Your network includes Windows Server 2008 R2 Hyper-V servers. You are configuring the servers in a failover cluster that will host highly available virtual machines (HAVMs). You plan to manage the servers in the cluster by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to design a storage solution for the cluster that allows you to migrate virtual machines (VMs) into and out of the cluster by using SAN migration. Which two actions should you include in your design?()
第1题:
Your virtual environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to configure the live migration network priorities for all virtual machines (VMs). What should you do?()
第2题:
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()
第3题:
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()
第4题:
All servers in your environment run Windows Server 2003. Your companys network includes multiple network segments and multiple routers. A member server that has the Routing and Remote Access service (RRAS) installed provides Internet connectivity for all client computers. The RRAS server is located in a perimeter network (also known as DMZ). A client computer named Client1 is unable to connect to the Internet. The RRAS server is able to connect to the Internet. You need to pinpoint the location of the network issue. What should you do?()
第5题:
Enable Cluster Shared Volumes (CSVs).
In Failover Cluster Manager, edit the properties of a single VM.
In Virtual Network Manager, edit the properties of the virtual network.
In Hyper-V Manager, take each VM offline and edit the settings of each VM.
第6题:
Set the driver signing option to block.
Set the driver signing option to ignore.
In the computer’s BIOS, reserve an unused IRQ for ISA devices.
In the Device Manager, configure the second ISA network adapter to use an unused IRQ.
第7题:
chemical protection face shield
approved work vest
self-contained breathing apparatus
marlinspike
第8题:
Enable the highest level of Syslogging available to ensure you log all possible event messages
Use SSH to access your Syslog information
Log all messages to the system buffer so that they can be displayed when accessing the router
Syncronize clocks on the network with a protocol such as Network Time Protocol
第9题:
Five
Three
Four
Six
第10题:
core layer
bridging two VLANs on one switch
between two Layer 2 devices withtrunking
between two Layer 2 devices withouttrunking
第11题:
Right-click and click the Diagnose option in the Connect to a network window.
Set the security type value to No authentication in the wireless network properties dialog box.
Click the Manually connect to a wireless network option in the Set up a connection or network window.
In the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.
Configure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.
第12题:
Stop and then start the TCP/IP NetBIOS helper service on your computer.
Stop and then start the DNS client service on your computer.
Add a HOSTS entry for server1 to your computer.
Add a LMHOSTS entry for server1 to your computer.
第13题:
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()
第14题:
In what way does Cisco SMARTnet help customers protect their network investments?()
第15题:
Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You plan to deploy Microsoft Virtual Desktop Infrastructure. You plan to scale both static and dynamic deployments across several servers. You need to design a plan that supports static and dynamic deployments and that allows for capacity growth without outages. What should you include in your plan?()
第16题:
You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. Your network includes a shared folder named TestKingDocs. This folder must not be visible in a browse list. However, users report that they can see TestKingDocs when they browse for shared folders. How should you solve this problem?()
第17题:
Disable the Connect even if the network is not broadcasting option.
In the Network and Sharing Center window, click the Diagnose and repair option.
Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.
第18题:
Enable the Require domain controller to unlock policy.
Set the Number of previous logons to cache policy to 0.
Remove all user and group accounts from the Log on locally user right.
Remove all user and group accounts from the Access this computer from the network user right.
第19题:
STP
GVRP
SNMP
VTP
DHCP
第20题:
Design
Prepare
Maintain
Optimize
第21题:
Enable MAC address spoofing.
Disable MAC address spoofing.
Enable TCP Offload Engine(TOE).
Disable TCP Offload Engine(TOE).
第22题:
Implement
Design
Plan
Prepare
第23题:
Configure the network category of your wireless network connection to Private.
Configure the network category of your wireless network connection to Public.
Configure the TCP/IP packet filtering on the wireless network connection.
Configure the wireless network connection with the appropriate authentication to the router.