●WWW is a large network of Internet servers providing (75) and other services to terminals running client applications such as a browser.(75)A.modemB.compressionC.hypertextD.encode

题目

●WWW is a large network of Internet servers providing (75) and other services to terminals running client applications such as a browser.

(75)A.modem

B.compression

C.hypertext

D.encode


相似考题
参考答案和解析
正确答案:C
更多“●WWW is a large network of Internet servers providing (75) and other services to terminals ”相关问题
  • 第1题:

    WWW is a large network of Internet servers providing (75) and other services to terminals running client applications such as a browser.

    A.modem

    B.compression

    C.hypertext

    D.encode


    正确答案:C
    万维网是一个大型的因特网络,它通过在终端运行客户端应用程序(如浏览器)来提供超文本及其他服务。

  • 第2题:

    WWW is a large network of Internet servers providing ______ and other services to terminals running client applications such as a browser.

    A.modem
    B.compression
    C.hypertext
    D.encode]

    答案:C
    解析:
    WWW由很多互联网服务器组成的一个大型网络,它向装有浏览器等客户端应用程序的终端提供了超文本等服务。

  • 第3题:

    IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.

    A.pubic]
    B.private]
    C.personal
    D.proper

    答案:B
    解析:

  • 第4题:

    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are 10 servers, and Windows Server 2008 is run by the servers. TheWeb Server (IIS) server role is installed on the servers. The servers are configured as members of a Webserver farm. The same Web site is hosted by the servers. The servers should be configured and the requirements listed below should be met. First, you should permit the Web server configurations changesthat are made on one server to be made on all servers in the farm. Second, administrative effort should becut to the least to perform the configuration changes. Which action should be performed to meet the requirements?()

    • A、A DFS Namespace should be created. And then, the Inetpub folder should be configured as the target of the DFS Namespace on each server.
    • B、On all servers,the Shared Configuration settings should be configured.
    • C、On one server,the Shared Configuration setting should be configured.
    • D、On one server,a scheduled task that copies the Intepub folder to the other servers should be created.

    正确答案:B

  • 第5题:

    Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()

    • A、Implement Network Policy and Access Services (NPAS).
    • B、Implement Active Directory Federation Services (AD FS).
    • C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.
    • D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

    正确答案:D

  • 第6题:

    Your network consists of a single Active Directory site that includes two network segments. Thenetwork segments connect by using a router that is RFC 1542 compliant. You plan to use Windows Deployment Services (WDS) to deploy Windows Server 2008 R2 servers. All new servers support Pre-Boot Execution Environment (PXE).  You need to design a deployment strategy to meet the following requirements: èSupport Windows Server?2008 R2   èDeploy the servers by using WDS in both network segments èMinimize the number of servers used to support WDS What should you include in your design?() 

    • A、Deploy one server. Install WDS and DHCP on the server. Configure the IP Helper tables on therouterbetween the network segments.
    • B、Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 60.
    • C、Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 252.
    • D、Deploy two servers. Install WDS and DHCP on one server. Install DHCP on the other server. Place one server on each of the network segments. Configure both servers to support DHCP option60.

    正确答案:A

  • 第7题:

    You need to design a strategy for providing e-mail access to the subsidiary users. What should you do?()

    • A、Deploy POP3 and IMAP4 services on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of POP3, IMAP4, and SMTP only
    • B、Deploy Microsoft Outlook Web Access on Exchange mailbox servers. Make the mailbox servers accessible from the Internet by means of HTTPS and SMTP only
    • C、Deploy Microsoft Outlook Web Access on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of HTTPS only
    • D、Deploy an additional Exchange mailbox server that contains all subsidiary mailboxes. Deploy Microsoft Outlook Web Access on the server. Make the server accessible from the Internet by means of HTTPS only

    正确答案:C

  • 第8题:

    Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()

    • A、Implement Network Policy and Access Services (NPAS).
    • B、Implement Active Directory Federation Services (AD FS).
    • C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.
    • D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

    正确答案:D

  • 第9题:

    多选题
    Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.  Certkiller .com requires every server in the company to access Internet.  Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.  Which two actions should you perform to achieve this task()
    A

    Trigger the Virtual DHCP server for the external virtual network and run  ipconfig/renew command on each virtual server

    B

    On CKT’s physical network interface, activate the Internet Connection Sharing (ICS)

    C

    Use Certkiller .com intranet IP addresses on all virtual servers on CKT.

    D

    Add and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.

    E

    None of the above


    正确答案: D,E
    解析: 暂无解析

  • 第10题:

    单选题
    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server in your company. Windows Server 2008 is run by the serverand the server has the Hyper-V server role installed.A new virtual machine is created. You are required to configure the virtual machine, and the requirements listed below should be satisfied.First, network communications should be permitted between the virtual machine and the host system.Second, communications should be prevented with other network servers. To achieve the goal,which action should be performed first?()
    A

    To achieve the goal, the Connection should be set to None for the network interface card.

    B

    To achieve the goal, the Microsoft Loopback Adapter should be installed.

