网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()
A
TestKing# show eigrp entries
B
TestKing# show protocols
C
TestKing# debug eigrp routes
D
TestKing# show ip route eigrp
E
TestKing# show route eigrp
参考答案
参考解析
解析:
暂无解析
更多 “单选题TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()A TestKing# show eigrp entriesB TestKing# show protocolsC TestKing# debug eigrp routesD TestKing# show ip route eigrpE TestKing# show route eigrp” 相关考题
考题
Your network contains an Active Directory domain. The network has DirectAccess deployed.You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.You need to ensure that users can view their DirectAccess status by using the DCA.Which two group policy settings should you configure?()A. Dynamic Tunnel Endpoints (DTEs)B. Corporate Portal SiteC. Corporate ResourcesD. PortalName
考题
Which statement describes the primary difference between the WX and WXC platforms?()
A. The WX platform has built-in hard drives.B. The WXC platform has no built-in hard drives.C. The WX platform uses Network Sequence Caching technology.D. The WXC platform uses the Network Sequence Caching technology
考题
TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()A. TestKing# show eigrp entriesB. TestKing# show protocolsC. TestKing# debug eigrp routesD. TestKing# show ip route eigrpE. TestKing# show route eigrp
考题
TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()A、TestKing# show eigrp entriesB、TestKing# show protocolsC、TestKing# debug eigrp routesD、TestKing# show ip route eigrpE、TestKing# show route eigrp
考题
TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()A、199.141.27.33B、199.141.27.112C、199.141.27.119D、199.141.27.126E、199.141.27.175F、199.141.27.208
考题
Your network contains an Active Directory domain. The network has DirectAccess deployed.You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.You need to ensure that users can view their DirectAccess status by using the DCA.Which two group policy settings should you configure?()A、Dynamic Tunnel Endpoints (DTEs)B、Corporate Portal SiteC、Corporate ResourcesD、PortalName
考题
You are planning to connect your three branch offices to the corporate site via Frame Relay. The first branch office has been assigned the network 10.1.0.0/16, the second 10.2.0.0/16, the third 10.3.0.0/16, and the corporate headquarters uses 10.0.0.0/16. You would like to summarize all branch and corporate networks into a single route at the corporate site. Which network address and subnet mask should you choose?() A、 10.0.0.0/24B、 10.0.0.0/16C、 10.0.0.0/14D、 10.0.0.0/15
考题
A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA
考题
A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()A、FacadeB、View HelperC、Transfer ObjectD、Intercepting FilterE、Composite Facade
考题
Which statement describes the primary difference between the WX and WXC platforms?()A、The WX platform has built-in hard drives.B、The WXC platform has no built-in hard drives.C、The WX platform uses Network Sequence Caching technology.D、The WXC platform uses the Network Sequence Caching technology
考题
Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.
考题
You are the network administrator for TestKing. All network servers run Windows Server 2003. You administer a server named TestKing76. You need to configure TestKing76 to function as a streaming media server for TestKing.com's content team. The content team wants TestKing76 to provide the fastest performance and the most available space possible. Redundancy is not import. TestKing76 currently has three identical, unpartitioned hard disks available. You need to configure the disks to meet the content team's requirements. What should you do?()A、Create a simple volume on disk and then expand it to the other two disks.B、Create a mirrored volume that uses two of the disks.C、Create a RAID-5 volume that uses all three disks.D、Create a striped volume that uses all three disks.
考题
Your corporate network has a member server named RAS1 that runs windows server 2008. You configure RAS1 to use the routing and remote access service (RRAS). The companys remote access policy allows members of the domain users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、Install the network policy server (NPS) on the RAS1 server.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires uses to authenticate by using EAP-TLS.D、Create a remote access policy that requires uses to authenticate by using MS-CHAPv2.
考题
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange 2010 environment. The users at TestKing.com useMicrosoft Office Outlook 2010 to access the public folders. TestKing.com has joined with another company that also uses Microsoft Office Outlook 2010. You are now busy with a sharing solution for bothcompanies. You have received instructions from the CIO to propose a sharing information strategy thatensures corss-organizaional access to user contacts as well as free/busy information. What should you do?()A、The best option is to implementing Microsoft Modify LifeCyle Manager (ILM) 2007.B、The best option is to create cross forest trusts.C、The best option is to use the Microsoft Exchange Inter-Organization Replication tool.D、The best option is to implementing Federated Sharing.
