网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

TestKing has 25 computers and decides to connect the network to the Internet.TestKing would like for all of the computers to have access to the Internet at the same time, but TestKing only has four usable publicly routable IP addresses.What should be configured on the router so that all computers can connect to the Internet simultaneously?()

  • A、Static NAT
  • B、Global NAT
  • C、Dynamic NAT
  • D、Static NAT with ACLs
  • E、Dynamic NAT with overload

参考答案

更多 “TestKing has 25 computers and decides to connect the network to the Internet.TestKing would like for all of the computers to have access to the Internet at the same time, but TestKing only has four usable publicly routable IP addresses.What should be configured on the router so that all computers can connect to the Internet simultaneously?()A、Static NATB、Global NATC、Dynamic NATD、Static NAT with ACLsE、Dynamic NAT with overload” 相关考题
考题 ●Which one of these statements about connecting to the Internet is true? (68) .(68) A.The Internet can only be used to link computers with same operating systemB.The Internet can be used to connect computers with different ISPC.You must have a telephone line to connect to the InternetD.You must have a modem to connect to the Internet

考题 Which of the following statements about internet is (are) correct?Ⅰ.Each host in internet only has a IP address.Ⅱ.It is possible to have multiple names corresponding to the same IP address.Ⅲ.In users' points, Internet means a virtual network.A.NoneB.Ⅰ and ⅡC.Ⅱ and ⅢD.All

考题 Which one of these statements about connecting to the Internet is true?(68).A.The Internet can only be used to link computers with same operating systemB.The Internet can be used to connect computers with different ISPC.You must have a telephone line to connect to the InternetD.You must have a modem to connect to the Internet

考题 Which one of these statements about connecting to the Internet is true?(76)A.You must have a modem to connect to the InternetB.You must have a telephone line to connect to the InternetC.The Internet can be used to connect computers with different ISPD.The Internet can only be used to link computers with same operating system

考题 ● Traditional Internet access methods like dial-up were so slow that host computers wereconnected to the dial-up (71) at the customer premise over slow (72) ports. PPP wasdesigned to run directly over these serial links. But with the advent of broadband Internet (73)technologies such as ADSL and cable modems there has been a considerable increase in thebandwidth delivered to the end users. This means that the host computers at the customerpremise connect to the (74) or cable "modem" over a much faster medium such as Ethernet.It also means that multiple (75) can connect to the Internet through the same connection.

考题 Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()

考题 You are the network administrator for The network consists of a single IP subnet. All servers are Windows Server 2003. All client computers run Windows XP Professional.The corporate firewall blocks all requests from the local client computers to port 80 in the Internet. Requests sent over port 443 are allowed through the firewall. Server computers can communicate by using port 80 are 443 to the Internet.You need to install Software Update Services (SUS) on a computer named Testking5. Testking5 has limited hard drive space and stores a minimal amount of information daily. Client computers must install Microsoft critical updates.You need to ensure that Testking5 does not run out of hard drive space after the installation of SUS.What should you do?()A. On Testking5, clear the selection of all locales not used on your network.B. On Testking5, select the option to maintain the updates on a Windows Update server.C. Modify the default home page for all client computers to https://windowsupdate.microsoft.com.D. Modify the proxy server setting for all client computers to http://testking5.

考题 A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()A. Install anti-virus software on the student computers.B. Put the faculty computers in a separate VLAN.C. Power down the switches that connect to faculty computers when they are not in use.D. Remove the student computers from the network and put them on a peer-to-peer network.E. Create an access list that blocks the students from the Internet where the hacking tolls are located.

