考题
●(73)operate by distributing a workload evenly over multiple back end nodes. Typically the cluster will be configured with multiple redundant load-balancing front ends.(73)A. High-availability clustersB. Load-balancing clustersC. Grid computingD. Cloud Computing
考题
An enterprise has an internal web application that needs stickiness managed by a Cluster. Allemployees access the application through a proxy. What is the correct sticky load balancing policy? ()
A. urlhashB. url persistencyC. cookie persistencyD. default persistency
考题
operate by distributing a workload evenly over multiple back end nodes.Typically the cluster will be configured with multiple redundant load-balancing front ends.A.High-availability clustersB.Load-balancing clustersC.Grid computingD.Cloud Computing
考题
Your company has an Active Directory forest named contoso.com. You plan to deploy an Exchange Server 2010 organization that will contain two servers. Each server will have the Client Access server role, the Hub Transport server role, and the Mailbox serverrole installed. You plan to add both servers to a database availability group (DAG). You need to recommend a high-availability solution for the Client Access server role. Your solution must ensure that users are not prompted to authenticate if a Client Access server becomesunavailable. What should you recommend?()A、Create and configure a Client Access server array,and then install a hardware load balancer.B、Create and configure a Client Access server array,and then install Windows Network Load Balancing on both servers.C、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006,and then implement DNS round robin.D、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006,and then install Windows Network Load Balancing.
考题
An enterprise has an internal web application that needs stickiness managed by a Cluster. Allemployees access the application through a proxy. What is the correct sticky load balancing policy? ()A、urlhashB、url persistencyC、cookie persistencyD、default persistency
考题
Your network contains a Web-based application that runs on Windows Server 2003. You plan to migrate the Web-based application to Windows Server 2008 R2. You need to recommend a server configuration to support the Web-based application. The server configuration must meet the following requirements: èEnsure that the application is available to all users if a single server?fails èSupport the installation of .NET applications èMinimize software costs What should you recommend?() A、Install the Server Core installation of Windows Server 2008 R2 Standard on two servers. Configure the servers in a Network Load Balancing cluster.B、Install the full installation of Windows Server 2008 R2 Web on two servers. Configure the servers in a Network Load Balancing cluster.C、Install the full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.D、Install the full installation of Windows Server 2008 R2 Datacenter on two servers. Configure the servers in a failover cluster.
考题
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. Your company has a Network Load Balancing cluster named nlb.wiikigo.com.The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenlydistributes HTTP traffic between both hosts. WEB2 needs to be configured to handle all HTTPS traffic fornlb.wiikigo.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2. What should you do to achieve this?()A、In the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Single host.B、In the properties for WEB2, the Handling priority option for the TCP 443 port rule should be changed tothe value of 1.C、In the properties for WEB1, the Handling priority option for the TCP 443 port rule should be changed tothe value of 0.D、In the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Multiple host and the Affinity option set to the value of Single.
考题
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster. What should you do? ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.
考题
Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2. You plan to publish a Web site on two Web servers. You need to deploy an availability solution for your Web servers that meets the following requirements: èSupports the addition of more Web servers without interrupting client connections èEnsures that the Web site is accessible even if a single server fails What should you do?()A、Configure a failover cluster.B、Configure a Web garden on each Web server.C、Create a Network Load Balancing cluster.D、Create two application pools on each Web server.
考题
You have a Windows Server 2008 R2 Hyper-V failover cluster that has 16 nodes. You plan to load- balance eight virtual machines (VMs) on the Hyper-V failover cluster by using network load balancing (NLB). You need to ensure that the NLB cluster converges. What should you do?()A、Set the NLB cluster type to MulticastB、Dedicate a virtual network for all NLB trafficC、Use static MAC addresses for the parent network adapterD、Enable spoofing of MAC addresses on the virtual network adapter
考题
Your company plans to deploy eight file servers that run Windows Server 2008 R2. All file servers will connect to Ethernet switches. You need to plan a data storage solution that meets the followingrequirements: èAllocates storage to the servers as needed èUtilizes the existing network infrastructure èMaximizes performance èMaximizes fault tolerance Which actions should you include in your plan?()A、Install Windows Server 2008 R2 Datacenter on each server. Deploy the servers in a failover cluster. deploy an iSCSI storage area network (SAN).B、Install Windows Server 2008 R2 Standard on each server. Deploy the servers in a Network Load balancing (NLB) cluster. Implement RAID?5 on each server.C、Install Windows Server 2008 R2 Enterprise on each server. Deploy the servers in a failover cluster. deploy a Fibre Channel (FC) storage area network (SAN).D、Install Windows Server 2008 R2 Enterprise on each server. Deploy the servers in a Network Load balancing (NLB) cluster. Map a network drive on each server to an external storage array.
考题
You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster. The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template. You need to implement protective measures against the cluster’s most significant security vulnerability. What should you do? ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.
考题
Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
考题
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster. The nodes have a single network adapter and are connected to the same switching hub device. Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers. You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device. You do not want to move the cluster to another switching hub device. What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.
