Which two characteristics are most typical of a SAN? () A: NICs are used for network connectivity. B: Servers request specific blocks of data. C: Storage devices are directly connected to servers. D: A fabric is used as the hardware for connecting servers to storage devices. E: The TCO is higher because of the cost of director class storage switches.
Which two characteristics are most typical of a SAN? () A: NICs are used for network connectivity. B: Servers request specific blocks of data. C: Storage devices are directly connected to servers. D: A fabric is used as the hardware for connecting servers to storage devices. E: The TCO is higher because of the cost of director class storage switches.
Which of the following best describes why a customer would choose x86 server solutions over mid-range or mainframe solutions?() A: x86 servers are more reliable than mid-range and Mainframe servers. B: x86 servers require less support personnel. C: Microsoft Operating Systems require less maintenance than mid-range and Mainframe Operating Systems. D: x86 solutions cost less.
Which of the following best describes why a customer would choose x86 server solutions over mid-range or mainframe solutions?() A: x86 servers are more reliable than mid-range and Mainframe servers. B: x86 servers require less support personnel. C: Microsoft Operating Systems require less maintenance than mid-range and Mainframe Operating Systems. D: x86 solutions cost less.
A company is deploying a new file server to consolidate shares from several legacy servers. Whichof the following is the BEST method to ensure that the new file shares are being used?() A: Setup the new file server and shut down the legacy servers. B: Remove all the DNS entries for the legacy servers. C: Create a logon script to remap the old file shares to the new file shares. D: Go to each users computer, remove all shares and setup the new shares.
A company is deploying a new file server to consolidate shares from several legacy servers. Whichof the following is the BEST method to ensure that the new file shares are being used?() A: Setup the new file server and shut down the legacy servers. B: Remove all the DNS entries for the legacy servers. C: Create a logon script to remap the old file shares to the new file shares. D: Go to each users computer, remove all shares and setup the new shares.
When scaling Coherence from one to two cache servers, it will not show the same scalability as two to four. Why?() A: Coherence uses a more efficient TCMP algorithm going from two to four cache servers B: When going from one to two cache servers, object backups are copied across servers so work is doubled,but going from two to four is a fixed amount of work C: Near cache is enabled with a larger quorum thus performance is improved D: all of the above
When scaling Coherence from one to two cache servers, it will not show the same scalability as two to four. Why?() A: Coherence uses a more efficient TCMP algorithm going from two to four cache servers B: When going from one to two cache servers, object backups are copied across servers so work is doubled,but going from two to four is a fixed amount of work C: Near cache is enabled with a larger quorum thus performance is improved D: all of the above
When scaling Coherence from one to two cache servers, it will not show the same scalability as two to four. Why?() A: A Coherence uses a more efficient TCMP algorithm going from two to four cache servers B: B When going from one to two cache servers, object backups are copied across servers so work is doubled,but going from two to four is a fixed amount of work C: C Near cache is enabled with a larger quorum thus performance is improved D: D all of the above
When scaling Coherence from one to two cache servers, it will not show the same scalability as two to four. Why?() A: A Coherence uses a more efficient TCMP algorithm going from two to four cache servers B: B When going from one to two cache servers, object backups are copied across servers so work is doubled,but going from two to four is a fixed amount of work C: C Near cache is enabled with a larger quorum thus performance is improved D: D all of the above
Which of the following should be done FIRST before installing NOS patches in a productionenvironment?() A: Install patches on non critical servers B: Install patches in test environment C: Install patches on a PC D: Install patches on critical servers
Which of the following should be done FIRST before installing NOS patches in a productionenvironment?() A: Install patches on non critical servers B: Install patches in test environment C: Install patches on a PC D: Install patches on critical servers
Which action cannot be done in a scripted, automated fashion using WLST?() A: collecting run-time metrics and sending an email if user-defined thresholds are exceeded B: configuring Clusters and Managed Servers C: starting Managed Servers using the Node Manager D: installing WebLogic binaries on a remote machine using Node Manager E: configuring a Managed Server on a remote machine where the Node Manager is installed but no other Managed Servers from the domain exist
Which action cannot be done in a scripted, automated fashion using WLST?() A: collecting run-time metrics and sending an email if user-defined thresholds are exceeded B: configuring Clusters and Managed Servers C: starting Managed Servers using the Node Manager D: installing WebLogic binaries on a remote machine using Node Manager E: configuring a Managed Server on a remote machine where the Node Manager is installed but no other Managed Servers from the domain exist
Which action cannot be done in a scripted, automated fashion using WLST?() A: Acollecting run-time metrics and sending an email if user-defined thresholds are exceeded B: Bconfiguring Clusters and Managed Servers C: Cstarting Managed Servers using the Node Manager D: Dinstalling WebLogic binaries on a remote machine using Node Manager E: Econfiguring a Managed Server on a remote machine where the Node Manager is installed but no other Managed Servers from the domain exist
Which action cannot be done in a scripted, automated fashion using WLST?() A: Acollecting run-time metrics and sending an email if user-defined thresholds are exceeded B: Bconfiguring Clusters and Managed Servers C: Cstarting Managed Servers using the Node Manager D: Dinstalling WebLogic binaries on a remote machine using Node Manager E: Econfiguring a Managed Server on a remote machine where the Node Manager is installed but no other Managed Servers from the domain exist
下面几个表中,不属于权限表的有哪些 A: d B: use C: host D: servers
下面几个表中,不属于权限表的有哪些 A: d B: use C: host D: servers
Customers looking to utilize quad-core processors in a blade environment should use which of the following power saving options?() A: IBM HS21 - Quad-core processor designed for 4-way servers B: IBM x3850 Server - Quad-core LV processors C: IBM LS41 - Quad-core processor designed for 4-way servers D: IBM HS21 - Quad-core LV processor
Customers looking to utilize quad-core processors in a blade environment should use which of the following power saving options?() A: IBM HS21 - Quad-core processor designed for 4-way servers B: IBM x3850 Server - Quad-core LV processors C: IBM LS41 - Quad-core processor designed for 4-way servers D: IBM HS21 - Quad-core LV processor