网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following options best justifies why a DNS server should be run in a large network system?()
A
To use ftp and telnet
B
To perform NFS mounts
C
To make /etc/hosts files unnecessary
D
To reduce network traffic and save bandwidth
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following options best justifies why a DNS server should be run in a large network system?()A To use ftp and telnetB To perform NFS mountsC To make /etc/hosts files unnecessaryD To reduce network traffic and save bandwidth” 相关考题
考题
You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.
考题
You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.
考题
A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network. Which of the following options is the most probable cause?()A、A large FTP job is in process. B、A network interface was misconfigured. C、The ping command is being used excessively. D、A bad network interface card and/or network cable is in use.
考题
Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A、/etc/security/userB、/etc/servicesC、/etc/inetd.confD、/etc/hosts.equiv
考题
You need to design a strategy to log access to the company Web site. What should you do?()A、Enable logging on the company Web site and select the NCSA Common Log File Format. Store the log files on a SQL Server computerB、Use System Monitor to create a counter log that captures network traffic to the Web server by using the Web Service object. Store the log files on a SQL Server computerC、Run the Network Monitor on the Web server. Create a capture filter for the SNA protocol and save the results to a capture file. Store the capture file on a SQL Server computerD、Enable logging on the company Web site and select ODBC Logging. Configure the ODBC logging options by using a nonadministrative SQL account
考题
Your network consists of an internal network and a perimeter network. On the internal network there is a server named Server1. On the perimeter network there is a server named Server2. All servers run Windows Server 2003 Service Pack 2 (SP2). You schedule a task to transfers files from Server1 to Server2 by using FTP.You monitor the network traffic from Server1 to Server2 and notice that the user name and password used for the FTP transfer are sent as plain text. You need to ensure that all FTP traffic between Server1 and Server2 is encrypted. What should you do?()A、Implement IPSec.B、Install a server certificate on Server1.C、Install a server certificate on Server2.D、Use the Encrypting File System on Server1.
考题
Which of the following BEST describes the function of a DNS server?()A、Secures network traffic through shared key encryption.B、Provides resolution of host names to IP addresses.C、Provides security for a network through the use of ACLs.D、Dynamically assigns IP addresses for easy client configuration.
考题
On a system wide basis, which of the following procedures is best to make NIS name resolution take precedence over DNS?()A、Remove the /etc/resolv.conf fileB、Unset the NSORDER environment variableC、Add the following line to /etc/netsvc.conf: hosts=nis,bind,localD、In a NIS and DNS environment, NIS takes precedence so there is nothing to change
考题
How is DHCP enabled on a server?()A、Use network options to enable ipforwardingB、Edit /etc/rc.tcpip and enable dhcpsdC、Edit /etc/rc.nfs increase the number of biod daemonsD、Use SMIT to set the server to use DHCP instead of static IP addresses
考题
Which of the following options best justifies why a DNS server should be run in a large network system?()A、To use ftp and telnetB、To perform NFS mountsC、To make /etc/hosts files unnecessaryD、To reduce network traffic and save bandwidth
考题
A system has a critical need for network services on a small network with a limited number of hosts. System overhead is not a concern. Which of the following should the system administrator do to help ensure connectivity in the event of a gateway failure?()A、Use the ifconfig command to enable dead gate detectionB、Use the no command to set active dead gateway detectionC、Use the route command to set active dead gateway detectionD、Add the line active_dgd=1 to the /etc/gated.conf command and refresh the gated daemon
考题
A DNS server for a large network is experiencing performance problems. Which of the following options is the best solution to fix the problem?()A、Enable NISB、Purchase a larger serverC、Use /etc/hosts on all of the systemsD、Create secondary name servers throughout the network
考题
To change the read sizes on a V3 network file system server, which of the following options would need to be set?()A、rsizeB、nfs_max_read_sizeC、nfs_server_clreadD、nfs_rfc1323
考题
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).A firewall separates the internal network from the Internet. The firewall blocks all outbound traffic except for HTTP and SMTP traffic.You install a DNS server. The DNS server is configured to use the default root hints. You need to ensure that the DNS server can resolve the host names on the Internet. Which port should you open on the firewall?()A、53B、135C、500D、3389
考题
Your network contains a Windows Server 2008 R2 server that functions as a file server. All users have laptop computers that run Windows 7. The network is not connected to the Internet. Users save files to a shared folder on the server. You need to design a data provisioning solution that meets the following requirements: èUsers who are not connected to the corporate network must be able to access the files and the folders in the corporate network. èUnauthorized users must not have access to the cached files and folders. What should you do?()A、Implement a certification authority (CA). Configure IPsec domain isolation.B、Implement a certification authority (CA). Configure Encrypting File System (EFS) for the drive that hosts the files.C、Implement Microsoft SharePoint Foundation 2010. Enable Secure Socket Layer (SSL) encryption.D、Configure caching on the shared folder. Configure offline files to use encryption.
