Your network uses IPv4. You install a server that runs Windows Server 008 at a brach office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office. Which two actions should you perform?()
第1题:
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
第2题:
Your network uses the172.12.0.0 class B address. You need to support 459 hosts per subnet, while accommodating the maximum number of subnets. Which mask wouldyou use?()
第3题:
A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()
第4题:
Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()
第5题:
Your computer uses both wired and wireless network connections. The networks are not connected to each other. You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network. What should you do?()
第6题:
Your network is configured as shown in the following diagram. Each office contains a server that has the File Services server role installed. The servers have a shared folder named Resources. You need to plan the data availability of the Resources folder. Your plan must meet the following requirements: èIf a WAN link fails,the files in the Resources folder must be available in all of the offices. èIf a single server fails, the files in the Resources folder must be available in each of the branch offices,and the users must be able to use existing drive mappings. èYour plan must minimize network traffic over the WAN links. What should you include in your plan?()
第7题:
Configure the NWLink frame type of the network adapters to be ethernet 802.3.
Configure the NWLink frame type of the network adapters to be ethernet II.
Replace the network adapters with 10/100 BNC adapters.
Replace the network adapters with 10/100 UTP network adapters.
第8题:
The network uses MAC filtering
The network uses WEP
The network uses SSID broadcast
The network uses WPA
第9题:
BranchCache - Content Retrieval (Uses HTTP)
BranchCache - Hosted Cache Server (Uses HTTPS)
BranchCache - Peer Discovery (Uses WSD)
File and Printer Sharing
第10题:
Configure a Windows Connect Now Group Policy.
Configure a Wireless Network (IEEE 802.11) Policy.
Delete the rogue network from the Network and Sharing Center on each computer.
Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.
第11题:
Configure a HOSTS file.
Configure a LMHOSTS file.
Configure a WINS server database.
Configure a DHCP server address.
Configure at least one DNS address.
第12题:
Configure the network category of your wireless network connection to Private.
Configure the network category of your wireless network connection to Public.
Configure the TCP/IP packet filtering on the wireless network connection.
Configure the wireless network connection with the appropriate authentication to the router.
第13题:
The EIGRP configuration in the Glencoe router uses a single network statement.From the output shown in the graph would advertise these networks in EIGRP?()
第14题:
You work as a network technician at Company. Your boss, Mrs. , is interested in GLBP. In particular, she wants to know the multicast address that this protocol uses. What should you tell her? ()
第15题:
Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use NetBIOS names to connect to all shared resources as the network. You configure a TCP/IP address and a subnet mask on each new computer. Which 2 additional TCP/IP properties should you configure on each new computer?()
第16题:
Your network consists of a single Active Directory domain. The network contains a file server that runs Windows Server 2008 R2. All servers use internal storage only. You plan to deploy a client/server application. You need to deploy the application so that it is available if a single server fails. You must achieve this goal while minimizing costs. What should you do?()
第17题:
Your network contains a single Active Directory domain. All domain controllers run Windows Server 2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches. You need to recommend a strategy for network access that meets the following requirements: èUsers are unable to bypass network access restrictions. èOnly client computers that have up-to-date service packs installed can access the network. èOnly client computers that have up-to-date anti-malware software installed can access the network. What should you recommend?()
第18题:
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?
第19题:
The bindings.
A DNS address.
A Gateway address.
A WINS server address.
A DHCP server address.
第20题:
STP
GVRP
SNMP
VTP
DHCP
第21题:
enabling network migrations
conserving public IP addresses
allowing stateful packet inspection
preventing unauthorized connections from outside the network
第22题:
Reconfigure the dial-up connection to dial-up to a private network.
Create another connection that uses a virtual private network (VPN) to connect a private network though the Internet.
Configure Internet Explorer to automatically detect proxy settings.
Configure Internet Explorer to dial whenever a network connection is not present.
第23题:
Modify the GlobalQueryBlockList registry key and restart the DNS Server service.
Modify the EnableGlobalNamesSupport registry key and restart the DNS Server service.
Create a trust anchor that uses a certificate issued by an internal certification authority (CA).
Create a trust anchor that uses a certificate issued by a publicly trusted certification authority (CA).
第24题:
Deploy version 2 of the application by using Microsoft Application Virtualization (App-V).
Deploy version 2 of the application as a Remote Desktop Services RemoteApp.
Deploy version 2 of the application by using a Group Policy Software Installation policy.
Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.