Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network.The network administrator connected to console port,issued the show ip route command,and was able to ping the server.Based on the output of the show ip route command topology shown in the graphic,what is the cause of the failure?()

A.IP routing is not enabled
B.A static route is configured incorrectly
C.The network has not fully converged
D.The FastEthernet interface on Coffee is disabled
E.The routing table on Coffee has not updated
F.The neighbor relationship table is not correctly updated
第1题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第2题:
On a Windows network, users are reporting that they cannot access any network resources. The users can ping the IP address and connect to the network resource using the IP address. Which of the following is the cause of the problem?()
第3题:
Your network consists of two subnets named Subnet1 and Subnet2. You have a server named Server1 that runs Windows Sever 2003 Service Pack 2 (SP2). Server1 is located on Subnet1. Users from Subnet1 report poor performance when they connect to Server1. Users from Subnet2 report that they are unable to connect to Server1.You monitor both network segments and discover a large number of NetBIOS broadcasts on both network segments.You need to reduce the number of broadcasts on the network. What should you deploy?()
第4题:
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do( )?
第5题:
Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site. The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network. You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server. What should you include in the plan?()
第6题:
Your network consists of two subnets named Subnet1 and Subnet2. You have a server named Server1 that runs Windows Sever 2003 Service Pack 2 (SP2). Server1 is located on Subnet1. Users from Subnet1 report poor performance when they connect to Server1. Users from Subnet2 report that they are unable to connect to Server1. You monitor both network segments and discover a large number of NetBIOS broadcasts on both network segments. You need to reduce the number of broadcasts on the network. What should you deploy?()
第7题:
Default gateway
The ports on the switch
Port security on the server's switch port
Ethernet cable
第8题:
Enable access-based enumeration (ABE) on the share.
Assign the Read NTFS permission to the Domain Users group.
From the Network and Sharing Center, enable public folder sharing.
From the File Sharing Wizard, configure the Read permission level for the Domain Users group.
第9题:
On router R2, configure a default static route to the 192.168.1.0 network.
On router R2, configure DNS to resolve the URL assigned to Web Server 2 to the 192.168.1.10 address.
On router R1, configure NAT to translate an address on the 209.165.100.0/24 network to 192.168.1.10.
On router R1, configure DHCP to assign a registered IP address on the 209.165.100.0/24 network to Web Server 2.
第10题:
Use Windows Backup to archive and remove old files on the server.
Increase the server’s disk quota entry for the user to accommodate the additional files.
Log on to the network as a Recovery Agent.Decrypt all of the user’s files in his home folder.
Log on to the network by using the domain Administrator account.Grant the user Full Control permission to his home folder.
第11题:
Configure the system event log to Do not overwrite.
In IAS, in Remote Access Logging, enable the Authentication requests setting.
Configure the Remote Access server to Log all events.
Create a custom remote access policy and configure it for Authentication-Type.
第12题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第13题:
A gateway machine has access to the Internet and is trying to reach a machine on the Internet called cactus.org. Although the gateway machine cannot reach cactus.org, another network across town is able to reach cactus.org. Furthermore, the gateway machine can reach the network across town, but cannot ping the cactus.org. Which of the following tools will best help diagnose the location of the problem?()
第14题:
You are the network administrator for The network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is exposed to the Internet. You are deploying 10 Windows Server 2003 computers as Web servers. The servers will be located in the perimeter network. The servers will host only publicly available Web pages. You want to reduce the possibility that users can gain unauthorized access to the servers. You are concerned that a user will probe the Web servers and find ports or services to attack. What should you do?()
第15题:
Your network contains 20 subnets. You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has an IP address of 192.168.10.10 and is located on a subnet named Subnet10. All client computers run Windows XP Professional Service Pack 3 (SP3). Users on a subnet named Subnet1 report that they cannot connect to Server1. Users on Subnet10 report that they can connect to Server1.You log on to a computer on Subnet1. You need to identify the point of failure on the network. Which command should you run?()
第16题:
You are the administrator of Company.com’s network. Your network has 100 Windows 2000 Professional computers and 10 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. In addition, the network servers is configured with disk quotas for the NTFS volume that contains the home folders. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder. When he attempts to save files to the folder, he receives the following error message: “Insufficient disk space.” Other users are not experiencing this problem with their home folders. You want to enable the user to save files in his home folder. What should you do?()
第17题:
You are a network administrator for your company. The network contains a Windows Server 2003 computer named Server1. Server1 has a single CPU, 512 MB of RAM, and a single 100-Mb network adapter. All network users’ home folders are stored on Server1. Users access their home folders by using a mapped network drive that connects to a shared folder on Server1. After several weeks, users report that accessing home folders on Server1 is extremely slow at certain times during the day. You need to identify the resource bottleneck that is causing the poor performance. What should you do? ()
第18题:
The file server is offline.
The DNS server is not resolving correctly.
The DHCP server is not assigning correct IP addresses.
The domain controller is not responding.
第19题:
Default gateway
The ports on the switch
Port security on the servers switch port
Ethernet cable
第20题:
Create a network policy for VPN connections. Modify the Day and time restrictions.
Create a network policy for VPN connections. Apply an IP filter to deny access to the corporate network.
Modify the Logon hours for all user objects to specify only the VPN server on the Computer restrictions option.
Modify the Logon Hours for the default domain policy to enable the Force logoff when logon hours expire option.
第21题:
Check the application log on the Web server.
Use Network Monitor to capture network traffic on the Web server.
Review the log files created by IIS on the Web server.
Configure a performance log to capture all Web service counters. Review the performance log data.
第22题:
a DHCP Relay Agent
a WINS server
Connection Point Services(CPS)
Simple TCP/IP Services on all computers