Implement highly redundant switching and links with no single points or paths of failure.
Implement server load balancing.
Implement the Hot Standby Router Protocol (HSRP) for failover protection.
Implement intrusion detection with automatic notification of intrusion attempts in place.
第1题:
Which one is the most important based on the following common elements of a network design?()
第2题:
Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()
第3题:
A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.)()
第4题:
A company is installing IP phones. The phones and office computers connect to the same devicE.To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffiC.What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? ()
第5题:
You need to design the VLAN scheme for the Company network. Which two statements are true about best practices in VLAN design?()
第6题:
The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()
第7题:
A company has just implemented a disaster recovery plan in which critical business must be restored in a four hour window. Which of the following methods should be used to backup theservers?()
第8题:
Which four statements are true?()
第9题:
Has-a relationships should never be encapsulated.
Has-a relationships should be implemented using inheritance.
Has-a relationships can be implemented using instance variables.
Is-a relationships can be implemented using the extends keyword.
Is-a relationships can be implemented using the implements keyword.
An array or a collection can be used to implement a one-to-many has-a relationship.
第10题:
HTTP
RTP
streaming video
BitTorrent
POP3
第11题:
hub
router
switch
STP
subinterfaces
VLAN
第12题:
Routing should occur at the access layer ifvoice VLANs are utilized. Otherwise, routing should occur at the distribution layer.
Routing should always be performed at the distribution layer.
VLANs should be localized to a switch.
VLANs should be localized to a single switch unlessvoice VLANs are being utilized.
Routing should not be performed between VLANs located on separate switches.
第13题:
Which of the following procedures are involved in the recommended three-step troubleshootingflow?(Choose the best three answers.)()
第14题:
You have an Exchange Server 2010 organization.You need to identify whether an administrator has made a configuration change in the Exchange organization.What should you run?()
第15题:
Which three items should the site survey documentation include?()
第16题:
Which three best practices should be implemented at the campus backbone submodule to supportthe server farm module? ()
第17题:
Which firewall best practices can help mitigate worm and other automated attacks?()
第18题:
According to best practices, which of the following should be the FIRST step after a full boot into anewly installed Windows Server OS?()
第19题:
Which four are true?()
第20题:
Problem report
Problem collaboration
Problem diagnosis
Problem resolution
Problem documentation
Probiem authentication
第21题:
Remove the Internet Explorer Enhanced Security configuration.
Disable the Guest account.
Apportion additional storage.
Apply all relevant updates and patches.
第22题:
hub
router
switch
STP
subinterfaces
VLAN
第23题:
Get-EventLogLevel
Get-ExchangeServer
Exchange Best Practices Analyzer
Microsoft Baseline Security Analyzer (MBSA)
第24题:
Has-a relationships should never be encapsulated.
Has-a relationships should be implemented using inheritance.
Has-a relationships can be implemented using instance variables.
Is-a relationships can be implemented using the extends keyword.
Is-a relationships can be implemented using the implements keyword.
An array or a collection can be used to implement a one-to-many has-a relationship.
The relationship between Movie and Actress is an example of an is-a relationship.