Your network contains two Web servers named Web1 and Web2. Web1 hosts the companys corporate Web site. Web2 is a test server that contains a copy of the Web site.Users connect to Web1 by using the URL http://www.contoso.com.A Web developer named User1 pla

题目

Your network contains two Web servers named Web1 and Web2. Web1 hosts the companys corporate Web site. Web2 is a test server that contains a copy of the Web site.Users connect to Web1 by using the URL http://www.contoso.com.A Web developer named User1 plans to test updates to the Web site on Web2.You need to ensure that User1 connects to Web2 by using the URL http://www.contoso.com. The solution must ensure that all other computers connect to Web1.What should you do?()

  • A、From User1s computer, create a record in the Hosts file.
  • B、From User1s computer, create a record in the Lmhosts file.
  • C、From a DNS server, create a new Host (A) resource record.
  • D、From a DNS server, create a new Alias (CNAME) resource record.

相似考题
更多“Your network contains two Web se”相关问题
  • 第1题:

    Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()

    • A、 core layer
    • B、 bridging two VLANs on one switch
    • C、 between two Layer 2 devices with trunking
    • D、 between two Layer 2 devices without trunking

    正确答案:C,D

  • 第2题:

    Your network contains an Active Directory domain that has two sites.    You need to identify whether logon scripts are replicated to all domain controllers.   Which folder should you verify()

    • A、GroupPolicy
    • B、NTDS
    • C、SoftwareDistribution
    • D、SYSVOL

    正确答案:D

  • 第3题:

    Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()

    • A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync  synchronization.
    • B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync  synchronization.
    • C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the   perimeter network.
    • D、Deploy two Hub Transport servers on the internal network.

    正确答案:D

  • 第4题:

    Your network consists of a single Active Directory domain. The network contains five Windows Server 2008 R2 servers that host Web applications. You need to plan a remote management strategy to manage the Web servers.  Your plan must meet the following requirements: èAllow Web developers to configure features on the Web sites   èPrevent Web developers from having full administrative rights on the Web servers What should you include in your plan?()

    • A、Configure request filtering on each Web server.
    • B、Configure authorization rules for Web developers on each Web server.
    • C、Configure the security settings in Internet Explorer for all Web developers by using a Group Policy.
    • D、Add the Web developers to the Account Operators group in the domain.

    正确答案:B

  • 第5题:

    Your network contains two servers that run the Server Core installation of Windows Server 2008 R2.  The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site.  Administrators use client computers that run Windows 7.   You need to recommend a strategy that allows the administrators to remotely manage the Network Load  Balancing cluster. Your strategy must support automation.  What should you recommend?()

    • A、On the servers, enable Windows Remote Management (WinRM).
    • B、On the servers, add the administrators to the Remote Desktop Users group.
    • C、On the Windows 7 client computers,enable Windows Remote Management (WinRM).
    • D、On the Windows 7 client computers,add the administrators to the Remote Desktop Users group.

    正确答案:A

  • 第6题:

    单选题
    Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files.    You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity   èMinimizes the amount of time to restore the server What should you include in your plan?()
    A

    Windows Deployment Services (WDS)

    B

    Windows Automated Installation Kit (Windows AIK) and folder redirection

    C

    the Multipath I/O feature and Volume Shadow Copies

    D

    the Windows Server Backup feature and System Image Recovery


    正确答案: A
    解析: 暂无解析

  • 第7题:

    单选题
    Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   You plan to publish a Web site on two Web servers.   You need to deploy an availability solution for your Web servers that meets the following requirements: èSupports the addition of more Web servers without interrupting client connections  èEnsures that the Web site is accessible even if a single server fails What should you do?()
    A

    Configure a failover cluster.

    B

    Configure a Web garden on each Web server.

    C

    Create a Network Load Balancing cluster.

    D

    Create two application pools on each Web server.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()
    A

    Create a Network Load Balancing cluster that contains the Outlook Web Access servers

    B

    Create a Microsoft Cluster Server cluster that contains the Outlook Web Access servers

    C

    Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailbox

    D

    Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers


    正确答案: C
    解析: 暂无解析

  • 第9题:

    多选题
    Your network contains an Active Directory domain named contoso.com. Contoso.com contains  three servers.The servers are configure as shown in the following table.     Server name   Server roel Service   Server1                          Certification authority (CA)   Server2                         Certificate Enrollment Web Service  Server3                          Certificate Enrollment Policy Web Service   You need to ensure that users can manually enroll and renew their certificates by using the  Certificate Enrollment Web Service.     Which two actions should you perform()
    A

    Configure the policy module setting.

    B

    Configure the issuance requeriments for the certificate templates.

    C

    Configure the Certificate Services Client - Certificate Enrollment Policy Group Policy setting.

    D

    Configure the delegation setting for the Certification Enrollment Web Service application pool account.


    正确答案: D,A
    解析: 暂无解析

  • 第10题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.  You need to collect information about which users are connecting to the Web site by using HTTPS.   What should you do?()
    A

    Check the application log on the Web server.

    B

    Use Network Monitor to capture network traffic on the Web server.

