A banking user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA. No other users are experiencing the same issue.
Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.
Which of the following is the most likely cause of this problem()
A client has requested an IBM System x solution. Pricing is the most sensitive decision factor. They are looking for 12 TB of storage, with a projected growth of 10-15%. As this is the only server accessing this amount of data, the customer does not require a SAN.
What should the System x Sales Specialist recommend?()
A UNIX customer has a Symmetrix DMX that has crashed three times in the past six months, causing data loss. The customer is shopping for an enterprise storage solution to provide point-in- time copy functionality without a fixed relationship to its primaries.
Which IBM solution best meets this customer’s requirements()
You need to recommend a technology to deploy and manage updates of Business_App for the public relations users.
The solution must meet the company’s corporate requirements.
Which technology should you recommend?()
A customer currently buys HP ProLiant servers and EMC storage. The customer has encountered various problems getting certain servers to work with their storage.
Which of the following arguments can the Sales Specialist present to best position IBM? ()
A customer is interested in reducing energy consumption and infrastructure consolidation for space. The customer needs a maximum of 14 servers in 7U rack.
Which IBM BladeCenter Chassis should be recommended? ()
Virtualization is a technology that can help reduce power and cooling requirements. IT organizations can consolidate multiple OS and application stacks on each server with virtualization software.
What IBM solution simplifies virtualization for IBM hardware? ()
You are designing a top-level OU structure to meet the business and technical requirements.
Which top-evel OU or OUs should you use? ()
A customer has purchased three IBM System Storage DS8700 systems and would like to have their administrators trained.
Which training alternative provides the necessary training with the least financial impact()
You are the administrator of a Windows 2000 network. You use a user account named Hans1 to log on to a Windows 2000 Professional computer named Company1 that is used by different students in a classroom. Hans1 is a user with administrative rights. Another administrator has created a command file named AddUsers.cmd that automatically adds student user accounts. You have scheduled a task on Company1 to run AddUsers.cmd later in the evening. The next day you find that the job did not run. There are no errors reported in the Event Log. You want to schedule a task to successfully run AddUsers.cmd.
What should you do? ()
You are a network administrator for ExamSheet.net's Windows 2000 network.
You use a user account named User1 to log on tot a Windows 2000 Professional computer. The computer is used by different students in a classroom. User1 does not have administrative rights. However, you prefer to use this account for your daily activities. Using the Task Scheduler you schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. You configure the task to run as the administrator account.
After the task was scheduled to have run you open the Task Scheduler and discover a status of "Could not start" for the task. You also discover account logon failure audit events in the computer's Security log.You want the scheduled task to successfully run AddUsers.cmd. You want to accomplish this with the least amount of administrative effort.
What should you do?()
You are employed as the Exchange administrator at Company.com.You are in the process of
installing a new Exchange Server 2010 Organization.After the installation you send a text message to an external client and receive the subsequent non-delivery report (NDR): "Delivery has failed to these recipients or groups: [email protected] ([email protected]).The recipient’s e-mail system isn’t accepting messages now.Please try resending this message later or contact the recipient directly." You attempt to e-mail the user from an external e-mail system with great success.To ensure productivity you need to make sure e-mails can be sent to external clients from within the organization.
What should you do?()
You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two localuser accounts named User1 and User2. On Computer1, you run Scanstate.exe /all \\server1\data \computer1. On Computer2, you run Loadstate.exe /lac:Pa$$w0rd \\server1\data\computer1. You need toensure that User1 and User2 can log on to Computer2.
What should you do on Computer2?()
You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer.
What should you do? ()
Refer to the exhibit. Users from the Engineering VLAN complain that every time Business VLAN users have a network connectivity issue,the Engineering VLAN users usually have problems experiencing slow response or network connectivity problems. After troubleshooting, anunauthorized switch 2 was found.This unauthorized switch has been a regular problem, assuming the root bridge function under thespanning-tree domain and causing the Engineering VLAN to be unstable. Which three of these actionscould be suggested to fix the problem?()
Refer to the exhibit. Users from the Engineering VLAN complain that every time Business VLAN users have a network connectivity issue, the Engineering VLAN users usually have problems experiencing slow response or network connectivity problems. After troubleshooting, an unauthorized switch 2 was found. This unauthorized switch has been a regular problem, assuming the root bridge function under the spanning-tree domain and causing the Engineering VLAN to be unstable. Which three of these actions could be suggested to fix the problem?()
A user is unable to determine the default system text editor.
How can the local administrator assist the user by identifying the default text editor for the system?()
All client computers in your network run Windows 7 Enterprise.
You need to prevent all standard user accounts from running programs that are signed by a specific publisher.
What should you do?()
You have a server named Server1. Server1 runs Windows Server 2012 R2. A user named Admin1
is a member of the local Administrators group. You need to ensure that Admin1 receives a User Account Control (UAC) prompt when attempting to open Windows PowerShell as an administrator.
Which setting should you modify from the Local Group Policy Editor? To answer, select the appropriate setting in the answer area.
Youre performing tablespace point-in-time recovery on a tablespace called USERS. If an object in that tablespace has a foreign key constraint owned by another object in the INDEX_TBS
which statement is true?()
At the request of a user, you issue the following command to restore a dropped table: flashback table "BIN$F2JFfMq8Q5unbC0ceE9eJg==$0" to before drop; Later, the user notifies you that the data in the table seems to be very old and out of date.
What might be the problem?()
A customer would like to share the processor resources automatically between logical partitions.
Which of the following would accomplish this requirement without user interaction? ()
You are planning a Windows 7 deployment infrastructure for a new company.
You have the following requirements:
Three domains
10,000 client computers No user interaction
You need to recommend a deployment infrastructure.
What should you recommend?()
A customer wants to purchase an IBM System Storage DS8700 to support a high-performance database environment.
Which technical solution gives the customer the best relationship between I/O performance at the machine’s backend vs. capacity installed in the machine()
A customer wants to realize a server-based computing scenario for trading floor applications with IBM BladeCenter. The customer expects the solution to offer high security and manageability, while delivering hardware-based graphics compression and full USB capability.
Is this possible?()
Company.com has a non-IBM disk storage unit connected by two Fibre channel connections. The Nodes have multiple connections to the storage device that allow load balancing. A failure with one Fibre adapter or connection will not be noticed by the application, but it needs to be addressed.
How can HACMP help make this environment more robust?()
Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA.
What should you do?()
You executed the following command to drop a user:
DROP USER scott CASCADE;
Which two statements regarding the above command are correct?()
View the Exhibit and examine the privileges granted to the SL_REP user.
The EMP table is owned by the SCOTT user. The SL_REP user executes the following command: SQL> GRANT SELECT ON scott.emp TO hr;
Which statement describes the outcome of the command()
The session of user SCOTT receives the following error after executing an UPDATE command onthe EMP table:
ERROR at line 1:
ORA-00060: deadlock detected while waiting for resource
On investigation, you find that a session opened by user JIM has a transaction that caused the deadlock.
two statements are true regarding the session of SCOTT in this scenario()
A banking user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA. No other users are experiencing the same issue.
Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.
Which of the following is the most likely cause of this problem()
You have a computer that runs Windows XP Professional. Two users named User1 and User2 share the computer. User1 and User2 encrypt files on the computer. User1 encrypts a file named file1. doc. You need ensure that both User1 and User2 can view the contents of file1. doc.
What should you instruct User1 to do?()
A customer with a well-known brand wants to make sure they have a Green decision in their next IT infrastructure investment.
How can IBM Cool Blue help this customer? ()
免费的网站请分享给朋友吧