网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
As a network administrator, you are required to configure a switch port for a private Virtual LAN. In such a situation, which three of the following connection modes will be available during the configuration process? ()(Choose three.)
A
isolated mode
B
modular mode
C
community mode
D
promiscuous mode
E
non-isolated
F
permanent
参考答案
参考解析
解析:
暂无解析
更多 “多选题As a network administrator, you are required to configure a switch port for a private Virtual LAN. In such a situation, which three of the following connection modes will be available during the configuration process? ()(Choose three.)Aisolated modeBmodular modeCcommunity modeDpromiscuous modeEnon-isolatedFpermanent” 相关考题
考题
You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?A.Configure an ADM template and add the template to the GPO.B.Configure an INF policy and add the policy to the GPO.C.Configure a Microsoft Windows installer package and add the package to the GPO.D.Configure RIS to include the registry entry.
考题
As a network administrator, you are required to configure a switch port for a private Virtual LAN. In such a situation, which three of the following connection modes will be available during the configuration process? ()(Choose three.)A. isolated modeB. modular modeC. community modeD. promiscuous modeE. non-isolatedF. permanent
考题
You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()A、Upgrade the switchesB、Configure BPDU guardC、Configure VLAN access listsD、Configure port securityE、Configure Dynamic ARP inspection
考题
You are the network administrator of a small Layer 2 network with 50 users. Lately, users have beencomplaining that the network is very slow. While troubleshooting, you notice that the CAM table of yourswitch is full, although it supports up to 12, 000 MAC addresses. How can you solve this issue and preventit from happening in the future?()A、Upgrade the switchesB、Configure BPDU guardC、Configure VLAN access listsD、Configure port securityE、Configure Dynamic ARP inspection
考题
HSRP. Known as Hot Stanclby Router Protocol, is a Cisco proprietarv redundancy protocol . As an experienced network administrator, you are required to configure HSRP on a XYZ network. Which TWO of the following wii be available and shared between the routers configured with HSRP? ()(Choose two.)A、a shared single interfaceB、the ability to track serial interfacesC、UDP-based hello packetsD、the impact of flapping links if timers are too low
考题
You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network. What should you do?()A、Configure a DNS suffix.B、Configure a subnet mask.C、Configure an LMHOSTS file.D、Configure an Interface metric.E、Configure at least one DNS address.
考题
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS. What should you do?()A、Check the application log on the Web server.B、Use Network Monitor to capture network traffic on the Web server.C、Review the log files created by IIS on the Web server.D、Configure a performance log to capture all Web service counters. Review the performance log data.
考题
Cisco IOS is the software used on the vast majority of Cisco Systems routers and current Cisco network switches. As a network administrator, you are required to configure MPLS on Cisco IOS. In such a situation, which three of the following steps are necessary to take?()A、Start LDP.B、Enable CEF switching.C、Configure conditional label advertising.D、Enable label switching on frame mode interfaces.E、disable IP TTL propagationF、configure conditional label advertising
考题
As a network administrator, you are required to configure a switch port for a private Virtual LAN. In such a situation, which three of the following connection modes will be available during the configuration process? ()(Choose three.)A、isolated modeB、modular modeC、community modeD、promiscuous modeE、non-isolatedF、permanent
考题
You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B、 CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;
考题
You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()A、Enable Internet Connection SharingB、Enable on-demand dialingC、Enable sharing a modem on one computer on the networkD、Configure a DHCP ServerE、Disable Internet Connection Sharing
考题
You are the administrator of Company.com’s Windows 2000 Network. Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer. You want to complete the configuration to allow the computers to communicate on the network. What should you do?()A、Configure a HOSTS file.B、Configure a LMHOSTS file.C、Configure a WINS server database.D、Configure a DHCP server address.E、Configure at least one DNS address.
