网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()
A

Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.

B

Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.

C

Select the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.

D

Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.


参考答案

参考解析
解析: 暂无解析
更多 “多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()AIsolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.BIdentify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.CSelect the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.DIsolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.” 相关考题
考题 Your network contains an Active Directory domain. The network has DirectAccess deployed.You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.You need to ensure that users can view their DirectAccess status by using the DCA.Which two group policy settings should you configure?()A. Dynamic Tunnel Endpoints (DTEs)B. Corporate Portal SiteC. Corporate ResourcesD. PortalName

考题 Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?() A. State synchronization occurs only through the internal network interface card (NIC)B. Latency of the WAN must be less than 300 ms.C. Authenticating endpoints must be on the same LAN segment.D. Cluster members must use the same hardware platfor

考题 You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()A. resource access policiesB. Host Enforcer policiesC. source IP enforcement policiesD. IPsec enforcement policies

考题 You administer your company‘s network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the applicatin.What should you do?()A.AB.BC.CD.D

考题 You are the network administrator for . In particular you administer a Windows 2003 server named TestKing13. You need to use Disk Management to configure a partition on TestKing13.When you attempt to access Disk Management, you receive the following error message:Unable to connect Logical Disk Manager service.You verify that the Logical Disk Manager service is started.What is the most likely cause of the problem?()A. There is not enough available space on the boot partition.B. The disk performance counters are disabled.C. The Logical Disk Manager Administrative service is disabled.D. The Windows 2003 Administration Tools Pack is not installed

考题 To ensure device security, Cisco Network Admission Control works with antivirus software onwhich two endpoints? ()A、 portB、 serverC、 laptopD、 wireless client

考题 You’re a network administer and you issue the command (show port 3/1) on an Ethernet port. Toyour surprise you notice a non-zero entry in the ’Giants’ column. What could be the cause of this?()A、IEEE 802.1QB、IEEE 802.10C、Misconfigured NICD、User configurationE、All of the above

考题 You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. You install Windows 2000 Professional on a computer that has a Non-Plug and Play video adapter. You want to configure the video adapter to use 32-bit color and 1024 x 768 resolution. The color setting for the video adapter is set to 16 colors and 640 x 480 resolutionand you cannot change either setting. You view display properties and confirm that the appropriate monitor is selected. You want to be able to change the color setting for this video adapter. What should you do? ()A、UseList All Modesto select the adapter default mode.B、Change the adapter refresh rate to 60Mhz.C、Upgrade the monitor drivers.D、Upgrade the display adapters drivers

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully.   You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node.   However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF://0A:32:08:46."   In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF://0A:32:08:46." Only the hardware address is different in the two descriptions.  You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes.  You want to configure a four-node Network Load Balancing cluster.   What should you do?  ()A、 Configure the fourth node to use multicast mode.B、 Remove 10.50.8.70 from the Network Connections Properties of the fourth node.C、 On the fourth node, run the nlb.exe resume command.D、 On the fourth node, run the wlbs.exe reload command.

考题 You are the network administrator for You administer a Windows Server 2003 computer named TestKing5. The hardware vendor for TestKing5 notifies you that a critical hotfix is available. This hotfix is required for all models of this computer that have a certain network interface card. You need to find out if the network interface card that requires the hotfix is installed in TestKing5. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)()A、Open Network Connections, and then examine the properties of each connection that is listed.B、Open the Component Services snap-in, expand Computers, expand My Computer, and then examine the list.C、Run the netsh interface command, and then examine the list.D、Open Device Manager, expand Network adapters, and then examine the list.

考题 You are the systems engineer for Contoso, Ltd. The internal network consists of a Windows NT 4.0 domain. The company maintains a separate network that contains publicly accessible Web and mail servers. These Web and mail servers are members of a DNS domain named contoso.com. The contoso.com zone is hosted by a UNIX-based DNS server running BIND 4.8.1.   Contoso, Ltd., is planning to migrate to a Windows Server 2003 Active Directory domain-based network. The migration plan states that all client computers will be upgraded to Windows XP Professional and that all servers will be replaced with new computers running Windows Server 2003.   The migration plan specifies the following requirements for DNS in the new environment: • Active Directory data must not be accessible from the Internet. • The DNS namespace must be contiguous to minimize confusion for users and administrators.   • Users must be able to connect to resources in the contoso.com domain. • Users must be able to connect to resources located on the Internet.   • The existing UNIX-based DNS server will continue to host the contoso.com domain.  • The existing UNIX-based DNS server cannot be upgraded or replaced. You plan to install a Windows Server 2003 DNS server on the internal network.   You need to configure this Windows-based DNS server to meet the requirements specified in the migration plan.   What should you do? ()A、 Create a primary zone named ad.contoso.com on your Windows-based DNS server. Create a delegation record for the new zone on the UNIX-based DNS server. Configure forwarders on your Windows-based DNS server.B、 Create a primary zone named ad.contoso.com on the UNIX-based DNS server. Create a secondary zone on your Windows-based DNS server for the ad.contoso.com domain.C、 Create a primary zone named contoso-ad.com on your Windows-based DNS server. Create a secondary zone on the UNIX-based DNS server for the contoso-ad.com domain.D、 Create a primary zone named contoso-ad.com on the UNIX-based DNS server. Create a stub zone on the Windows-based DNS server for the contoso-ad.com domain. Configure conditional forwarders on your Windows-based DNS server for the contoso-ad.com and contoso.com domains.

