Network management helps you to(66)the strengths and weaknesses of your network, as well as determine any configuration changes that may be necessary. Any controlled changes to your network and its components-especially configurations, software and(67), c

题目

Network management helps you to(66)the strengths and weaknesses of your network, as well as determine any configuration changes that may be necessary. Any controlled changes to your network and its components-especially configurations, software and(67), can have an effect on its overall efficiency. To maintain control, you need the tools and knowledge to manage all activity that has the potential to affect your(68).

A.see

B.know

C.monitor

D.control


相似考题
参考答案和解析
正确答案:C
解析:Monitor意为“监控”。
更多“Network management helps you to(66)the strengths and weaknesses of your network, as well a ”相关问题
  • 第1题:

    You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()

    A.A

    B.B

    C.C

    D.D


    参考答案:C

  • 第2题:

    You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

    • A、Repeater
    • B、Wireless router
    • C、Hub
    • D、Wireless network adapter

    正确答案:D

  • 第3题:

    You are the administrator of your company’s network. You run the English (US) edition of Windows 2000 Professional on all computers in your network. As your company continues to grow, and the number of computers is continually expanding, you decide that another domain is needed. Management asks you about what is required to accommodate this new domain. What should you answer the Management in this regard? ()

    • A、WINS, DHCP and DNS
    • B、At least one domain controller and one DNS server.
    • C、At least one domain controller, Active Directory and DNS server.
    • D、Nothing more is needed.
    • E、Nothing more is needed, we can just subnet the network.

    正确答案:C

  • 第4题:

    Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()

    • A、When you configure access to the wired network at home, set the wired network adapter location type to Private.
    • B、When you configure access to the wired network at home, set the wired network adapter location type to Public.
    • C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.
    • D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

    正确答案:A,D

  • 第5题:

    You are designing a Windows Server 2008 R2 Hyper-V virtualization environment. Your host servers must have the following elements:  A dedicated management network adapter.A dedicated virtual network for child iSCSI network traffic.A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing.  Which adapters should you choose?()

    • A、three network adapters that support 802.1p
    • B、two network adapters that support 802.1q, and one iSCSI host bus adapter
    • C、two network adapters that support 802.1p, and one network adapter that supports TCP Chimney
    • D、two network adapters that support 802.1q, and one network adapter that supports Jumbo frames

    正确答案:D

  • 第6题:

    You work as the exchange administrator at company.com.the company.com network contains an exchange server 2010 organization.you are responsible for managing the exchange network for company.com.the company.com network contains two mailbox servers named -ex01 and -ex02 as well as a mailbox database named -ex03.-ex01 and -ex02 are members of a database availability group named tkdag and contain a copy of -ex03.during the course of the week you receive an instruction from the cio to remove the -ex03 mailbox database from -ex01.what should you do?()

    • A、your best option would be to use the exchange management console (emc) and then select the remove option on a right-click of the -ex03 database copy on -ex01.
    • B、your best option would be to run clean-mail box database -identity -ex03 on the exchange management shell.
    • C、your best option would be to use the exchange management console (emc) and then select the manage database availability group membership on a right-click on tkdag then you can remove -ex01 from the list.
    • D、your best option would be to run remove-mail box database -identity -ex03/-ex01 from the exchange management shell.

    正确答案:A

  • 第7题:

    You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()

    • A、You should recommend that management make use of DAG network encryption.
    • B、You should recommend that management make use of Encrypted File System (EFS)
    • C、You should recommend that management make use of Windows BitLocker Drive Encryption.
    • D、You should recommend that management make use of Rights Management Service RMS.

    正确答案:C

  • 第8题:

    单选题
    - But , by SWOT?一 It stands for strengths, weaknesses, opportunities and threats.()
    A

    what do you mean

    B

    how do you know

    C

    what is your meaning


    正确答案: C
    解析: 暂无解析

  • 第9题:

    多选题
    You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()
    A

    The switch name must match the workgroup name of the local network.

    B

    The switch must be configured with an IP address and default gateway.

    C

    The remote workstations must have access to the management VLAN of the switch.

    D

    CDP must be enabled on the switch so that it can be located by other devices on the network.


    正确答案: D,B
    解析: 暂无解析

  • 第10题:

    单选题
    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
    A

    STP

    B

    GVRP

    C

    SNMP

    D

    VTP

    E

    DHCP


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()
    A

    You should recommend that management make use of DAG network encryption.

    B

    You should recommend that management make use of Encrypted File System (EFS)

    C

    You should recommend that management make use of Windows BitLocker Drive Encryption.