    C

    To achieve the goal, a new Virtual Network should be created.

    D

    To achieve the goal, Internet Connection Sharing (ICS) should be enabled.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers.  All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements:.Ensure that users can send encrypted messages to any other organization on the Internet  .Ensure that all Exchange-related communication between Hub Transport servers and Edge Transportservers is encrypted What should you recommend?()
    A

    Deploy IPsec.

    B

    Deploy SMTP over SSL.

    C

    Implement Domain Security.

    D

    Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    You are the network administrator for TestKing. Your network consists of a single Active Directory domain. You manage a Terminal Server farm that includes five terminal servers and a Terminal Services Licensing server named testking9. All servers run Windows 2000 Server. There are 2,500 users who log on to the terminal servers to access a custom human resource (HR) application. You install Windows Server 2003 on a new server named testking10. Testking10 is configured with all default settings enabled. You install Terminal Services and the HR application on testking10. You instruct some users to access the HR application on testking10. Four months later, users report that they can no longer establish Terminal Services sessions to testking10. You verify that users can connect to the other terminal servers in your Terminal Server farm. You need to ensure that users can run the HR application on all terminal servers on the network. What should you do?()
    A

    On testking10, set the License Logging service to Automatic, and the start the service.

    B

    On testking10, install Terminal Service Licensing. Activate the Terminal Services Licensing server.

    C

    Install Windows Server 2003 on all domain controllers on the network.

    D

    Deactivate and activate Terminal Service Licensing on Testking9.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You are the administrator of a Windows 2000 Network for Ezonexam Inc. The network includes four Web servers named WWW1, WWW2, WWW3, and WWW4. Your network also includes a Windows 2000 Server computer that uses DNS.

    Each Web server contains exactly the same content, and users accessing www.Ezonexam.com can be directed to any one of them.

    You add records to your DNS server, as shown in the following table.

    Record type Name IP address

    CNAME www 192.168.10.5

    CNAME www 192.168.10.6

    CNAME www 192.168.10.7

    CNAME www 192.168.10.8

    When you examine the logs for the Web servers, you discover that all incoming traffic is being directed to 192.168.10.5, which is the IP address for WWW1.

    You want the incoming traffic to be balanced across the four Web servers. What should you do?

    A.Select the Disable recursion check box in the properties of the DNS server.

    B.Enable round-robin in the properties of the DNS server.

    C.Enable W3C logging in the properties of the Web servers.

    D.Install and configure Network Load Balancing on WWW1.


    正确答案:B
    解析:Explanation: By enabling round robin the DNS server will start to rotate between the CNAME records when it resolves the host name www. This will result in load balancing between the web servers.

    Incorrect Answers
    A: Disabling recursion would prevent the local DNS server from using other DNS servers. It would not be helpful in configuring load balancing.
    Note: A DNS server can query or contact other DNS servers on behalf of the requesting client to fully resolve the name, and then send an answer back to the client. This process is known as recursion.

    C: W3C logging would enhance the logging that takes place. This could be useful of security reasons. It would not be helpful for load balancing purposes.

    D: Load Balancing must be configured on all the servers that should be load balanced.

  • 第14题:

    WWW is a large network of Internet servers providing______and other services to terminals running client applications such as a browser.

    A.modem
    B.compression
    C.hypertext
    D.encode

    答案:C
    解析:
    WWW由很多互联网服务器组成的一个大型网络,它向装有浏览器等客户端应用程序的终端提供了超文本等服务。

  • 第15题:

    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. Windows Server 2008 is run by your company named Wiikigo, Ltd. A Webserver named S01 is administered by you. Internet users utilize http://www.wiikigo.com and https://www.wiikigo.com to get access to S01. An SSL certificate from a public certification authority (CA) is utilized bythe S01 server. An additional Web server named S02 is installed. A Network Load Balancing cluster isconfigured to distribute the incoming HTTP and HTTPS traffic between both Web servers. Since you arethe technical support, you are required to have an SSL certificate configured on S02 to support HTTPSconnections. In addition, you should make sure all users are able to access https://www.wiikigo.com with nosecurity warnings received. Which action should be performed to achieve the goal?()

    • A、A new SSL certificate should be requested from the public CA. and then, S02 should be utilized as theCommon Name in the request. At last, the new certificate should be installed on S02.
    • B、The Internet Information Services (IIS) Manager console on S02 should be opened. And then, a self-signed certificate should be created.
    • C、The Internet Information Services (IIS) Manager console on S01 should be opened. And then, the SSLcertificate should be exported to a .pfx file. At last, the .pfx file should be imported to S02.
    • D、The Certificates snap-in should be opened on S01. And then, the SSL certificate should be exported to a .cer file. At last, the .cer file should be imported to S02.

    正确答案:C

  • 第16题:

    How does network integration help businesses keep pace with changing network demands?()

    • A、 addition of strict firewalls
    • B、 limiting Internet access
    • C、 intelligence on foundation network devices
    • D、 increased use of network services

    正确答案:D

  • 第17题:

    Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers.  All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements: .Ensure that users can send encrypted messages to any other organization on the Internet  .Ensure that all Exchange-related communication between Hub Transport servers and Edge Transport servers is encrypted What should you recommend?()

    • A、Deploy IPsec.
    • B、Deploy SMTP over SSL.
    • C、Implement Domain Security.
    • D、Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).

