Users are complaining of slow performance. The iostat command indicates hdiskkxx is extremely busy. There is no activity on any other hdisks in the same volume group. Which of the following is the best action to take?()
Which of the following is the MOST secure method to authenticate users?()
You have 100 segments in the USERS tablespace. You realize that the USERS tablespace is running low on space. You can use Segment Advisor to().
You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do?()
Refer to the exhibit. You have noticed that several users in the network are consuming a great deal of bandwidth for the peer-to-peer application Kazaa2. You would like to limit this traffic, and at the same time provide a guaranteed 100 kb/s bandwidth for one of your servers. After applying the configuration in the exhibit, you notice no change in the bandwidth utilization on the serial link; it is still heavily oversubscribing the interface. What is the cause of this problem? ()
An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).
You have an Exchange Server 2003 organization. All users connect to their mailboxes by using Microsoft Office Outlook. You start to transition the organization to new Exchange Server 2010 servers. The new servers are on a secured subnet that is separated by a firewall. You will move half of the mailboxes to the new servers. Client Access servers and Mailbox servers are on the secured subnet. Client computers on the network can access the Client Access servers. You need to recommend a solution that allows users to connect to Public Folders by using Outlook or Outlook Web App (OWA). What should you include in the solution?()
You are designing a DNS name resolution strategy to allow all users access to internal and external web sites. What should you do?()
You create 200 new user accounts. The users are located in six different sites. New users report that they receive the following error message when they try to log on: "The username or password is incorrect." You confirm that the user accounts exist and are enabled. You also confirm that the user name and password information supplied are correct. You need to identify the cause of the failure. You also need to ensure that the new users are able to log on Which utility should you run()
What is the maximum number of users that can be added to an autonomous access point that is being used as a local authenticator?()