the Default Domain Policy to enforce password expiration settings.

    D

    Configure the Default Domain Controller Policy to enforce password expiration settings.


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    多选题
    What are two important guidelines to follow when implementing VTP?()
    A

    CDPmust be enabled on all switches in theVTP management domain.

    B

    All switches in the VTPdomain must run the same version of VTP.

    C

    When using secure mode VTP, only configure management domain passwords onVTP servers.

    D

    EnablingVTP pruning on a server willenable the feature for the entire management domain.

    E

    Use of theVTPmulti-domain feature should be restricted to migration and temporary implementation.


    正确答案: D,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which three elements must be used when you configure a router interface for vlan trunking?()
    A

    one IP network or subnetwork for each subinterface

    B

    subinterface numbering that matches vlan tages

    C

    subinterface encapsulation identifiers that match vlan tags

    D

    a management domain for each subinterface

    E

    one physical interface for each subinterface

    F

    one subinterface per vlan


    正确答案: D,E
    解析: 暂无解析

  • 第13题:

    What action should you execute if you wanted to enable VTP pruning on your entire management  domain?()

    • A、 Enable VTP pruning on any client switch in the management domain.
    • B、 Enable VTP pruning on any switch in the management domain.
    • C、 Enable VTP pruning on every switch in the management domain.
    • D、 Enable VTP pruning on a VTP server in the management domain.
    • E、 Disable VTP pruning on a VTP server in the management domain.

    正确答案:D

  • 第14题:

    RBTelco is a large multinational company that outsources health care benefit management to RBBenefits. RBTelco employees access RBBenefits resources through an authenticate-able account at each company. RBBenefit and RBTelco will use SAML V1.0. Which IBM Tivoli Access Manager for e-business (ITAMeb) and IBM Tivoli Federated Identity Manager (ITFIM) components are required to be installed at RBTelco?()

    • A、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console 
    • B、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit 
    • C、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit 
    • D、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, ITFIM Demonstration Scenarios, WebSEAL Application Developer Kit

    正确答案:A

  • 第15题:

    You have an Exchange Server 2010 that contains five mailbox servers.Mailbox server Server1 host a mailbox database named DB1.DB1 contains 300 user mailboxes.You create a new public folder database named Public2 on Server1.You need to ensure that all users that have mailboxes in DB1 store new public folders in Public2. What should you do?()

    • A、From Exchange Management Console, modify the propierties of DB1.
    • B、From Exchange Management Console, modify the propierties of Public.
    • C、From Exchange Management Console, modify the propierties of Server1.
    • D、From Exchange Management Shell, modify the propierties of each mailbox.

    正确答案:A

  • 第16题:

    You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization that contains a number of Hub Transport servers. During the course of day you receive an instruction form management to recommend a messaging hygiene solution. Your recommendation should ensure that servers known to send spam is blocked andthat the administrative efforts are reduced. What should you do?()

    • A、You should recommend to management recipient filtering.
    • B、You should recommend to management an IP Block list.
    • C、You should recommend to management IP Block list providers.
    • D、You should recommend to management sender filtering.

    正确答案:B

  • 第17题:

    Your network contains an Active Directory domain named contoso.com. The network contains  client computers that run either Windows Vista or Windows 7. Active Directory Rights  Management Services (AD RMS) is deployed on the network.     You create a new AD RMS template that is distributed by using the AD RMS pipeline. The  template is updated every month.   You need to ensure that all the computers can use the most up-to-date version of the AD RMS  template. You want to achieve this goal by using the minimum amount of administrative effort.     What should you do()

    • A、Upgrade all of the Windows Vista computers to Windows 7.
    • B、Upgrade all of the Windows Vista computers to Windows Vista Service Pack 2 (SP2).
    • C、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all users by usin
    • D、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all computers by

    正确答案:B

  • 第18题:

    Your company has a main office and a branch office. All branch office administrators are members of a custom management role group.The role group is configured to allow members to manage recipients.The branch office administrators are also members of The Domain Admins security group. The organization contains one Exchange Server 2010 server. You discover that the branch office administrators can manage recipients in both offices. You need to ensure that the branch office administrators can manage recipients in their assigned branch office only.What should you do?()

    • A、Create a new management role entry for the role group.
    • B、Create a management role assignment policy and associate the policy to the role group.
    • C、Create a management scope and associate the scope to the role group.Set a recipient filter for the management scope.
    • D、Remove the branch office administrators from the Domain Admins group.Add the branch office recipients to the role group.

    正确答案:C

  • 第19题:

    单选题
    An Organization has Exchange 2010 with 50 Hub Transport Servers.Minimize amount of disk space used on Hub Transport Servers to store shadow copies of messages.What should you do?()
    A

    From the Exchange Management Shell, run set-transportconfig cmdlet

    B

    From the Exchange Management Shell, run set-transportservers cmdlet

    C

    From the Exchange Management Console (EMC), modify transport settings

    D

    From the Exchange Management Console (EMC), modify properties of Hub Transport Servers


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    What action should you execute if you wanted to enable VTP pruning on your entire management  domain?()
    A

     Enable VTP pruning on any client switch in the management domain.

    B

     Enable VTP pruning on any switch in the management domain.

    C

     Enable VTP pruning on every switch in the management domain.

    D

     Enable VTP pruning on a VTP server in the management domain.

    E

     Disable VTP pruning on a VTP server in the management domain.


    正确答案: E
    解析: 暂无解析

  • 第21题:

    单选题
    To perform management activities, each domain requires its own()
    A

     Administration Server

    B

     Configuration Wizard

    C

     Ant Task

    D

     Node Server


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()
    A

    You should recommend that management make use of DAG network encryption.

    B

    You should recommend that management make use of Encrypted File System (EFS)

    C

    You should recommend that management make use of Windows BitLocker Drive Encryption.

    D

    You should recommend that management make use of Rights Management Service RMS.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 mailbox server named -ex20 that contains a mailbox database.a Company.com manager wants the see the last logon time of the employees at Company.com. What should you do?()
    A

    The best option is to run the Get-MailboxDatabase from the Exchange Management Shell.

    B

    The best option is to run the Get-MailboxStatistics from the Exchange Management Shell.

    C

    The best option is to create and export a filter from the Exchange Management Console.

    D

    The best option is to run the Remote Connectivity Analyzer from the Exchange Management Console.


    正确答案: B
    解析: 暂无解析