Requirement demands that an incoming request from a portfolio manager has to have a higher priority compared to other users of the application. As an administrator, which one of the following approaches would you adopt?
A. Use Work Manager with the execute thread model to set up rules to associate a priority to the user.
B. Use Work Manager fair-share-request-class to associate a priority to the user.
C. Use Work Manager response-time-request-class to associate a priority to the user.
D. Use Work Manager context-request-class to associate a priority to the user.
Which two statements are true about java EE shared libraries?
A. A shared library cannot bedeployed to a cluster.
B. An application that is targeted to server1 can use a shared library that is targeted to server 2.
C. Multiple versions of the same shared library can be deployed and be active at the same time
D. A shared library is referenced through an application’s deployment descriptor.
Which two statements are true concerning the installation and configuration of the bootloader by the Anaconda installer, which is then used to boot Oracle Linux?
A. The Linux Loader (LILO) bootloader may be chosen for installation.
B. The bootloader must be password protected and Anaconda prompts for a password in all cases.
C. The Grand Unified Bootloader (GRUB) is the only bootloader used by Oracle Linux.
D. If previously installed operating systems are found on disk partitions that were not overwritten, then an attempt is made to configure the bootloader to be able to boot them.
E. The bootloader is installed by default in the first partition of the disk.
Node devices provide which three connectivity functions on QFabric systems? (Choose three.)
A. Connect to servers
B. Connect to Director groups
C. Connect to storage devices
D. Connect to external networks
E. Connect to redundant server Node groups
Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?
On a MAG Series device, where is the preauthentication sign-in message configured?
A. On the configuration page for the sign-in notification message
B. On the wireless user realm authentication policy
C. On the sign-in policy of the URL being used by the wireless users
D. On the sign-in page of the URL being used by the wireless users
Which two configurations are made using the QoS Setup Wizard? (Choose two.)
A. Assign applications to traffic classes.
B. Use ToS/DSCP values for traffic classes.
C. Exclude subnets from QoS management.
D. Select dedicated vs. over-subscribed circuits.
An administrator is tasked with installing an application patch on a virtual server. The administrator needs the ability to restore the server to its previous state quickly if the patch corrupts the system. Which of the following should the administrator do to accomplish this task?
A. Install the patch on a development server
B. Create a full backup
C. Create a snapshot
D. Install the patch on a test server
Sandy, the network administrator, has funding to do a major upgrade of the company’s LAN. This upgrade is currently in the planning stage, and Sandy still needs to determine the network requirements, bottlenecks, and any future upgrades in mind. Which of the following is the FIRST step in the planning process?
A. Conduct a vulnerability scan
B. Establish a network baseline
C. Conduct traffic analysis
D. Conduct a risk assessment
Which of the following devices is BEST suited for servers that need to store private keys?
A. Hardware security module
B. Hardened network firewall
C. Solid state disk drive
D. Hardened host firewall
Which of the following would be the benefit of saving a project binder in a centralized location?
A. Provides an opportunity for another project manager to review the binder and make corrections.
B. Provides an opportunity for team members to review their contributions.
C. Provides other project managers the opportunity to review the project information.
D. Provides stakeholders the opportunity to modify the change request forms.
In the OSI model, which of the following layers would be the cause of a session time-out while browsing the web?
A. Layer 2
B. Layer 3
C. Layer 5
D. Layer 7
The Intel® Server Board S5520UR has two different headers through which front panel signals can be routed. Which of the following documents would a server technician use to identify the pin- out of each header?
A. The Technical Product Specification
B. The Service Guide
C. The Quick Start Guide
D. The Spare Parts and Configuration Guide
A technician is setting up an older PC to use as an EMR/EHR access terminal and tries to install a USB keyboard that was working fine on another newer machine. The keyboard does not connect with the older PC. Which of the following is the BEST solution to get the keyboard to work on this PC?
A. Replace the motherboard
B. Update the operating system
C. Use a USB to PS/2 connector
D. Install a USB 2.0 adapter card
Which statements are true regarding configuring multiple buffer pools in the Database Buffer Cache that is using only the standard block size? (Choose all that apply.)
A. Both the KEEP and RECYCLE pools must be configured.
B. The RECYCLE pool needs to be configured before dropping an object.
C. The DEFAULT pool needs to be removed if multiple buffer pools are being configured.
D. Either the KEEP pool or the RECYCLE pool can be configured along with the DEFAULT pool.