考题
You are the administrator of ExamSheet.net's network. ExamSheet upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings so that IP and DNS addresses are obtained automatically. When you restart the computer you cannot access the network. When you attempt toPINGaddress 127.0.0.1 you receive the following error message: "Request timed out." You want this computer to communicate on the network. What should you do?()A、Configure IP address settings manually.B、Replace the network adapter.C、Disable TCP/IP filtering for all network adapters.D、Configure DNS server address settings manually.E、Enable IEEE 802.1x authentication.
考题
You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()A、Enable DHCP in the TCP/IP properties.B、Replace the Token Ring network adapter with an Ethernet network adapter.C、Configure a different TCP/IP address on the same subnet.D、Configure a valid DNS Server in the TCP/IP properties.
考题
You are a network administrator for ExamSheet.net's Windows 2000 network. Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully. What should you do? ()A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B、Start the RunAs service and configure the service to start automatically.C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D、Use Scheduled Tasks to configure the task to run under the security context of your account.
考题
You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()A、Enable Internet Connection SharingB、Enable on-demand dialingC、Enable sharing a modem on one computer on the networkD、Configure a DHCP ServerE、Disable Internet Connection SharingF、Configure all the other computers to be DHCP enabled.
考题
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.
考题
You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.
考题
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.
考题
You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment. The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application. You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.
考题
单选题You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A
CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B
CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C
CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D
CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;
考题
多选题Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home. Which two actions should you perform?()AWhen you configure access to the wired network at home, set the wired network adapter location type to Public.BWhen you configure access to the wired network at home, set the wired network adapter location type to Private.CWhen you configure access to the public wireless access points, set the wireless network adapter location type to Public.DWhen you configure access to the public wireless access points, set the wireless network adapter location type to Private.
考题
多选题HSRP. Known as Hot Stanclby Router Protocol, is a Cisco proprietarv redundancy protocol . As an experienced network administrator, you are required to configure HSRP on a XYZ network. Which TWO of the following wii be available and shared between the routers configured with HSRP? ()(Choose two.)Aa shared single interfaceBthe ability to track serial interfacesCUDP-based hello packetsDthe impact of flapping links if timers are too low
考题
多选题Your network consists of three Active Directory forests. Forest trust relationships exist between all forests. Each forest contains one domain. All domain controllers run Windows Server 2008 R2. Your company has three network administrators. Each network administrator manages a forest and the Group Policy objects (GPOs) within that forest. You need to create standard GPOs that the network administrators in each forest will use. The GPOs must meet the following requirements: èThe GPOs must only contain settings for either user configurations or computer configurations. èThe number of GPOs must be minimized. Which two actions should you perform?()AExport the new GPOs to .cab files. Ensure that the .cab files are available to the network administrator in each forest.BCreate two new GPOs. Configure both GPOs to use the required user configurations and the required computer configurations.CCreate two new GPOs. Configure one GPO to use the required user configuration. Configure the other GPO to use the required computer configuration.DBack up the Sysvol folder that is located on the domain controller where the new GPOs were created. Provide the backup to the network administrator in each forest.
考题
多选题Cisco IOS is the software used on the vast majority of Cisco Systems routers and current Cisco network switches. As a network administrator, you are required to configure MPLS on Cisco IOS. In such a situation, which three of the following steps are necessary to take?()AStart LDP.BEnable CEF switching.CConfigure conditional label advertising.DEnable label switching on frame mode interfaces.Edisable IP TTL propagationFconfigure conditional label advertising
考题
单选题You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department. You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection. You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button) You want to be able to configure each user account to use a roaming user profile. What should you do?( )A
From System in Control Panel, select the Change Type option, and then select the Roaming profile option. B
From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. C
Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. D
Connect the portable computer to the network, and configure the user accounts for a roaming user profile.
考题
单选题You are a network administrator for ExamSheet.net's Windows 2000 network. Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully. What should you do? ()A
Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B
Start the RunAs service and configure the service to start automatically.C
Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D
Use Scheduled Tasks to configure the task to run under the security context of your account.
热门标签
最新试卷