    D

    You should recommend that management make use of Rights Management Service RMS.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()
    A

    Configure the network category of your wireless network connection to Private.

    B

    Configure the network category of your wireless network connection to Public.

    C

    Configure the TCP/IP packet filtering on the wireless network connection.

    D

    Configure the wireless network connection with the appropriate authentication to the router.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

    • A、STP
    • B、GVRP
    • C、SNMP
    • D、VTP
    • E、DHCP

    正确答案:D

  • 第14题:

    You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()

    • A、The switch name must match the workgroup name of the local network.
    • B、The switch must be configured with an IP address and default gateway.
    • C、The remote workstations must have access to the management VLAN of the switch.
    • D、CDP must be enabled on the switch so that it can be located by other devices on the network.

    正确答案:B,C

  • 第15题:

    You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

    • A、Disable the Connect even if the network is not broadcasting option.
    • B、In the Network and Sharing Center window, click the Diagnose and repair option.
    • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
    • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

    正确答案:D

  • 第16题:

    You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()

    • A、You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.
    • B、You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.
    • C、You should recommend that Windows Remote Management (WinRM) over SSL be used.
    • D、You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.

    正确答案:C

  • 第17题:

    You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()

    • A、Restart the computer in the docking station.
    • B、Run the Add/Remove Hardware wizard.
    • C、Use Device Manager to scan for hardware changes.
    • D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.
    • E、Install the new network adapter driver.

    正确答案:B,E

  • 第18题:

    You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. All servers on the TestKing.com network are configured to run Exchange Server 2010.At present the network is separated from the Internet by means of a firewall. You receive an instructionform management to ensure that customers from the Internet to use Outlook Anywhere, Outlook Web App(OWA), Exchange ActivSync as well as IMAP4 over Secure Sockets Layer (SSL). You thus need todetermine the TCP ports that you need to open. What should you do?()

    • A、You should consider opening port 25, port 80, port 143 as well as port 3269.
    • B、You should consider opening port 25, port 443 as well as port 993.
    • C、You should consider opening port 80, port 143, port 443 as well as port 389.
    • D、You should consider opening port 26, port 443 as well as port 995.

    正确答案:B

  • 第19题:

    You are the administrator of Etechsol.com Enterprises. Your company consists of a small 20-user network. Management has decided to upgrade all computers to Windows 2000.   After having a closer examination of your company’s network, you realize that only half of the network interface cards are Net PC compliant. You decide to create Windows 2000 remote boot floppies.  What executable is used for creating RIS boot disks for non-PXE compliant clients?()

    • A、RBFG*EXE
    • B、RIPREP*EXE
    • C、RIS*EXE
    • D、RISPXE*EXE
    • E、RISBOO*EXE

    正确答案:A

  • 第20题:

    单选题
    You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()
    A

    You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.

    B

    You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.

    C

    You should recommend that Windows Remote Management (WinRM) over SSL be used.

    D

    You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You are designing a Windows Server 2008 R2 Hyper-V Virtualization environment. Your host servers must have the following elements: - A dedicated management network adapter. - A dedicated virtual network for child iSCSI network traffic. - A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()
    A

    Two network adapters that support 802.1p, and one iSCSI host bus adapter

    B

    Two network adapters that support 802.1p, and one network adapter that supports TCP Chimney

    C

    Two network adapters that support 802.lq, and one network adapter that supports Jumbo frames

    D

    Three network adapters that support 802. 1p


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    You have a Windows Server 2008 R2 Hyper-V server with a single network adapter that is connected to a virtual network. The virtual network is configured as External. Virtual machines (VMs) running on the server are not able to communicate with the host server over the network. You need to ensure that VMs running on the server are able to communicate with the host server over the network.  In Virtual Network Manager,what should you do?()
    A

    Select the Internal only connection type.

    B

    Select the Private virtual machine network connection type.

    C

    Select the Allow management operating system to share this network adapter check box.

    D

    Clear the Allow management operating system to share this network adapter check box.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    The company has a Windows 2008 Active Directory-based network.The network contains an Exchange Server 2003 organization.The management instructs you to deploy Exchange Server 2010 in your network.You decide to prepare the schema and domain first.Which of the following commands should you run prior to performing the normal schema and domain preparation?()
    A

    Setup /PrepareSchema

    B

    Setup /PrepareLegacyExchangePermissions

    C

    Setup /PrepareAD

    D

    Setup /PrepareLegacyExchangePermissions:child.Xxx


    正确答案: B
    解析: 暂无解析