网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You need make configuration changes to an existing layer 3 switch in the Company network. On a multilayer Catalyst switch, which interface command is used to convert a Layer 3 interface to a Layer 2 interface?()
A
switchport access vlan vlan-id
B
switchport
C
switchport mode access
D
no switchport
E
None of the other alternatives apply
参考答案
参考解析
解析:
暂无解析
更多 “单选题You need make configuration changes to an existing layer 3 switch in the Company network. On a multilayer Catalyst switch, which interface command is used to convert a Layer 3 interface to a Layer 2 interface?()A switchport access vlan vlan-idB switchportC switchport mode accessD no switchportE None of the other alternatives apply” 相关考题
考题
Which CLI mode allows you to make configuration changes?()
A. enable modeB. configuration modeC. operational modeD. active mode
考题
After editing to your device’s configuration, which command must you enter to activate the configuration changes?()
A. setB. copy candidate activeC. apply-configD. commit
考题
You have a computer that runs Windows Vista.You need to configure the computer to meet the following requirements:·You must be able to make configuration changes remotely.·You must be able to make the changes without the permission of the locally logged-on user.What should you do?()A.AB.BC.CD.D
考题
You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D
考题
After making changes to the router, you issue the copy running-config startup-config command to save changes. After reloading the router, the router comes up in setup mode. You again make changes, save them, and reboot. Again,the router comes up in setup mode.What is the most likely cause of this?()A. The NVRAM is corrupted.B. The boot system commands were omitted in the configuration.C. The configuration register setting is incorrect.D. The upgraded configuration incompatible with the hardware platform.E. The upgraded IOS incompatible with the hardware.
考题
You need make configuration changes to an existing layer 3 switch in the Company network. On a multilayer Catalyst switch, which interface command is used to convert a Layer 3 interface to a Layer 2 interface?()A、 switchport access vlan vlan-idB、 switchportC、 switchport mode accessD、 no switchportE、 None of the other alternatives apply
考题
After making changes to the router, you issue the "copy running-config startup-config" command to save changes. After reloading the router, the router comes up in setup mode. You again make changes, save them, and reboot. Again,the router comes up in setup mode. What is the most likely cause of this?()A、The NVRAM is corrupted.B、The boot system commands were omitted in the configuration.C、The configuration register setting is incorrect.D、The upgraded configuration incompatible with the hardware platform.E、The upgraded IOS incompatible with the hardware.
考题
Which CLI mode allows you to make configuration changes?()A、enable modeB、configuration modeC、operational modeD、active mode
考题
Which of these is true regarding the configuration and application of port access control lists? ()A、PACLs can be applied in the inbound or outbound direction of a Layer 2 physical interface. B、At Layer 2, a MAC address PACL will take precedence over any existing Layer 3 PACL.C、When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port.D、PACLs are not supported on EtherChannel interfaces.
考题
You have a single network segment. All servers run Windows Server 2003 Service Pack 2 (SP2). You have a DHCP server named Server1. Client computers receive IP addresses from Server1. You add a second network segment separated by a RFC 1542-compliant router. You need to ensure that computers in the new network segment can receive their IP configurations from Server1. You make the appropriate configuration changes on the router. What should you do on Server1?()A、Create a new scope.B、Configure a DHCP Relay Agent.C、Add an Extensions Path scope option.D、Create a new exclusion range in the existing scope.
考题
You need to make structural changes to the cube. You also need to ensure that appropriate aggregations are created after the changes are made. What should you do?()A、Record a weeks user activity by using SQL Profiler. Apply structural changes. Replay the activity and then run the Usage Based Optimization Wizard.B、Apply structural changes. Run the Database Engine Tuning Advisor.C、Apply structural changes. Run the Usage Based Optimization Wizard.D、Record a weeks user activity by using SQL Profiler. Apply structural changes. Run the Database Engine Tuning Advisor.
