网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You need to implement a high availability design in the Company routed network. Which protocol allows for the automatic selection and simultaneous use of multiple available gateways as well as automatic failover between those gateways?()
A
VRRP
B
GLBP
C
IRDP
D
HSRP
E
None of the other alternatives apply
参考答案
参考解析
解析:
暂无解析
更多 “单选题You need to implement a high availability design in the Company routed network. Which protocol allows for the automatic selection and simultaneous use of multiple available gateways as well as automatic failover between those gateways?()A VRRPB GLBPC IRDPD HSRPE None of the other alternatives apply” 相关考题
考题
Which three pre-sales Smart Design documents are available to help you implement and install a solution?()A、 Design GuideB、 Cisco Configuration AssistantC、 Implementation GuideD、 Small Business Product GuideE、 Solution ProfileF、 Application Notes
考题
You want to implement a high availability network using two Cisco routers. You also want to ensure that the stat of the WAN interfaces can be tracked in doing so. Which router redundancy protocol cannot be configured for interface tracking? ()A、 GLBPB、 HSRPC、 RPRD、 VRRPE、 SLBF、 RPR+G、 None of the other alternatives apply
考题
You need to implement a high availability design in the Company routed network. Which protocol allows for the automatic selection and simultaneous use of multiple available gateways as well as automatic failover between those gateways?()A、 VRRPB、 GLBPC、 IRDPD、 HSRPE、 None of the other alternatives apply
考题
Which two statements regarding configuring high availabily in the Cisco UCS is correct?()A、High availability is enabled during the configuration of either HSRP or VRRP from global configuration modeB、High availability is configured during the initial setup of both Fabric interconnectsC、High availability can only be configured via the CMCD、High availability is enabled during theinitial configuration of one of the Fabric lnterconnects
考题
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons
考题
You need to design a PKI solution that meets business and security requirements. What should you do?()A、Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offlineB、Implement an enterprise root CA in the corp.woodgrovebank.com domainC、Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offlineD、Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains
考题
You have just purchased a new Cisco 3560 switch running the enhanced IOS and need configure it to be installed in a high availability network. On a 3560 EMI switch, which three types of interfaces can be used to configure HSRP?()A、 SVI interfaceB、 Access portC、 EtherChannel port channelD、 Loopback interfaceE、 Routed portF、 BVI interface
考题
You need to configure two Company routers for high availability. Which protocol enables a group of routers to form a single virtual router and use the real IP address of a router as the gateway address? ()A、 HSRPB、 IRDPC、 Proxy ARPD、 GLBPE、 VRRPF、 None of the other alternatives apply
考题
Which factor is least likely to affect the scalability of a VPN design?()A、 number of branch officesB、 number of IGP routing peersC、 remote Office and home worker throughput bandwidth requirementsD、 high availability requirementsE、 Supported applications
考题
You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL
考题
You are a network administrator for your company. The company has a main office and two branch offices. The branch offices are connected to the main office by T1 lines. The network consists of three Active Directory sites, one for each office. All client computers run either Windows 2000 Professional or Windows XP Professional. Each office has a small data center that contains domain controllers, WINS, DNS, and DHCP servers, all running Windows Server 2003. Users in all offices connect to a file server in the main office to retrieve critical files. The network team reports that the WAN connections are severely congested during peak business hours. Users report poor file server performance during peak business hours. The design team is concerned that the file server is a single point of failure. The design team requests a plan to alleviate the WAN congestion during business hours and to provide high availability for the file server. You need to provide a solution that improves file server performance during peak hours and that provides high availability for file services. You need to minimize bandwidth utilization. What should you do? ()A、 Purchase two high-end servers and a shared fiber-attached disk array. Implement a file server cluster in the main office by using both new servers and the shared fiber-attached disk array.B、 Implement Offline Files on the client computers in the branch offices by using Synchronization Manager. Schedule synchronization to occur during off-peak hours.C、 Implement a stand-alone Distributed File System (DFS) root in the main office. Implement copies of shared folders for the branch offices. Schedule replication of shared folders to occur during off-peak hours by using scheduled tasks.D、 Implement a domain Distributed File System (DFS) root in the main office. Implement DFS replicas for the branch offices. Schedule replication to occur during off-peak hours.
考题
You have an Exchange Server 2010 organization. The network contains an Exchange Server 2010 Mailbox server named Server1. All mailboxes are stored on Server1. You perform a Typical installation of Exchange Server 2010 on a new server named Server2. You plan to implement redundancy for mailbox access. You need to recommend a solution that ensures that client computers can reconnect to their mailboxwithin five minutes if Server1 fails. What should you recommend?()A、Configure cluster continuous replication (CCR). Implement a file share witness.B、Configure a Network Load Balancing cluster that includes Server1 and Server2. Implement Active Directory-integrated DNS zones.C、Configure a database availability group (DAG) that includes Server1 and Server2. Set the time to live (TTL) for the DNS record.D、Configure a database availability group (DAG) that includes Server1 and Server2. Use the same certificate for both servers.
考题
Your company has an Active Directory forest named contoso.com. You plan to deploy an Exchange Server 2010 organization that will contain two servers. Each server will have the Client Access server role, the Hub Transport server role, and the Mailbox serverrole installed. You plan to add both servers to a database availability group (DAG). You need to recommend a high-availability solution for the Client Access server role. Your solution must ensure that users are not prompted to authenticate if a Client Access server becomesunavailable. What should you recommend?()A、Create and configure a Client Access server array, and then install a hardware load balancer.B、Create and configure a Client Access server array, and then install Windows Network Load Balancingon both servers.C、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006, and then implement DNS round robin.D、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006, and then install Windows Network Load Balancing.
