AIX 5L and SUN Solaris have differing approaches at handling processor failures. Which statement best describes how AIX handles processor failures?()
A、If AIX discovers a processor with too many recoverable errors during runtime, it will dynamically turn off that processor, while the rest of the system keeps running.
B、If AIX detects a failing processor it will automatically move all resources to another processor. The failed processor can be hot-swapped and the new replacement becomes the active processor.
C、If AIX determines a processor is failing, it will perform diagnostics to determine which processor function can be disabled and dynamically reallocate all CPU and memory resources thus isolating the failure condition and preventing a reboot.
D、If AIX senses a processor level error condition, internal diagnostics are activated to determine the severity of the problem. After the failure threshold is met, a message is broadcast to the service processor informing the operator to perform a system reboot.
A customer uses an IBM xSeries x366 for their network server.They experienced downtime when the NIC failed earlier this year.Their Novell 6.5 server needs to be accessible all the time at the highest speed possible.Slots are available where network adapters can still be added. High availability is the primary requirement, but increased network bandwidth on the server is also required. Which of the following is the most cost-effective solution to satisfy all of the customer’s requirements?()
A、Upgrade the network switches to 10Gb speed.
B、Install a dual port gigabit Ethernet adapter and configure adapter load balancing teaming with the onboard adapters.
C、Install one extra adapter to team with the internal adapter and configure adapter failover.
D、Install two additional NICs and configure adapter load balancing teaming with the onboard adapters.
AR1220W-P支持以下哪些特性功能()。
A、Wifi用户无线接入
B、IPPBX
C、L2TP
D、Web网管
E、NAT
F、3G广域网无线接入
A company wants all IM chat via the internet to stop. A technician blocks IRC traffic with a traffic shaping device, yet IM chat remains useable. Which of the following should a technician do next?()
A、Block both IRC and ICMP
B、Utilize SNMP to identify IM users
C、Contact the IM carrier to request the IM account be disabled
D、Change the shaping setting to allow minimal traffic to reduce port hopping
简述应用视频转换大师进行视频格式转换的操作方法。以MP3为例。
You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()
A、stop all running instances of PDACLD
B、log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) user
C、change the TAMeb ACL policy applying to the Web Services namespace
D、update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console