    正确答案:D

  • 第18题:

    You are the network administrator for The network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is exposed to the Internet. You are deploying 10 Windows Server 2003 computers as Web servers. The servers will be located in the perimeter network. The servers will host only publicly available Web pages. You want to reduce the possibility that users can gain unauthorized access to the servers. You are concerned that a user will probe the Web servers and find ports or services to attack. What should you do?()

    • A、Disable File and Printer Sharing on the servers.
    • B、Disable the IIS Admin service on the servers.
    • C、Enable Server Message Block (SMB) signing on the servers.
    • D、Assign the Secure Server (Require Security) IPSec policy to the servers.

    正确答案:A

  • 第19题:

    You are a Windows Server 2008 systems administrator responsible for providing access to a large volumeof video files to registered users of your organization??s public Web site. All the video files are located within the D:///Public/Videos folder. Content producers often create and modify these videos. Recently, usershave complained that they are experiencing poor performance when accessing videos during busy times.During these images, the Windows Media Services server that hosts the content is experiencing high CPUand network bandwidth use. You want to minimize the administrative time and effort required to increaseperformance. Which of the following actions should you take to resolve the problem?()

    • A、Copy the training videos to another folder on the Windows Media Services server.
    • B、Install the Streaming Media Services server role on additional servers, and configure them as cachingservers.
    • C、Install the Streaming Media Services server role on additional servers, and configure them as proxyservers.
    • D、Enable the Limit Outgoing Distribution Connections option in the properties of the publishing point.

    正确答案:B

  • 第20题:

    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server in your company. Windows Server 2008 is run by the serverand the server has the Hyper-V server role installed.A new virtual machine is created. You are required to configure the virtual machine, and the requirements listed below should be satisfied.First, network communications should be permitted between the virtual machine and the host system.Second, communications should be prevented with other network servers. To achieve the goal,which action should be performed first?()

    • A、To achieve the goal, the Connection should be set to None for the network interface card.
    • B、To achieve the goal, the Microsoft Loopback Adapter should be installed.
    • C、To achieve the goal, a new Virtual Network should be created.
    • D、To achieve the goal, Internet Connection Sharing (ICS) should be enabled.

    正确答案:C

  • 第21题:

    单选题
    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. Windows Server 2008 is run by your company named Wiikigo, Ltd. A Webserver named S01 is administered by you. Internet users utilize http://www.wiikigo.com and https://www.wiikigo.com to get access to S01. An SSL certificate from a public certification authority (CA) is utilized bythe S01 server. An additional Web server named S02 is installed. A Network Load Balancing cluster isconfigured to distribute the incoming HTTP and HTTPS traffic between both Web servers. Since you arethe technical support, you are required to have an SSL certificate configured on S02 to support HTTPSconnections. In addition, you should make sure all users are able to access https://www.wiikigo.com with nosecurity warnings received. Which action should be performed to achieve the goal?()
    A

    A new SSL certificate should be requested from the public CA. and then, S02 should be utilized as theCommon Name in the request. At last, the new certificate should be installed on S02.

    B

    The Internet Information Services (IIS) Manager console on S02 should be opened. And then, a self-signed certificate should be created.

    C

    The Internet Information Services (IIS) Manager console on S01 should be opened. And then, the SSLcertificate should be exported to a .pfx file. At last, the .pfx file should be imported to S02.

    D

    The Certificates snap-in should be opened on S01. And then, the SSL certificate should be exported to a .cer file. At last, the .cer file should be imported to S02.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are 10 servers, and Windows Server 2008 is run by the servers. TheWeb Server (IIS) server role is installed on the servers. The servers are configured as members of a Webserver farm. The same Web site is hosted by the servers. The servers should be configured and the requirements listed below should be met. First, you should permit the Web server configurations changesthat are made on one server to be made on all servers in the farm. Second, administrative effort should becut to the least to perform the configuration changes. Which action should be performed to meet the requirements?()
    A

    A DFS Namespace should be created. And then, the Inetpub folder should be configured as the target of the DFS Namespace on each server.

    B

    On all servers,the Shared Configuration settings should be configured.

    C

    On one server,the Shared Configuration setting should be configured.

    D

    On one server,a scheduled task that copies the Intepub folder to the other servers should be created.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    What are three advantages of VLANs?()
    A

    VLANs establish broadcast domains in switched networks.

    B

    VLANs utilize packet filtering to enhance network security.

    C

    VLANs provide a method of conserving IP addresses in large networks.

    D

    VLANs provide a low-latency internet working alternative to routed networks.

    E

    VLANs allow access to network services based on department, not physical location.

    F

    VLANs can greatly simplify adding, moving, or changing hosts on the network.


    正确答案: E,A
    解析: 暂无解析