考题
You have an Exchange Server 2010 organization. You need to recommend a solution that prevents the permanent deletion of e-mail messages from themailboxes of employee who have been dismissed from the company. What should you recommend?()A、Implement managed folders.B、Implement a legal hold for each mailbox.C、Implement a Retention Policy for each mailbox.D、Implement an Outlook Protection Rule for each mailbox.
考题
You have an Exchange Server 2010 organization. The network contains two Mailbox servers that are configured in a database availability group (DAG). You plan to implement a disaster recovery solution. You need to recommend a solution that ensures that the active mailbox database copy is unaffected bythe backup process. You want to achieve this goal while minimizing costs. What should you recommend?()A、Windows Server BackupB、Network Attached Storage (NAS) snapshotsC、Microsoft System Center Configuration ManagerD、Microsoft System Center Data Protection Manager
考题
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
考题
You need to recommend a solution for promoting the RODC in the new branch office.What should you include in the recommendations?()A、Implement the Windows Search service and implement a custom iFilter.B、Implement File Server Resource Manager (FSRM) and configure file classifications.C、Implement Microsoft SharePoint Foundation 2010 and create a custom workflow.D、Implement a Distributed File System (DFS) namespace and configure folder targets.
考题
单选题You are a network administrator for your company. The company has a main office and two branch offices. The branch offices are connected to the main office by T1 lines. The network consists of three Active Directory sites, one for each office. All client computers run either Windows 2000 Professional or Windows XP Professional. Each office has a small data center that contains domain controllers, WINS, DNS, and DHCP servers, all running Windows Server 2003. Users in all offices connect to a file server in the main office to retrieve critical files. The network team reports that the WAN connections are severely congested during peak business hours. Users report poor file server performance during peak business hours. The design team is concerned that the file server is a single point of failure. The design team requests a plan to alleviate the WAN congestion during business hours and to provide high availability for the file server. You need to provide a solution that improves file server performance during peak hours and that provides high availability for file services. You need to minimize bandwidth utilization. What should you do? ()A
Purchase two high-end servers and a shared fiber-attached disk array. Implement a file server cluster in the main office by using both new servers and the shared fiber-attached disk array.B
Implement Offline Files on the client computers in the branch offices by using Synchronization Manager. Schedule synchronization to occur during off-peak hours.C
Implement a stand-alone Distributed File System (DFS) root in the main office. Implement copies of shared folders for the branch offices. Schedule replication of shared folders to occur during off-peak hours by using scheduled tasks.D
Implement a domain Distributed File System (DFS) root in the main office. Implement DFS replicas for the branch offices. Schedule replication to occur during off-peak hours.
考题
单选题You need to configure two Company routers for high availability. Which protocol enables a group of routers to form a single virtual router and use the real IP address of a router as the gateway address? ()A
HSRPB
IRDPC
Proxy ARPD
GLBPE
VRRPF
None of the other alternatives apply
考题
单选题In your web application,you need to execute a block of code whenever the session object is first created. Which design will accomplish this goal?()A
Create an HttpSessionListener class and implement the sessionInitialized method with that block ofcode.B
Create an HttpSessionActivationListener class and implement the sessionCreated method with thatblock of code.C
Create a Filter class, call the getSession(false) method, and if the result was null, then execute that block of code.D
Create an HttpSessionListener class and implement the sessionCreated method with that block of code.
考题
单选题Which factor is least likely to affect the scalability of a VPN design?()A
number of branch officesB
number of IGP routing peersC
remote Office and home worker throughput bandwidth requirementsD
high availability requirementsE
Supported applications
考题
单选题You need to block messages from senders that do not comply sender policy framework (SPF).What do you need to implement?()A
Receive connectorB
Sender ID FilteringC
Sender FilteringD
Send connector
考题
多选题Servers in your environment run Windows Server 2003. You plan to configure a highly available file server. You need to choose the appropriate high-availability technology and the minimum Windows Server 2003 edition for this server. Which technology and edition should you choose?()Afailover clusteringBNetwork Load BalancingCWindows Server 2003, Standard EditionDWindows Server 2003, Enterprise Edition
考题
单选题You need to recommend a high-availability solution for the file servers in Branch2 that supports the museum's planned changes What should you include in the recommendation?()A
a standalone Distributed File System (DFS) namespace and DFS ReplicationB
a domain-based Distributed File System (DFS) namespace and DFS ReplicationC
Failover Clustering and Clustered Shared VolumesD
Network Load Balancing (NLB) and Storage Manager
考题
多选题You have just purchased a new Cisco 3560 switch running the enhanced IOS and need configure it to be installed in a high availability network. On a 3560 EMI switch, which three types of interfaces can be used to configure HSRP?()ASVI interfaceBAccess portCEtherChannel port channelDLoopback interfaceERouted portFBVI interface
考题
单选题You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A
Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB
Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC
Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD
Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
考题
单选题You want to implement a high availability network using two Cisco routers. You also want to ensure that the stat of the WAN interfaces can be tracked in doing so. Which router redundancy protocol cannot be configured for interface tracking? ()A
GLBPB
HSRPC
RPRD
VRRPE
SLBF
RPR+G
None of the other alternatives apply
热门标签
最新试卷