The company network is in the process of migrating the IP address scheme to use IPv6. Which of the following address types are associated with IPv6?()
第1题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()
A.A
B.B
C.C
D.D
第2题:
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()
A.Campus
B.Teleworker
C.Branch
D.Data center
第3题:
Jitter is causing problems with the VOIP application in the Company network. What causes network jitter?()
第4题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()
第5题:
The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management domain?()
第6题:
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
第7题:
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()
第8题:
You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()
第9题:
Configure the NWLink frame type of the network adapters to be ethernet 802.3.
Configure the NWLink frame type of the network adapters to be ethernet II.
Replace the network adapters with 10/100 BNC adapters.
Replace the network adapters with 10/100 UTP network adapters.
第10题:
The Connection should be set to Host for the network interface card.
The Connection should be set to None for the network interface card.
You should choose the Not connected option for each virtual machine.
The Enable virtual LAN identification option should be enabled for each virtual machine.
第11题:
Enable VTP pruning on any switch in the management domain
Enable VTP pruning on any client switch in the domain
Enable VTP pruning on a VTP server in the management domain
Enable VTP pruning on every switch in the domain
None of the other alternatives apply
第12题:
Create an IPsec Enforcement Network policy
Create an 802.1X enforcement network policy
Create a wired network (IEEE 802.3) Group Policy
Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
第13题:
A ______ system placed between the company network and the outside world may limit outside access to the internal network.
A.firewall
B.modem
C.gateway
D.key
第14题:
VOIP is being implemented on the Company network. In a properly designed network, what is the maximum amount of time a voice package should spend crossing a network? ()
第15题:
A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?()
第16题:
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
第17题:
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
第18题:
What must be done in order to automatically close the purchase requisition (PR) after one or more purchase orders (PO) have been created? ()
第19题:
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()
第20题:
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()
第21题:
WEP encryption
Channel rotation
Disable SSID
WPA encryption
第22题:
the business knowledge of the IT staff
the technical knowledge of the IT staff
the company’s business objectives
the company’s network topology
the IT future directions
第23题:
You should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.
You should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.
You should consider having the new server joined to an Active Directory domain.
You should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.
第24题:
Coaxial
CAT3
CAT5
CAT5e