考题
You are a network administrator for All servers run Windows Server 2003. A server named Testking6 runs an application named App1. Testking6 has one network adapter installed. App1 uses a large amount of network bandwidth per client connection. You suspect the network connection on Testking6 is running out of available network capacity. You need to view how much total network bandwidth is being used on Testking6. What are two possible ways to achieve this goal?() (Each correct answer presents a complete solution. Choose two)A、Use System Monitor to configure the Network Interface object.B、Run the netstat command.C、In Task Manager, monitor the Networking tab.D、Use Network Monitor to configure a capture filter for the local area connection.
考题
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()? A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connectionsC、Configure VPN connections to use MS-CHAP v2 authenticationD、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP
考题
单选题Which statement describes the primary difference between the WX and WXC platforms?()A
The WX platform has built-in hard drives.B
The WXC platform has no built-in hard drives.C
The WX platform uses Network Sequence Caching technology.D
The WXC platform uses the Network Sequence Caching technology
考题
单选题A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()A
FacadeB
View HelperC
Transfer ObjectD
Intercepting FilterE
Composite Facade
考题
单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A
The network uses MAC filteringB
The network uses WEPC
The network uses SSID broadcastD
The network uses WPA
考题
单选题Your network has a main office and a branch office. The branch office has five client computers that runWindows 7 and a server that runs Windows Server 2008 R2. The branch office server is enabled for branchCache. You need to configure Windows Firewall on each client computer so that cached content canbe retrieved from the branch office server. Which firewall rule should you enable on the client computers?()A
BranchCache - Content Retrieval (Uses HTTP)B
BranchCache - Hosted Cache Server (Uses HTTPS)C
BranchCache - Peer Discovery (Uses WSD)D
File and Printer Sharing
考题
单选题Your company has an Active Directory forest. The corporate network uses DHCP to configure client computer IP addresses. The DHCP server has a DHCP client reservation for a portable computer named WKS1. You install asecond DHCP server on the network. You need to ensure that WKS1 receives the DHCP reservation from the DHCP service. What should you do?()A
Run the ipconfig /renew command on WKS1.B
Run the netsh add helper command on WKS1.C
Add the DHCP reservation for WKS1 to the second DHCP server.D
Add both DHCP servers to the RAS and IAS Servers group in the Active Directory domain.
考题
单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()A
You should recommend that management make use of DAG network encryption.B
You should recommend that management make use of Encrypted File System (EFS)C
You should recommend that management make use of Windows BitLocker Drive Encryption.D
You should recommend that management make use of Rights Management Service RMS.
考题
单选题A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()A
255.255.240.0B
255.255.248.0C
255.255.252.0D
255.255.254.0E
255.255.255.0F
255.255.255.192
考题
单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange 2010 environment. The users at TestKing.com useMicrosoft Office Outlook 2010 to access the public folders. TestKing.com has joined with another company that also uses Microsoft Office Outlook 2010. You are now busy with a sharing solution for bothcompanies. You have received instructions from the CIO to propose a sharing information strategy thatensures corss-organizaional access to user contacts as well as free/busy information. What should you do?()A
The best option is to implementing Microsoft Modify LifeCyle Manager (ILM) 2007.B
The best option is to create cross forest trusts.C
The best option is to use the Microsoft Exchange Inter-Organization Replication tool.D
The best option is to implementing Federated Sharing.
考题
多选题TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()A199.141.27.33B199.141.27.112C199.141.27.119D199.141.27.126E199.141.27.175F199.141.27.208
考题
单选题Company.com has a large network control center with an SNMP based monitoring tool running on a non-IBM Unix like system. It has become desirable for the network control center to monitor the activity of an HACMP cluster. What feature in HACMP can assist with this?()A
hacmp.myB
hacmp.mibC
hacmp.defsD
hacmp.snmp
考题
单选题You are planning to connect your three branch offices to the corporate site via Frame Relay. The first branch office has been assigned the network 10.1.0.0/16, the second 10.2.0.0/16, the third 10.3.0.0/16, and the corporate headquarters uses 10.0.0.0/16. You would like to summarize all branch and corporate networks into a single route at the corporate site. Which network address and subnet mask should you choose?()A
10.0.0.0/24B
10.0.0.0/16C
10.0.0.0/14D
10.0.0.0/15
热门标签
最新试卷