    C

    Review the log files created by IIS on the Web server.

    D

    Configure a performance log to capture all Web service counters. Review the performance log data.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    Your network contains a Web-based application that runs on Windows Server 2003. You plan to  migrate the Web-based application to Windows Server 2008 R2. You need to recommend a server  configuration to support the Web-based application. The server configuration must meet the following  requirements:   èEnsure that the application is available to all users if a single server?fails èSupport the installation of .NET applications èMinimize software costs  What should you recommend?() 

    • A、Install the Server Core installation of Windows Server 2008 R2 Standard on two servers. Configure the servers in a Network Load Balancing cluster.
    • B、Install the full installation of Windows Server 2008 R2 Web on two servers. Configure the servers in a Network Load Balancing cluster.
    • C、Install the full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.
    • D、Install the full installation of Windows Server 2008 R2 Datacenter on two servers. Configure the servers in a failover cluster.

    正确答案:B

  • 第12题:

    You create a Web Form that contains connected Web Parts. You write the following declaration in your Web Form. You need to ensure that your Web Part connection is valid. Which two actions should you perform? ()

    • A、Include a data source identified as "WebPartConnection1" on the Web Form.
    • B、Include a Web Part identified as "customerPart" on the Web Form.
    • C、Include a Web Part identified as "ordersPart" on the Web Form.
    • D、Ensure that you declare an interface named "IOrdersPart".
    • E、Ensure that you declare an interface named "ICustomerPart".
    • F、Ensure that each Web Part declares either a GetInterface or ProvideInterface method.

    正确答案:B,C

  • 第13题:

    Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()

    • A、Log on to one of the cluster nodes and run the wlbs disable all command.
    • B、Open the Network Load Balancing Clusters console and delete the default port rules.
    • C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
    • D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

    正确答案:B,C

  • 第14题:

    Your network contains a server named Server1 that has the Routing role service installed. Server1 has two network connections. One network connection connects to the internal network. The other network connection connects to the Internet.All network connections connected to the internal network use private IP addresses. You install a Web server named Web1. Web1 hosts a secured Web site that only allows connections over TCP port 8281. Web1 is connected to the internal network.You need to ensure that the secure Web site can be accessed from the Internet.What should you do from the Routing and Remote Access console?()

    • A、Configure Routing Information Protocol (RIP), and then activate authentication on the RIP interface.
    • B、Configure Routing Information Protocol (RIP), and then configure the incoming packet protocol settings on the RIP interface.
    • C、Configure Network Address Translation (NAT), and then add a new service to the NAT interface.
    • D、Configure Network Address Translation (NAT), and then enable the Secure Web Server (HTTPS) service on the NAT interface.

    正确答案:C

  • 第15题:

    Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()

    • A、Port mirroring
    • B、DHCP guard
    • C、Router guard
    • D、MAC address

    正确答案:D

  • 第16题:

    多选题
    Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()
    A

    Log on to one of the cluster nodes and run the wlbs disable all command.

    B

    Open the Network Load Balancing Clusters console and delete the default port rules.

    C

    Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.

    D

    Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.


    正确答案: A,D
    解析: 暂无解析

  • 第17题:

    单选题
    You are able to access a Web server from your computer by using the IP address of the Web server. You fail to access the Web server when you use its fully qualified domain name. Other users on your network can access the Web server by using both the IP address and the fully  qualified domain name. You need to access the Web server by using the fully qualified domain name.  What should you do? ()
    A

    Use the Diagnose and repair feature in the Network and Sharing Center.

    B

    At the command prompt, type ipconfig /allcompartments.

    C

    Disable the NetBIOS feature on your network adapter.

    D

    Configure the correct default gateway on the Alternate Configuration tab of your network connection properties dialog box.


    正确答案: C
    解析: 暂无解析

  • 第18题:

    单选题
    Your network contains a DNS server named DNS1 that runs Windows Server 2008 R2. DNS1 hosts a zone named contoso.com.Dynamic updates are enabled on the zone.The network contains a server named Web1.contoso.com.All computers on the network are configured to use DNS1 as their DNS server.You need to ensure that users can connect to Web1.contoso.com by using the name portal.contoso.com.The solution must ensure that the users can connect by using portal. contoso.com if the IP address of Web1.contoso.com changes.Which type of resource record should you create?()
    A

    Alias (CNAME)

    B

    Host (A)

    C

    Host Information (HINFO)

    D

    Pointer (PTR)


    正确答案: A
    解析: 暂无解析

  • 第19题:

    多选题
    Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()
    A

    core layer

    B

    bridging two VLANs on one switch

    C

    between two Layer 2 devices withtrunking

    D

    between two Layer 2 devices withouttrunking


    正确答案: D,B
    解析: 暂无解析

  • 第20题:

    多选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet.   What are two possible ways to achieve this goal?()
    A

    Monitor the events in the application log on Server1.

    B

    Monitor the events in the security log on Server1.

    C

    Monitor the Web server connections on Server1 by using a performance log.

    D

    Monitor network traffic to Server1 by using Network Monitor.

    E

    Monitor the IIS logs on Server1.


    正确答案: C,D
    解析: 暂无解析