Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C
第1题:
In a high-availability network, which command, when placed on ports that have connected end stations, will allow you to prevent delays in service for end stations by placing a port in blocking mode?()
第2题:
Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()
第3题:
You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()
第4题:
Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()
第5题:
The % Disk Time counter for the PhysicalDisk performance object
The Current Disk Queue Length counter for the PhysicalDisk performance object
The Free Megabytes counter for the LogicalDisk performance object
The Disk Transfers/sec counter for the LogicalDisk performance object
第6题:
Use Windows Explorer to receive the offline files
Using the Windows Explorer, disable the cache for the reports on the network share
Use the Windows NT explorer to grant the special access for the reports on the network share
Use the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
第7题:
Reconfigure the dial-up connection to dial-up to a private network.
Create another connection that uses a virtual private network (VPN) to connect a private network though the Internet.
Configure Internet Explorer to automatically detect proxy settings.
Configure Internet Explorer to dial whenever a network connection is not present.
第8题:
Create an IPsec Enforcement Network policy
Create an 802.1X enforcement network policy
Create a wired network (IEEE 802.3) Group Policy
Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
第9题:
Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS).
Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).
Add a script to the users' desktops that changes the IP configuration between dynamic and manual.
Configure the IP properties of the portable computers so that they have an alternate configuration.
第10题:
A technician at a company providing online, real-time media streaming to the Internet needs a network technology that will reduce bandwidth while delivering high throughput. Which of the following can the technician implement to fit these requirements?()
第11题:
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()
第12题:
You administer Company's network that consists of 100 Windows 2000 Professional computers and nine Windows 2000 Server computers. All users at Company save their work files in home folders on a network server. The network server is configured with two NTFS volumes. One of the NTFS volumes contains the home folders for the users at Company and the other NTFS volume contains a shared folder named PROGRESS, which is used for users to save temporary work files in. Disk quotas and Encrypting File System (EFS) is enabled on the NTFS volume with the home folders. All users have a default limit of 100 MB and the option to deny space to users who exceed their limit has been enabled. A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder. The user currently has no data stored in the PROGRESS folder. When he attempts to save files to his home folder, he receives the following error message: "Insufficient disk space." Other users are not experiencing this problem with their home folders. You want to allow the user to save files on the network server. What should you do?()
第13题:
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()
第14题:
Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
Use class-based policing to limit the peer-to-peer traffic rate.
Use class-based shaping to delay any excessive peer-to-peer traffic.
第15题:
Create an Ipsec enforcement network policy.
Create an 802.1xenforcemen tnetwork policy.
Createa wired network(IEEE802.3)Group policy.
Create an extensible authentication protocol(EAP)enforcement network policy.
第16题:
Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the UDPv4 object is high.
Use System Monitor and configure it to monitor the Segments/sec counter in the TCPv4 object.
Use System Monitor and configure it to monitor the Datagrams/sec counter in the UDPv4 object.
Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the TCPv4 object is high.
第17题:
Configure the system event log to Do not overwrite.
In IAS, in Remote Access Logging, enable the Authentication requests setting.
Configure the Remote Access server to Log all events.
Create a custom remote access policy and configure it for Authentication-Type.
第18题:
Monitor the events in the application log on Server1.
Monitor the events in the security log on Server1.
Monitor the Web server connections on Server1 by using a performance log.
Monitor network traffic to Server1 by using Network Monitor.
Monitor the IIS logs on Server1.