Which of the following management types can be used to deploy appropriate quality-of-servicesolutions to make the most efficient use of bandwidth?()
You deploy mobile devices that run Microsoft Windows Mobile 5.0. Company security policy requires an authentication process that is stronger than a user name and password combination. You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy. What should you do?()
Your company purchases a new application to deploy on 200 computers. The application requires that you modify the registry on each target computer before you install the application. The registry modifications are in a file that has an .adm extension. You need to prepare the target computers for the application. What should you do()
Your company purchases a new application to deploy on 200 computers. The application requires that you modify the registry on each target computer before you install the application. The registry modifications are in a file that has an .adm extension. You need to prepare the target computers for the application. What should you do()
You are trying to deploy a configuration job to an ios access point using the wlse, but the job fails. Which of the following would cause this failure?()
You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. The software deployment of the application is unsuccessful. During the deployment, some users in the Sales OU report that the installation is aborting with random errors midway through the installation process. The remaining users in the Sales OU report that the software is installing, but is giving them general protection fault errors. What should you do?()
After a virus outbreak, which of the following can be used to deploy a hotfix in a Microsoft environment?()
You deploy more than one application to the same WebLogic container. The security is set on JavaEE level and all deployed JavaEE applications use the same security roles. What is your recommendation for an architecture with those requirement?()
You need to recommend a technology to deploy and manage updates of App2 for the sales users. The solution must meet the company’s business requirements. What should you recommend?()
Companycom wants to deploy WebSphere in an HACMP environment, running on two servers in LPARs. These servers will also host the test and dev LPARs. The customer would like to use the test and dev resources to support an HACMP failover. What is the best way to accomplish this task?()