考题 TestKing has 25 computers and decides to connect the network to the Internet.TestKing would like for all of the computers to have access to the Internet at the same time, but TestKing only has four usable publicly routable IP addresses.What should be configured on the router so that all computers can connect to the Internet simultaneously?()A. Static NATB. Global NATC. Dynamic NATD. Static NAT with ACLsE. Dynamic NAT with overload

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange 2010 environment. The employees of TestKing.comuse Microsoft Outlook 2003 to connect to their Mailboxes. You have received instructions from the CIO tochange the network to Exchange Server 2010. However, the CIO wants you to propose a solution for Mailboxes access that will keep the support and software cost to a minimum as well as ensuring access tothe public folders. What should you do?()A、This can be accomplished using Personal Archive and forms-based authentication.B、This can be accomplished by upgrading all client computers to Outlook 2010 and use Autodiscover.C、This can be accomplished using Outlook Anywhere and changin the Outlook RPC encryption settings.D、This can be accomplished using using POP3 and IMAP4 access.

考题 Your company has 250 client computers connected to the office LAN. The company has a pool of five public IP addresses. All client computers have dynamically assigned IP addresses. You need to provide all client computers with Internet access.  What should you use?()A、 DHCP Relay AgentB、 Routing Information Protocol (RIP)C、 Internet Group Management Protocol (IGMP)D、 Network Address Translation (NAT)/Basic Firewall

考题 A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?()A、Four port switchB、Four port wireless routerC、Four port WAPD、Four port hub

考题 Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()A、BranchCacheB、DirectAccessC、Distributed File System Replication (DFSR)D、Universal Group Membership Caching

考题 You are the network administrator for . The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional. Multiple users share the same client computer. A server named TestKing2 functions as a file and print server. You set the profile path for all user accounts to //TestKing2/Profiles/username. Some domain users were added to the local Administrators group on the Windows XP Professional computers. A user reports that other users can log on to client computers that he has previously used and gain access to files stored in his My Documents folder on the local hard disk. You need to permanently prevent users from being able to access the My Documents folder of other domain users on the client computers. What should you do?()A、In Active Directory, modify the Default Domain Policy. Disable the Do not check for user ownership of Roaming Profile Folders setting.B、In Active Directory, modify the Default Domain Policy. Enable the Delete cached copies of roaming profiles setting.C、Log on to all client computers and delete all user profiles from the local hard disks.D、Log on to all client computers and configure the Number of previous logons to cache setting to 0.

考题 You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

考题 Your network consists of a single IPv4 subnet. The subnet contains 20 computers that run Windows 7. Youadd a new computer named Computer1 to the subnet. You discover that Computer1 has an IP address of169.254.34.12. You cannot connect to other computers on the network. Other computers on the networkcan connect to each other. You need to ensure that you can connect to all computers on the network.  What should you do?()A、Turn off Windows Firewall.B、Run Ipconfig.exe /renew.C、Configure a static TCP/IP address.D、Run Netsh.exe interface ipv4 install.

考题 You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()A、Enable Internet Connection SharingB、Enable on-demand dialingC、Enable sharing a modem on one computer on the networkD、Configure a DHCP ServerE、Disable Internet Connection SharingF、Configure all the other computers to be DHCP enabled.

考题 You are the network administrator for The network consists of a single Active directory domain named The domain contains 20 Windows Server 2003 computers and 5,000 Windows XP Professional computers. All client computer accounts are in the Clients organizational unit (OU). The client computers do not have any service packs installed. You install and configure Software Update Services (SUS) on a server named TestKing4. All client computers must download security updates from TestKing4. You need to prepare the client computers so they can connect to TestKing4 to download Windows security updates. What should you do?()A、Create a logon script that connects to the Windows Update Catalog Web site, scans for available security updates, and downloads security updates to the client computes,B、Install the automatic Updates client on all client computers. Configure the client computers to use Automatic Updates to connect to TestKing4.C、Create a new Group Policy object (GPO) and link it to the clients OU. Configure the GPO to create a software package that assigns security updates from TestKing4 to the client computers.D、Add http://TestKing4 as the value for WUStatusServer registry entries on all client computers.

