urlhash
backup chaining
least connections
fewest outstanding requests
第1题:
What is Phantom RP used for?()
第2题:
Your network contains a Web-based application that runs on Windows Server 2003. You plan to migrate the Web-based application to Windows Server 2008 R2. You need to recommend a server configuration to support the Web-based application. The server configuration must meet the following requirements: èEnsure that the application is available to all users if a single server?fails èSupport the installation of .NET applications èMinimize software costs What should you recommend?()
第3题:
Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()
第4题:
You need to recommend a Windows Server 2008 R2 server configuration that meets the following requirements: èSupports the installation of Microsoft SQL Server 2008 èProvides redundancy for SQL services if a single server fails What should you recommend?()
第5题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You work in a company named Wiikigo, Ltd. and there is a two-node Network Load Balancing cluster. Onlythe intranet Web site will be provided with the high availability and load balancing by the cluster. Thecompany names the cluster as web.wiikigo.com. You find a problem that the Network Load Balancingcluster can be seen in the network neighborhood by the Wiikigo users. And the users can utilize the web.wiikigo.com name to get access to various services. The web.wiikigo.com Network Load Balancing clusteris set with only one port rule. Since you are the technical support, you are required have the web.wiikigo.com Network Load Balancing cluster configured to receive only HTTP traffic. Which two actions should be performed to achieve the goal?()
第6题:
You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment. The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application. You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()
第7题:
urlhash
url persistency
cookie persistency
default persistency
第8题:
Create a new rule for TCP port 80 by using the Network Load Balancing Cluster console
Run the wlbs disable command on the cluster nodes
Assign a unique port rule for NLB cluster by using the NLB Cluster console
Delete the default port rules through Network Load Balancing Cluster console
第9题:
Configure the front-end servers in each branch office to be members of a new Active Directory site
Configure the back-end servers to have server encryption certificates issued by a commercial certification authority (CA)
Configure two back-end servers to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound RPC connections
Configure multiple front-end servers in each branch office to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound HTTPS connections
第10题:
CLI
J-Web
JUNOScope
PCMCIA flash card
第11题:
performance
authorization
compression
protocol validation
UDP load balancing
第12题:
Defines the session limit for the domain.
Defines the session limit for the tunnel instance.
Used to control load balancing between multiple domains.
Used to control load balancing between multiple tunnels for a domain.
第13题:
What are three Juniper DX Cluster benefits?() (Choose three.)
第14题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster. What should you do? ()
第15题:
You plan to deploy two virtual machines (VMs) that will be configured as nodes in a failover cluster. The VMs will run file and print services. You need to recommend a storage solution for the planned deployment. What should you include in the recommendation?()
第16题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster. The nodes have a single network adapter and are connected to the same switching hub device. Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers. You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device. You do not want to move the cluster to another switching hub device. What should you do? ()
第17题:
Your network contains two servers that run the Server Core installation of Windows Server 2008 R2. The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site. Administrators use client computers that run Windows 7. You need to recommend a strategy that allows the administrators to remotely manage the Network Load Balancing cluster. Your strategy must support automation. What should you recommend?()
第18题:
pass-through disks
Network Load Balancing (NLB) for the Hyper-V hosts
virtual machine queue (VMQ)
Cluster Shared Volumes (CSV)
an iSCSI Storage Area Network (SAN)
a failover cluster for the Hyper-V hosts
Network Load Balancing (NLB) for the VMs
Network Attached Storage (NAS)
Microsoft System Center Operations Manager with Performance and Resource Optimization (PRO)
Windows System Resource Manager (WSRM)
a failover cluster between the VMs
Virtual Machine Chimney
Second-Level Address Translation (SLAT)
quick migration
第19题:
Set the NLB cluster type to Multicast
Dedicate a virtual network for all NLB traffic
Use static MAC addresses for the parent network adapter
Enable spoofing of MAC addresses on the virtual network adapter
第20题:
Place all user mailboxes on back-end servers. Deploy Outlook Web Access on three front-end servers that are members of the Network Load Balancing cluster
Place all user mailboxes on back-end servers that are members of a Network Load Balancing cluster. Deploy Outlook Web Access on the back-end servers
Place mailboxes for remote users on one back-end server and place all mailboxes for main office users on another back-end server. Deploy Outlook Web Access on the back-end server that contains the mailboxes for remote users
Place all user mailboxes on two back-end servers that are members of a Network Load Balancing cluster. Place mailboxes for remote users and mailboxes for main office users into separate storage groups. Deploy Outlook Web Access on three front-end servers. Configure the front-end servers to access only the back-end Network Load Balancing cluster
第21题:
Log on to one of the cluster nodes and run the wlbs disable all command.
Open the Network Load Balancing Clusters console and delete the default port rules.
Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
第22题:
source IP address
destination IP address
per-packet load balance
destination MAC address
source MAC address
第23题:
Create two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other server
Create a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server
Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover node
Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server