packet segmentation
serialized checking
packet sequencing
parallel checking
第1题:
第2题:
第3题:
第4题:
A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()
第5题:
A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()
第6题:
In a shared server configuration, which two describe the actions that the listener can take to service a client request?()
第7题:
You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company. You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers. You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails. What should you recommend?()
第8题:
You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed. The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts. You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site. Which Web site feature should you configure?()
第9题:
Host 1 addresses the frames to the MAC address of router R1
Host 1 looks in its ARP cache for the MAC address of router R1
Host 1 addresses the frames to the MAC address of web server 2
Host 1 sends the packets to router R1 to be forwarded to web server 2
Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2
第10题:
ListView Web Server Control
DetailsView Web Server Control
DataList Web Server Control
Data Web Server Control
第11题:
EAP-FASTEAP-FAS Access Point Protocol (LWAPP) packet is used to generate an 802.1 p priority value in the packets, which are sent to an Ethernet switch by the controllers.
The AP will police the 802.1 le priority value to ensure it does not exceed the maximum value allowed for the QoS policy that is assigned to that client.
Once the LWAPP packet is received, the AP generates the IEEE 802.1 p priority value.
The AP will map the 802.11e priority value to the DSCP value.
The AP will map the DSCP value to the outer LWAPP frame.
第12题:
Allowing a client to kill other client connections
Allowing a client to shut down the server
Allowing change of the server runtime configuration
Allowing client accounts to take over the account of another user
第13题:
第14题:
第15题:
What are two things that an access point (AP) does when it receives an 802.11 frame from a Wi-Fi Multimedia (WMM) client? ()
第16题:
You configure Outlook Web App (OWA) to require SSL.A user named User1 reports that when she connects to OWA, she receives a Web site security certificate warning message.You need to prevent User1 from receiving the warning message when she connects to OWA. What should you do?()
第17题:
A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()
第18题:
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed. A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge Handshake Authentication Protocol (CHAP) for remote connections. CHAP is enabled on Server1. You need to ensure that User1 can connect to Server1 and authenticate to the domain. What should you do from Active Directory Users and Computers?()
第19题:
Your network contains two Web servers named Web1 and Web2. Web1 hosts the companys corporate Web site. Web2 is a test server that contains a copy of the Web site.Users connect to Web1 by using the URL http://www.contoso.com.A Web developer named User1 plans to test updates to the Web site on Web2.You need to ensure that User1 connects to Web2 by using the URL http://www.contoso.com. The solution must ensure that all other computers connect to Web1.What should you do?()
第20题:
In a two-tier configuration, it is recommended to put which of the following components on different nodes?()
第21题:
It terminates the client connection after 10 bad packets and the client cannot reconnect to the same instance.
It terminates the client connection after 10 bad packets but the client can still reconnect, and attempt the same operation again.
It terminates the client connection 10 seconds after receiving a bad packet and the client cannot reconnect to the same instance.
It terminates the client connection after receiving a bad packet and the client can reconnect to the same instance after 10 minutes.
第22题:
Monitor the events in the application log on Server1.
Monitor the events in the security log on Server1.
Monitor the Web server connections on Server1 by using a performance log.
Monitor network traffic to Server1 by using Network Monitor.
Monitor the IIS logs on Server1.
第23题:
The listener hands the connection request directly to a dispatcher.
A dedicated server inherits the connection request from the listener.
The client connects to a dedicated server directly using a protocol address provided by the listener.
The application initiating the session spawns a dedicated server process for the connection request.
The listener issues a redirect message to the client, containing the protocol address of a dispatcher. The client then terminates the network session to the listener and establishes a network session to the dispatcher, using the network address provided in the redirect message.