考题
You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()A、the Authorization Manager snap-in on Node1 and Node2B、the Authorization Manager snap-in on the VMsC、the Network Configuration Operators local group on each VMD、the Network Configuration Operators local group on Node1 and Node2
考题
You have the Web Server (IIS) role installed on a server that runs Windows Server 2008. You make changes to the configuration of an application named APP1. Users report that the application fails. You examine the event log and discover the following error message: 503 Service Unavailable. You need to ensure that users are able to connect to APP1. Which command should you run at the command prompt on the server?()A、appcmd set configB、appcmd stop apppoolC、appcmd start apppoolD、appcmd set apppool
考题
You are planning the consolidation of the application servers. You need to identify the appropriate disk configuration for the VMs based on the company’s planned changes. Which disk configuration should you identify?()A、fixed-size virtual hard disk (VHD)B、dynamically expanding virtual hard disk (VHD)C、differencing disksD、pass-through disks
考题
单选题You are changing the security settings of a file named MyData.xml.You need to preserve the existing inherited access rules.You also need to prevent the access rules from inheriting changes in the future. Which code segment should you use?()A
AB
BC
CD
D
考题
单选题Which CLI mode allows you to make configuration changes?()A
enable modeB
configuration modeC
operational modeD
active mode
考题
单选题You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()A
the Authorization Manager snap-in on Node1 and Node2B
the Authorization Manager snap-in on the VMsC
the Network Configuration Operators local group on each VMD
the Network Configuration Operators local group on Node1 and Node2
考题
单选题You enter configuration mode with the configure command. You need to abort the changes that you have made and start again with a fresh copy of the active configuration. Which command should you use?()A
rollback 0B
load activeC
reset configD
clear candidate config
考题
单选题You need to recommend a solution for managing the GPOs that supports the company's planned changes. What should you include in the recommendation?()A
Group Policy Management Console (GPMC) and Authorization ManagerB
Group Policy Management Console (GPMC) and Microsoft SharePoint Foundation 2010C
Microsoft Desktop Optimization Pack (MDOP)D
Microsoft System Center Configuration Manager
考题
单选题You need to recommend a solution for deploying App1. The solution must support the company’s planned changes. What should you include in the recommendation?()A
Group Policy Software InstallationB
Microsoft Application Virtualization (App-V)C
Microsoft Enterprise Desktop Virtualization (MED-V)D
Microsoft System Center Configuration Manager
考题
单选题You have an existing Windows Communication Foundation (WCF) service that exposes a service contract over HTTP. You need to expose that contract over HTTP and TCP. What should you do?()A
Add a net.tcp base address to the host.B
Add an endpoint configured with a netTcpBinding.C
Add an endpoint behavior named netTcpBehavior to the existing endpoint.D
Add a binding configuration to the existing endpoint named netTcpBinding.
考题
单选题The character mode sales report is stored on the network drive as a .REX. You need to make changes to the report layout. Using the report builder how would you change this file?()A
Open the file using the menu option file-open make the changes and recompile the report. B
Convert the file into .REP file using the report compiler make the changes and convert the file back to a .REX file. C
Execute the R30CONV command to convert the file to a .RDF file, make the changes and convert the file back to a .REX file. D
Choose file - administration-compile. Convert the file to a .REP file, make the changes and convert the file back to a .REX file. E
Execute the R30CONV command to convert the file to a .REP file, make the changes and convert the file back to a .REX file.
考题
单选题You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user. What should you do? ()A
Enable the User Account Control: Only elevate executables that are signed and validated option.B
Disable the User Account Control: Only elevate executables that are signed and validated option.C
Configure the User Account Control: Behavior of the elevation prompt for standard users setting to the Prompt for credentials option.D
Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to the Prompt for consent option.
考题
单选题You are designing a Windows Azure application that will execute long-running business processes. Applying a configuration change requires role instances to recycle. You must not recycle until processing is finished. You need to recommend an approach for applying configuration changes. What should you recommend?()A
Apply the service configuration changes to the role instance and then recycle the role instance.B
Suspend each role instance and then apply the service configuration changes to the role instance.C
Before a change to the service configuration is applied to the role instance, defer recycling until processing is complete.D
After a change to the service configuration is applied to the role instance, defer recycling until processing is complete.
考题
单选题You want to consolidate some of the databases onto existing SQL Server computers until additional hardware can be purchased.You need to identify which of the servers, in its current configuration, can support additional databases. You need to ensure that your solution fulfills the company’s securiy requirements while allowing for future database growth requirements. Which server and database combination can be used?()A
SQL3 with the OnlineReadOnly and HR databasesB
SQL4 with the TravelOnline and Storefront databasesC
SQL2 with the Storefront and TravelOnline databasesD
SQL2 with the Storefront and HR databases
考题
单选题After editing to your device’s configuration, which command must you enter to activate the configuration changes?()A
setB
copy candidate activeC
apply-configD
commit
考题
单选题You are performing a test deployment of Microsoft Enterprise Desktop virtualization (MED-V) 2.0. You discover that applications deployed by using MED-V run much slower than expected. You need to recommend configuration changes to improve the performance of the MED-V workspace applications. Which configuration changes should you recommend?()A
Disable cached mode in Outlook 2010B
Add exclusions to Forefront EndPoint ProtectionC
Add URL exclusions to the Forefront TMG ClientD
Modify the network settings in SharePoint Workspace 2010
热门标签
最新试卷