考题 You are the network administrator for TestKing. All servers run Windows Server 2003. Twenty TestKing employees connect to a terminal server named Testking2 to run applications and to gain access to the Internet. The 20 employees report that they receive security messages while browsing Internet Web sites. The employees report that they cannot modify the Internet Explorer security settings on their client computers while connected to Testking2. You need to allow these 20 employees to modify the Internet Explorer security settings in their client computers while connected to Testking2. What should you do?()A、Log on to Testking2 as Administrator and add http:// to the list of trusted sites in Internet Explorer.B、Instruct the 20 employees to add http:// to the list of trusted sites in Internet Explorer on their client computers.C、Instruct the 20 employees to change the Internet Explorer privacy settings on their client computers to Low.D、Uninstall Internet Explorer Enhanced Security Configuration on Testking2.

考题 Your company has two offices. Each office is configured as a separate subnet. The network contains a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). Users report that they are unable to resolve host names on the Internet. You verify that users can access all servers on both subnets.You need to ensure that users can resolve names on the Internet. The solution must ensure that users can access resources on the internal network.  What should you configure?()A、all client computers to use the IP address of a DNS server on the Internet as the primary DNS serverB、all client computers to use the IP address of a DNS server on the Internet as the secondary DNS serverC、the internal DNS servers to use a forwarderD、the internal DNS servers to use round robin

考题 You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Testking32 contains a folder that is shared as ManagerData$. A global group named AllManagers has permission to access the shared folder. A user reports that he needs access to the ManagerData$ shared folder. You add his user account to the All Managers global group. When the user attempts to connect to the shared folder by typing //Testking32/ManagerData$/ , he receives the following error message: "//Testking32/ManagerData$/ is not accessible. You might not have permissions to use the network resource. Contact the administrator of this server to find out if you have access permissions. Access is denied. You need to ensure that the user can access the ManagerData$ shared folder on Testking32. What should you do?()A、Instruct the user to type //Testking32/ManagerData/ when he attempts to access the folder.B、Add the Anonymous Logon group to the ACL for the ManagerData$ shared folder.C、Select the Replace permission entries on all child object with entries shown here that apply to child objects check box.D、Instruct the user to log off and log on again before he accesses the folder.

考题 多选题You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All client computers run Windows XP Professional. The company has offices in Berlin, Dortmund, and Frankfurt. Each office is configured as a separate IP subnet. DNS is the only method of name resolution on the network. You need to implement a software update infrastructure on the network. You install Software Update Services (SUS) on a computer named TestKing3 in the Berlin office. You install on TestKing3 with all default settings. You have no plans to install additional SUS servers. You configure all client computers appropriately. You must ensure that client computers can successfully connect to the SUS server. What should you do?()AConfigure the Internet browser home page on all client computers to point to http://windowsupdate.microsoft.com.BIn the SUS Administrator, configure the Server Name property to be the server's fully qualified domain name (FQDN).COpen IIS Manager and enable HTTP over SSL.DEnable communication over port 135 between all client computers and the SUS server.

考题 单选题A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()A Install anti-virus software on the student computers.B Put the faculty computers in a separate VLAN.C Power down the switches that connect to faculty computers when they are not in use.D Remove the student computers from the network and put them on a peer-to-peer network.E Create an access list that blocks the students from the Internet where the hacking tolls are located.

考题 多选题You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()AEnable Internet Connection SharingBEnable on-demand dialingCEnable sharing a modem on one computer on the networkDConfigure a DHCP ServerEDisable Internet Connection SharingFConfigure all the other computers to be DHCP enabled.

考题 单选题You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

考题 单选题TestKing has 25 computers and decides to connect the network to the Internet.TestKing would like for all of the computers to have access to the Internet at the same time, but TestKing only has four usable publicly routable IP addresses.What should be configured on the router so that all computers can connect to the Internet simultaneously?()A Static NATB Global NATC Dynamic NATD Static NAT with ACLsE Dynamic NAT with overload

考题 单选题A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?()A Four port switchB Four port wireless routerC Four port WAPD Four port hub