You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)
A. no single point of failure
B. determine which protocol to use
C. trading database server location
D. deterministic response to all failures
第1题:
Your customer wants to build a network for a financial trading floor that has a requirement for multiple high-value transactions, which are also vital to the customer. What are the two most critical requirements? ()(Choose two.)
第2题:
As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()
第3题:
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
第4题:
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
第5题:
You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()
第6题:
You are a network administrator for ExamSheet.net's Windows 2000 network. Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully. What should you do? ()
第7题:
You need to recommend the server configurations for the new failover cluster. The configurations must support the company's planned changes Which two actions should you recommend?()
第8题:
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
第9题:
no single point of failure
trading database server location
redundant application servers location
deterministic response to all failures
determine which protocol to use
第10题:
STP
GVRP
SNMP
VTP
DHCP
第11题:
Use Windows Explorer to receive the offline files
Using the Windows Explorer, disable the cache for the reports on the network share
Use the Windows NT explorer to grant the special access for the reports on the network share
Use the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
第12题:
no single point of failure
determine which protocol to use
trading database server location
deterministic response to all failures
第13题:
You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. You have enabled Internet connection sharing. You do not want to initiate this connection automatically when a request for Internet reaches your computer. What should you do? ()
第14题:
You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions. And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)
第15题:
As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)
第16题:
You are the administrator of your company’s network. You run the English (US) edition of Windows 2000 Professional on all computers in your network. As your company continues to grow, and the number of computers is continually expanding, you decide that another domain is needed. Management asks you about what is required to accommodate this new domain. What should you answer the Management in this regard? ()
第17题:
You are the administrator of Company.com’s Windows 2000 Network. Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer. You want to complete the configuration to allow the computers to communicate on the network. What should you do?()
第18题:
You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()
第19题:
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()
第20题:
You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()
第21题:
Only use fiber in pairs.
Configure root guard on your switches.
Do not use fiber but use copper.
Configure UDLD to prevent one-way link conditions.
第22题:
When you configure access to the wired network at home, set the wired network adapter location type to Public.
When you configure access to the wired network at home, set the wired network adapter location type to Private.
When you configure access to the public wireless access points, set the wireless network adapter location type to Public.
When you configure access to the public wireless access points, set the wireless network adapter location type to Private.
第23题:
It provides reliable input for verifying network consistency.
It requires a network audit to support some upgrade decisions.
It requires a network audit to support any network restructuring.
It begins with gathering organizational input that may be inaccurate.