You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()
第1题:
You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()
第2题:
You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()
第3题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messagingsolution.During the course of the business week you receive instruction from Company.com to have a set of cmdlets grouped for administrative delegation of duties.What should you do?()
第4题:
You have a file server named Server1 that runs Windows Server 2003 Service Pack (SP2). Server1 has a 10-gigabit network adapter and is connected to a 100-Mb switch. You replace the 100-Mb switch by using a 1-GB switch. You discover that copying files to Server1 over the network is slow. You need to reduce the amount of time it takes to copy files to Server1 over the network. Which connection type should you specify for the network adapter? ()
第5题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2008 Service Pack 2 (SP2) as their messaging solution.During the course of the business week you receive instruction from Company.com to plan the installation of Microsoft Exchange Server 2010 whilst ensuring you install the Microsoft Exchange Server 2010 prerequisites for the Mailbox, Hub Transport and Client Access server roles. What should you do?()
第6题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com. What should you do?()
第7题:
Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()
第8题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that the network users are able to open a resource mailbox. What should you do?()
第9题:
You are the administrator of a SQL Server 2005 computer named SQL1. SQL1 is a member of a Microsoft Active Directory domain. You do not have any rights or privileges to perform domain administration. However, you have been granted membership in the local Administrators group on SQL1. You perform most of the management of SQL1 from your administrative workstation. However, for security reasons, you want to track all attempts for interactive logons and network connections to SQL1. What should you do?()
第10题:
/26
/27
/28
/29
第11题:
At the command prompt, run Wecutil.exe es gr.
At the command prompt, run Winrs.exe -environment.
From Windows Firewall with Advanced Security, export the policy.
From the wireless network properties of Network1, copy the network profile to a USB flash drive.
第12题:
/26
/27
/28
/29
第13题:
You must segement your internal 192.168.1.0/24 network into a minimun of 12 subnet, each containing a minimun of 12 hosts. Which network mask do you use?()
第14题:
You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts. Which network mask do you use?()
第15题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single site named KingSite1.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured the mailbox server as members of a database availability group (DAG) with a public folder database. During the course of the business week you receive instruction from Company.com to create a new Active Directory site and install Exchange server in the site whilst ensuring the public folders are stored on servers in both sites. What should you do?()
第16题:
You are designing the IP address assignment strategy for the VPN users. Which two actions should you perform.()
第17题:
You have a single network segment. All servers run Windows Server 2003 Service Pack 2 (SP2). You have a DHCP server named Server1. Client computers receive IP addresses from Server1. You add a second network segment separated by a RFC 1542-compliant router. You need to ensure that computers in the new network segment can receive their IP configurations from Server1. You make the appropriate configuration changes on the router. What should you do on Server1?()
第18题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the week you receive an instruction from the CIO to stop internal users from sending e-mail messages containing the words "Classified Data" to users outside the organization. What should you do?()
第19题:
You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured. What should you do?()
第20题:
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.You need to prevent users on the network from enabling text message notification s to their Windows mobile devices. What should you configure?()
第21题:
OSPF
RIP
BGP
static
第22题:
Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.
Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.
Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.
Create a Pattern Match capture trigger for the 131.107.0.1 IP address.
第23题:
You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.
You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.
You should consider having mail enabled for KingPublic.
You should consider having the author role assigned to Anonymous.
第24题:
Source TCP port
Source IP address
Destination TCP port
Destination IP address