考题
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The Web Server(IIS) server role and the FTP Publishing Service role service are installed on the server. You have a newFTP site added to the server. You have to make sure that the new FTP site is available. In order to makesure of this,what action should you perform?()A、In order to make sure of this, the iisreset command should be run on the server.B、In order to make sure of this, a host header file should be configured in the default Web site properties.C、In order to make sure of this, an alternate IP address should be configured in the default Web siteproperties.D、In order to make sure of this, an alternate TCP port should be configured in the FTP site properties.E、In order to make sure of this, an alternate IP address should be configured in the FTP site properties.
考题
单选题Which of the following BEST describes the function of a DNS server?()A
Secures network traffic through shared key encryption.B
Provides resolution of host names to IP addresses.C
Provides security for a network through the use of ACLs.D
Dynamically assigns IP addresses for easy client configuration.
考题
单选题On a system wide basis, which of the following procedures is best to make NIS name resolution take precedence over DNS?()A
Remove the /etc/resolv.conf fileB
Unset the NSORDER environment variableC
Add the following line to /etc/netsvc.conf: hosts=nis,bind,localD
In a NIS and DNS environment, NIS takes precedence so there is nothing to change
考题
单选题How is DHCP enabled on a server?()A
Use network options to enable ipforwardingB
Edit /etc/rc.tcpip and enable dhcpsdC
Edit /etc/rc.nfs increase the number of biod daemonsD
Use SMIT to set the server to use DHCP instead of static IP addresses
考题
多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The Web Server(IIS) server role and the FTP Publishing Service role service are installed on the server. You have a newFTP site added to the server. You have to make sure that the new FTP site is available. In order to makesure of this,what action should you perform?()AIn order to make sure of this, the iisreset command should be run on the server.BIn order to make sure of this, a host header file should be configured in the default Web site properties.CIn order to make sure of this, an alternate IP address should be configured in the default Web siteproperties.DIn order to make sure of this, an alternate TCP port should be configured in the FTP site properties.EIn order to make sure of this, an alternate IP address should be configured in the FTP site properties.
考题
单选题Your network consists of an internal network and a perimeter network. On the internal network there is a server named Server1. On the perimeter network there is a server named Server2. All servers run Windows Server 2003 Service Pack 2 (SP2). You schedule a task to transfers files from Server1 to Server2 by using FTP.You monitor the network traffic from Server1 to Server2 and notice that the user name and password used for the FTP transfer are sent as plain text. You need to ensure that all FTP traffic between Server1 and Server2 is encrypted. What should you do?()A
Implement IPSec.B
Install a server certificate on Server1.C
Install a server certificate on Server2.D
Use the Encrypting File System on Server1.
考题
单选题You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet.You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: (1)Detect and identify traffic that is sent by the worm. (2)Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()A
Configure a WMI event trigger.B
Configure a Network Monitor capture filter.C
Configure a Network Monitor trigger.D
Configure a System Monitor alert.
考题
单选题A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network. Which of the following options is the most probable cause?()A
A large FTP job is in process. B
A network interface was misconfigured. C
The ping command is being used excessively. D
A bad network interface card and/or network cable is in use.
考题
单选题Your network contains a Windows Server 2008 R2 server that functions as a file server. All users have laptop computers that run Windows 7. The network is not connected to the Internet. Users save files to a shared folder on the server. You need to design a data provisioning solution that meets the following requirements: èUsers who are not connected to the corporate network must be able to access the files and the folders in the corporate network. èUnauthorized users must not have access to the cached files and folders. What should you do?()A
Implement a certification authority (CA). Configure IPsec domain isolation.B
Implement a certification authority (CA). Configure Encrypting File System (EFS) for the drive that hosts the files.C
Implement Microsoft SharePoint Foundation 2010. Enable Secure Socket Layer (SSL) encryption.D
Configure caching on the shared folder. Configure offline files to use encryption.
考题
单选题A DNS server for a large network is experiencing performance problems. Which of the following options is the best solution to fix the problem?()A
Enable NISB
Purchase a larger serverC
Use /etc/hosts on all of the systemsD
Create secondary name servers throughout the network
考题
单选题Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A
/etc/security/userB
/etc/servicesC
/etc/inetd.confD
/etc/hosts.equiv
考题
单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).A firewall separates the internal network from the Internet. The firewall blocks all outbound traffic except for HTTP and SMTP traffic.You install a DNS server. The DNS server is configured to use the default root hints. You need to ensure that the DNS server can resolve the host names on the Internet. Which port should you open on the firewall?()A
53B
135C
500D
3389
热门标签
最新试卷