单选题Users at the Charleville Company began experiencing high network delays when Internetconnectivity was enabled for all users. After investigating the traffic flow, you determine that peer-to-peer traffic from a music download site is consuming a large a

题目
单选题
Users at the Charleville Company began experiencing high network delays when Internetconnectivity was enabled for all users. After investigating the traffic flow, you determine that peer-to-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoSmechanism can you implement to improve the network response time?()
A

 Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.

B

 Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions. 

C

 Use class-based policing to limit the peer-to-peer traffic rate.

D

 Use class-based shaping to delay any excessive peer-to-peer traffic.


相似考题
更多“Users at the Charleville Company began experiencing high net”相关问题
  • 第1题:

    He was tempted by the high salary offered by the company.

    A: taught
    B: kept
    C: attracted
    D: changed

    答案:C
    解析:
    题干意为“这家公司提供的高额薪水吸引了他。”句中划线词原型是动词,意为“吸引,诱惑”。C项attracted意为“吸引”,例句:They cried out to attract our attention.他们大声喊叫以引起我们的注意。A项意为“教导,教育”,B项意为“保持”,D项意为“改变”,故选C项。

  • 第2题:

    A company has a business application that provides its users with many different reports: receivables reports, payables reports, revenue projects, and so on. The company has just purchased somenew, state-of-the-art, wireless printers, and a programmer has been assigned the task of enhancing all ofthe reports to use not only the company’s old printers, but the new wireless printers as well. When the programmer starts looking into the application, the programmer discovers that because of the design of theapplication, it is necessary to make changes to each report to support the new printers. Which two designconcepts most likely explain this situation? ()

    • A、Inheritance
    • B、Low cohesion
    • C、Tight coupling
    • D、High cohesion
    • E、Loose coupling
    • F、Object immutability

    正确答案:B,C

  • 第3题:

    A company may use the Windows XP Professional MUI Pack because the company:()

    • A、has offices where users who speak different languages share computers.
    • B、wants to maintain multiple operating systems.
    • C、has users who work remotely at home offices.
    • D、wants to deploy and maintain a single operating system standard.

    正确答案:A,D

  • 第4题:

    You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()

    • A、[Authorize(Users = "")]
    • B、[Authorize(Roles = "")]
    • C、[Authorize(Users = "*")]
    • D、[Authorize(Roles = "*")]

    正确答案:A,B

  • 第5题:

    Your company has two main offices named Main1 and Main2.An Active Directory site exists for each office. Users connect locally to servers in both offices.  The offices connect to each other by using a high-speed WAN link. You plan to deploy Exchange Server 2010.  You need to plan the deployment of Mailbox servers to meet the following requirements: .Ensure that users can access their mailbox from a server in their site, if a single Mailbox server fails  .Ensure that users can access their mailboxes remotely if a site fails  .Minimize the number of servers How many Mailbox servers should you include in the plan?()

    • A、2
    • B、3
    • C、4
    • D、6

    正确答案:C

  • 第6题:

    You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest containing a single domain named Company.com.the Company.com organization makes use of microsoft exchange server 2010 as their messaging  solution.Company.com has recently configured an exchange server named ex01 with a single mailbox database.Company.com is aware that the network users user microsoft office outlook and outlook web app.During your routine maintenance you discover that the network users are unable to restore e-mail messages from the Recover Deleted Items folder. During the course of the business week you receive instruction from Company.com to ensure that the network users are able to restore e-mail messages from the Recover Deleted Items folder. What should you do?()

    • A、You should consider having a management role created and assigned to all users from the Exchange Management Shell.
    • B、You should consider having a retention policy created and assigned to all users from the Exchange Management Shell.
    • C、You should consider having the properties of the mailbox database modified from the Exchange Management Console (EMC).
    • D、You should consider having the properties of the Mailbox server object modified from the Exchange Management Console (EMC).

    正确答案:C

  • 第7题:

    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. The Web Server (IIS) server role should be installed on a new server, and Windows Server 2008 is run by the IIS server role. A Microsoft .NET Framework 1.0 application is installedon a Web site on the Web server. According to the company requirements, all applications must run withthe least amount of permission utilized. Since you are the technical support, you should configure the Website application so as to give it enough permission to perform with no other content created and with nooperating system components accessed. Which action should be performed to achieve the goal?()

    • A、To achieve the goal, the .NET Framework trust level should be set to Medium for the Web site.
    • B、To achieve the goal, the .NET Framework trust level should be set to Full for the Web site.
    • C、To achieve the goal, the .NET Framework trust level should be set to Low for the Web site.
    • D、To achieve the goal, the .NET Framework trust level should be set to High for the Web site.

    正确答案:B

  • 第8题:

    单选题
    A system is experiencing performance problems.  After checking the CPU usage, the problem identified is that the system is "CPU Bound".  Which of the following outcomes will determine if there is a possible CPU constraint?()
    A

     Low paging 

    B

     High paging 

    C

     Workload manager is not turned on 

    D

     A high run queue length 


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    You are a DBA of your company. You created a database named SALES on an Oracle 10g instance. You have defined an index named INDEX1 on the database table named INVENTORY. Users are complaining that queries accessing the INVENTORY table are running slow. Upon investigation you determine that the tablespace where the index is located is experiencing high I/O and you decide to relocate the index to another tablespace. Which of these will be the best way to accomplish this objective?()
    A

     Rebuild the index.

    B

     Coalesce the index.