考题 You are the network administrator for ExamSheet.net. You administer ExamSheet's Windows 2000 network. You want to update the device driver for the network adapter in your Windows 2000 Professional computer. You log on the computer by using the local Administrator account. You use Device Manager to verify that the network adapter is installed on your computer. You select the Driver tab and Update Driver option, and install a new driver from the network adapter manufacturer. You restart the computer. After displaying the Windows 2000 Professional startup screen, your computer displays aCkernel stop error message. You want to configure your computer to start successfully.  Which two methods can you use to resolve the problem?()A、Perform an emergency repair of the system from the Windows 2000 Professional CD-ROM by     using the Emergency Repair Disk for the computer.B、Restart the computer. In the Recovery Console, use the Extract utility to reinstall the loopback     driver from the Windows 2000 Professional CD-ROM.C、Restart the computer by using the last know good configuration.D、Restart the computer in safe mode and reinstall the original network adapter driver. E、Restart the computer and disable Plug and Play in the computer BIOS.

考题 You are the network administrator for . You administer a Windows Server 2003 computer named TestKing7. Users report that they experience poor performance when they access resources located on TestKing7. You suspect a disk bottleneck. You need to set up performance counters to monitor TestKing7. You need to decide which performance objects to monitor. Which two counters should you choose? ()(Each correct answer presents part of the solution. Select two.)A、LogicalDisk/%IdleTimeB、PhysicalDisk/%DiskTimeC、PhysicalDisk/Avg.DiskQueueLengthD、Memory/WriteCopies/secE、Memory/CommitLimit

考题 You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()A、Instruct the user to move the documents to the Shared Folders folder.B、Add the user's user account to the local Power Users group.C、Add the user's user account to the Network Configuration Operators group.D、Add the user's user account to the local Adminstrators group.

考题 多选题Your network contains an Active Directory domain. The network has DirectAccess deployed.You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.You need to ensure that users can view their DirectAccess status by using the DCA.Which two group policy settings should you configure?()ADynamic Tunnel Endpoints (DTEs)BCorporate Portal SiteCCorporate ResourcesDPortalName

考题 多选题You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a DNS suffix.BConfigure a subnet mask.CConfigure an LMHOSTS file.DConfigure an Interface metric.EConfigure at least one DNS address.

考题 多选题Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()AWhen you configure access to the wired network at home, set the wired network adapter location type to Public.BWhen you configure access to the wired network at home, set the wired network adapter location type to Private.CWhen you configure access to the public wireless access points, set the wireless network adapter location type to Public.DWhen you configure access to the public wireless access points, set the wireless network adapter location type to Private.

考题 单选题You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. You upgrade 10 computers in the Accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings. For security purposes you want to ensure that these computers can only communicate with other Windows 2000 computers.  What should you do?()A On each computer configure separate memory spaces for each financial and credit applications.B Apply Highly Secure security template to the local security policy of the computers in the Accounting department.C Apply Compatible security template to the local security policy of the computers in the Accounting department.D Add each user account to the Power Users group on that user’s computer.

考题 单选题You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()A resource access policiesB Host Enforcer policiesC source IP enforcement policiesD IPsec enforcement policies

考题 多选题Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()AState synchronization occurs only through the internal network interface card (NIC)BLatency of the WAN must be less than 300 ms.CAuthenticating endpoints must be on the same LAN segment.DCluster members must use the same hardware platfor

考题 多选题You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()AThe endpoints can use agentless access.BEncrypted traffic flows between the endpoint and the enforcer.CEncrypted traffic flows between the endpoint and the protected resourceDThe endpoints can use the Odyssey Access Client.

考题 单选题You are the network administrator for . In particular you administer a Windows 2003 server named TestKing13. You need to use Disk Management to configure a partition on TestKing13. When you attempt to access Disk Management, you receive the following error message: "Unable to connect Logical Disk Manager service." You verify that the Logical Disk Manager service is started. What is the most likely cause of the problem?()A There is not enough available space on the boot partition.B The disk performance counters are disabled.C The Logical Disk Manager Administrative service is disabled.D The Windows 2003 Administration Tools Pack is not installed

考题 单选题You’re a network administer and you issue the command (show port 3/1) on an Ethernet port. Toyour surprise you notice a non-zero entry in the ’Giants’ column. What could be the cause of this?()A IEEE 802.1QB IEEE 802.10C Misconfigured NICD User configurationE All of the above

考题 单选题You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003. You create an organizational unit (OU) named Engineering, which will hold all objects associated with the users and computers in the engineering department. You also create a global group named Engineering Admins, whose members will administer these objects. Now you need to assign the appropriate permissions to the Engineering Admins group so its members can administer the objects in the Engineering OU. First, you use Active Directory Users and Computers to view the properties of the Engineering OU. However, the Security tab is not available. What should you do next?()A Convert the system partition to NTFS.B Enable the Advanced Features option in the View menu of Active Directory Users and Computers.C Enable the Users, Groups, and Computers as Containers option in the View menu of Active Directory Users and Computers.D Log on by using a user account that has Administrator permissions for the Engineering OU.

考题 单选题You’re a network administer and you issue the command (show port 3/1) on an Ethernet port. To  your surprise you notice a non-zero entry in the ’Giants’ column.  What could be the cause of this? ()A  IEEE 802.1QB  IEEE 802.10C  Misconfigured NICD  User configurationE  All of the above