You are working as a network technician at Ezonexam University, when you get a call from the Engineering Faculty. They're complaining that they're receiving obsolete information from the Business Faculty's network traffic broadcasts.
What can you do to contain the Business Faculty's broadcast while still keeping it connected to the internet and the enterprise services of the University? (Select all valid answer choices)
A. Use half and full-duplex Ethernet on the Engineering Department LAN
B. Establish a VTP domain to minimize the obsolete traffic
C. Change the switch IP address of the switch
D. Create separate VLANs and subnets for the two departments and route between the two
E. Provide greater bandwidth to the Engineering Department LAN
F. Place the business department on a separate subnet and route between networks
第1题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()
A.A
B.B
C.C
D.D
第2题:
第3题:
第4题:
第5题:
Do you need any rice? I can get some() you()the supermarket.
第6题:
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()
第7题:
You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()
第8题:
You deploy a Hyper-V host and you convert the Web servers to VMs. You discover that when users transfer large data files from the Web servers, the CPU utilization of the host exceeds acceptable limits. You need to recommend a solution to reduce the CPU utilization associated to network traffic. The solution must meet the company’s business requirements. What should you recommend implementing?()
第9题:
You are a network administrator for ExamSheet.net's Windows 2000 network. Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully. What should you do? ()
第10题:
Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()
第11题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address. What should you do?()
第12题:
An increased need for specialized IT silos
Protecting the business from information outages
IT systems grow fast
Optimizing the efficiency with which IT operates
第13题:
You‘re working at TestKing as a network administrator when your MCSE assistant calls you for help. He has attempted to configure Router TK1 and incorrectly configured the router interface with a subnet broadcast address. You have to correct this by first removing the incorrect IP address and then re-entering the first usable IP address of the same subnet.How will you do this?()
A.
B.
C.
D.
E.
第14题:
第15题:
第16题:
第17题:
You are using VTP version 2 in your network to transport VLAN information between switches. When adding a switch to the network that has been used in the lab previously, you notice that a lot of the existingVLANs have been deleted or replaced with other names. What can you do to prevent this from happeningin the future, without losing all VTP features that you are using today?()
第18题:
You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()
第19题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1. What should you do?()
第20题:
You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()
第21题:
You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What should you do? ()
第22题:
You have a portable computer that runs Windows XP Professional. When the computer is disconnected from the network, you receive a message in the notification area that says you are working offline. The message reappears every hour. You need to prevent the message from appearing while you are working offline. What should you modify?()
第23题:
You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()