    C

     Drop and re-create the index in the new tablespace.

    D

     Relocate the index using the ALTER INDEX...MOVE statement.


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    You work as an ASP.NET Web Application Developer for SomeCompany.  The company uses Visual Studio .NET 2010 as its application development platform.You create an ASP.NET Web site using .NET Framework 4.0. Only registered users of the company will be able to use the application. The application holds a page named UserAccount.aspx that enables new users to register them to the registered users„ list of the company. The UserAccount page hold numerous TextBox controls that accept users personal details, such as user name, password, home address, zipcode, phone number, etc.  One of the TextBox controls on the page is named ZipCode in which a user enters a zip code.  You must ensure that when a user submits the UserAccount page, ZipCode must contain five numeric digits.  What will you do to accomplish this?()
    A

    Use RangeValidator.

    B

    Use RegularExpressionValidator

    C

    Use RequiredValidator

    D

    Use CompareValidator

    E

    Use RequiredFieldValidator


    正确答案: A,B
    解析: 暂无解析

  • 第11题:

    单选题
    You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. One of the servers,Server01 has the Web Server (IIS) role installed and all theWeb Server role services on it. Which of the following features would you configure on the server toprovide a user the ability to administer a website?()
    A

    Configure .Net Users feature on Server01

    B

    Configure.Net Roles feature on Server01

    C

    Configure IIS Manager Permissions feature on Server01

    D

    Configure Authentication feature on Server01


    正确答案: A
    解析: 暂无解析

  • 第12题:

    Company A is a cloud service provider that provides users with old tenants,customizable office software and customer relationship management software.The cloud service provided by Company A belongs to()service type.

    A.IaaS
    B.PaaS
    C.SaaS
    D.DaaS

    答案:C
    解析:
    解析:翻译:A公司是一家云服务提供商,向用户提供老租户、可定制的办公软件和客户关系管理软件,A公司所提供的此项云服务属于( )服务类型。A.IaaS B.PaaS C.SaaS D.DaaS
    云计算服务按照提供的资源层次,可以分为IaaS、PaaS、SaaS等三种服务类型。——IaaS(基础设施即服务),向用户提供计算机能力、存储空间等基础设施方面的服务。——PaaS(平台即服务),向用户提供虚拟的操作系统、数据库管理系统、Web应用等平台化的服务。——SaaS(软件即服务),向用户提供应用软件(如CRM、办公软件等)、组件、工作流等虚拟化软件的服务。

  • 第13题:

    Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()

    • A、Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
    • B、Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
    • C、Use class-based policing to limit the peer-to-peer traffic rate.
    • D、Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C

    正确答案:C

  • 第14题:

    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()

    • A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.
    • B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.
    • C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.
    • D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

    正确答案:A

  • 第15题:

    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()

    • A、The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.
    • B、The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.
    • C、The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.
    • D、The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.

    正确答案:A

  • 第16题:

    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()

    • A、The best option is to use an A record for FederatedSharing.Company.com.
    • B、The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.
    • C、The best option is to use an A record for autodiscover.Company.com.
    • D、The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.

    正确答案:C

  • 第17题:

    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()

    • A、You should consider changing the EWS virtual directory.
    • B、You should consider changing the Federation Trust.
    • C、You should consider changing the Organizational Relationship.
    • D、You should consider changing the default sharing policy.

    正确答案:D

  • 第18题:

    A system is experiencing performance problems.  After checking the CPU usage, the problem identified is that the system is "CPU Bound".  Which of the following outcomes will determine if there is a possible CPU constraint?()

    • A、 Low paging 
    • B、 High paging 
    • C、 Workload manager is not turned on 
    • D、 A high run queue length 

    正确答案:D

  • 第19题:

    多选题
    You are implementing an ASP.NET Web application. Users will authenticate to the application with an ID. The application will allow new users to register for an account. The application will generate an ID for the user based on the users full name. You need to implement this registration functionality. Which two actions should you perform?()
    A

    Configure the SqlMembershipProvider in the web.config file.

    B

    Configure the SqlProfileProvider in the web.config file.

    C

    Create an ASP.NET page that contains a default CreateUserWizard control to create a new user account.

    D

    Create an ASP.NET page that contains a custom form that collects the user information and then uses the Membership.CreateUser method to create a new user account.


    正确答案: B,D
    解析: 暂无解析

  • 第20题:

    单选题
    It was in 2005 _____ we began to introduce this new technique into our company.
    A

    which

    B

    then

    C

    when

    D

    that


    正确答案: B
    解析:
    句意:正是在2005年,我们开始向我们公司引进这项新技术。此题考查强调句型。It+be+强调部分+that (who)+主谓句。强调句的连词只有两个,that和who。当强调的部分是人,且为句子的主语时,才用“who”,其余用that。

  • 第21题:

    单选题
    You install the Web Server (IIS) role on a new server that runs Windows Server 2008.  You install a Microsoft .NET Framework 1.0 application on a Web site on the Web server. The company security policy states that all applications must run by using the minimum level of permission.  You need to configure the Web site application so that it has the permissions to execute without creating any other content and without accessing any operating system components. What should you do?()
    A

    Set the .NET Framework trust level to Full for the Web site.

    B

    Set the .NET Framework trust level to Low for the Web site.

    C

    Set the .NET Framework trust level to High for the Web site.

    D

    Set the .NET Framework trust level to Medium for the Web site.


    正确答案: C
    解析: 暂无解析