考题
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully. You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node. However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF://0A:32:08:46." In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF://0A:32:08:46." Only the hardware address is different in the two descriptions. You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes. You want to configure a four-node Network Load Balancing cluster. What should you do? ()A、 Configure the fourth node to use multicast mode.B、 Remove 10.50.8.70 from the Network Connections Properties of the fourth node.C、 On the fourth node, run the nlb.exe resume command.D、 On the fourth node, run the wlbs.exe reload command.
考题
Your company named Contoso, Ltd. has a Web server named WEB1. The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com. The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site. You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()A、Contoso, Ltd.B、owa.contoso.comC、WEB1D、web1.contoso.com
考题
You need to design the Exchange 2003 server configuration for remote e-mail access. What should you do?()A、Configure the front-end servers in each branch office to be members of a new Active Directory siteB、Configure the back-end servers to have server encryption certificates issued by a commercial certification authority (CA)C、Configure two back-end servers to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound RPC connectionsD、Configure multiple front-end servers in each branch office to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound HTTPS connections
考题
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You work in a company named Wiikigo, Ltd. and there is a two-node Network Load Balancing cluster. Onlythe intranet Web site will be provided with the high availability and load balancing by the cluster. Thecompany names the cluster as web.wiikigo.com. You find a problem that the Network Load Balancingcluster can be seen in the network neighborhood by the Wiikigo users. And the users can utilize the web.wiikigo.com name to get access to various services. The web.wiikigo.com Network Load Balancing clusteris set with only one port rule. Since you are the technical support, you are required have the web.wiikigo.com Network Load Balancing cluster configured to receive only HTTP traffic. Which two actions should be performed to achieve the goal?()A、To achieve the goal, the Network Load Balancing Clusters console should be opened and a new Allow rule should be created for TCP port 80.B、To achieve the goal, the Network Load Balancing Clusters console should be opened and the default port rule should be modified to a disabled port range rule.C、To achieve the goal, one of the cluster nodes should be logged on to and the wlbs disable all command should be run.D、To achieve the goal, the Network Load Balancing Clusters console should be opened and the default port rules should be deleted.
考题
Your network contains two servers that run the Server Core installation of Windows Server 2008 R2. The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site. Administrators use client computers that run Windows 7. You need to recommend a strategy that allows the administrators to remotely manage the Network Load Balancing cluster. Your strategy must support automation. What should you recommend?()A、On the servers, enable Windows Remote Management (WinRM).B、On the servers, add the administrators to the Remote Desktop Users group.C、On the Windows 7 client computers,enable Windows Remote Management (WinRM).D、On the Windows 7 client computers,add the administrators to the Remote Desktop Users group.
考题
Your company named Contoso, Ltd. has a Network Load Balancing cluster named nlb.contoso.com. The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenly distributes HTTP traffic between both hosts. You need to configure WEB2 to handle all HTTPS traffic for nlb.contoso.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2. Which two actions should you perform?()A、In the properties for WEB2, change the Handling priority option for the TCP 443 port rule to the value of1.B、In the properties for WEB1, change the Handling priority option for the TCP 443 port rule to the value of 0.C、In the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering mode option set to Single host.D、In the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering mode option set to Multiple host and the Affinity option set to the value of Single.
考题
You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment. The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application. You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.
考题
Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com. You also discover that there is only one port rule configured for Network Load Balancing cluster. You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only. Which two actions should you perform to achieve this objective()A、Create a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleB、Run the wlbs disable command on the cluster nodesC、Assign a unique port rule for NLB cluster by using the NLB Cluster consoleD、Delete the default port rules through Network Load Balancing Cluster console
考题
You need to design access to Microsoft Outlook Web Access for remote users. What should you do?()A、Place all user mailboxes on back-end servers. Deploy Outlook Web Access on three front-end servers that are members of the Network Load Balancing clusterB、Place all user mailboxes on back-end servers that are members of a Network Load Balancing cluster. Deploy Outlook Web Access on the back-end serversC、Place mailboxes for remote users on one back-end server and place all mailboxes for main office users on another back-end server. Deploy Outlook Web Access on the back-end server that contains the mailboxes for remote usersD、Place all user mailboxes on two back-end servers that are members of a Network Load Balancing cluster. Place mailboxes for remote users and mailboxes for main office users into separate storage groups. Deploy Outlook Web Access on three front-end servers. Configure the front-end servers to access only the back-end Network Load Balancing cluster
考题
单选题You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster. The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template. You need to implement protective measures against the cluster’s most significant security vulnerability. What should you do? ()A
Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B
Use packet filtering on all inbound traffic to the cluster.C
Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D
Use intrusion detection on the perimeter network.
考题
单选题Your network includes several virtual machines (VMs) that are distributed across a Windows Server 2008 R2 Hyper-V failover cluster. You need to be able to configure the VMs in a Network Load Balancing (NLB) cluster. What should you do on each VMs network adapter?()A
Enable MAC address spoofing.B
Disable MAC address spoofing.C
Enable TCP Offload Engine(TOE).D
Disable TCP Offload Engine(TOE).
考题
单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment. The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application. You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()A
Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B
Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C
Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D
Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.
考题
单选题Your company named Contoso, Ltd. has a Web server named WEB1. The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com. The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site. You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()A
Contoso, Ltd.B
owa.contoso.comC
WEB1D
web1.contoso.com