网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()

  • A、The switch name must match the workgroup name of the local network.
  • B、The switch must be configured with an IP address and default gateway.
  • C、The remote workstations must have access to the management VLAN of the switch.
  • D、CDP must be enabled on the switch so that it can be located by other devices on the network.

参考答案

更多 “You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A、The switch name must match the workgroup name of the local network.B、The switch must be configured with an IP address and default gateway.C、The remote workstations must have access to the management VLAN of the switch.D、CDP must be enabled on the switch so that it can be located by other devices on the network.” 相关考题
考题 You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?A. STPB. GVRPC. SNMPD. VTPE. DHCPF. None of the above

考题 You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

考题 You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()A、You should consider configuring recipient filtering.B、You should consider configuring sender reputation.C、You should consider configuring content filtering.D、You should consider configuring sender filtering.

考题 ou work as an administrator at ABC.com. The ABC.com network consists of an Active Directory forest that contains a root domain, named ABC.com, and two child domains, named us.ABC.com and uk.ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The root domain hosts a domain local distribution group, named ABCGroup. You are preparing to issue ABCGroup read-only access to a shared folder hosted by the us.ABC.com domain. You want to make sure that ABCGroup is able to access the shared folder in the us.ABC.com domain.  Which of the following actions should you take?()A、You should consider re-configuring ABCGroup as a universal Admins group.B、You should consider re-configuring ABCGroup as a universal security group.C、You should consider re-configuring ABCGroup as a global administrators group.D、You should consider re-configuring ABCGroup as a local administrators group.

考题 You are configuring networking for a new Windows Server 2003 SP2 virtual machine(VM)in a Windows Server 2008 R2 Hyper-V environment.You need to configure the VM to achieve optimum network performance. Which two actions should you perform?()A、.Install Integration Services on the VM.B、In the virtual machine settings, add a Network Adapter.C、In the virtual machine settings, add a Legacy Network Adapter.D、Configure a fixed maximum transmission unit (MTU) size of 1384 on the host server virtual network adapter.

考题 Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.

考题 You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows  Server 2012 R2 installed.You have installed the DNS Server Role on a ABC.com server, named ABC-SR13. ABC.com’s workstations make use of a web proxy to access the Internet, and refer to ABC-SR13 as a primaryDNS server.You have been instructed to make sure that Internet host names for ABC.com’s workstations are not resolved by ABC-SR13.  Which of the following actions should you take?()A、You should consider configuring a primary zone on ABC-SR13.B、You should consider configuring a secondary zone on ABC-SR13.C、You should consider configuring a reverse lookup zone on ABC-SR13.D、You should consider configuring a forward lookup zone on ABC-SR13.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The Web Server(IIS) server role and the FTP Publishing Service role service are installed on the server. You have a newFTP site added to the server. You have to make sure that the new FTP site is available. In order to makesure of this,what action should you perform?()A、In order to make sure of this, the iisreset command should be run on the server.B、In order to make sure of this, a host header file should be configured in the default Web site properties.C、In order to make sure of this, an alternate IP address should be configured in the default Web siteproperties.D、In order to make sure of this, an alternate TCP port should be configured in the FTP site properties.E、In order to make sure of this, an alternate IP address should be configured in the FTP site properties.

考题 You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to modify the name of the local Administrator account on all ABC.com workstations. You want to achieve this using as little administrative effort as possible. Which of the following actions should you take?()A、You should consider configuring the Security Options settings via the Group Policy Management Console (GPMC).B、You should consider configuring the Security Options settings via Server Manager.C、You should consider configuring the replication settings.D、You should consider navigating to Local Users and Groups via Computer Management on each workstation.

考题 You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed. Some of ABC.com’s workstations have Windows 7 installed, while the rest have Windows 8 installed.  After installing a new Windows Server 2012 R2 computer in the ABC.com domain, you configure it to run the File and Storage Services server role.You are instructed to create a shared folder on the new server, and configure the use of Previous Versions for restoring files located in the shared folder.  Which of the following actions should you take?()A、You should consider configuring the Shadow Copies settings on the new server.B、You should consider configuring the Snapshot settings on the new server.C、You should consider configuring the Background Copy settings on the new server.D、You should consider configuring the Permission settings on the new server.

考题 You are a database administrator for your company. You are configuring a new SQL Server 2005 computer named SQL1. SQL1 will run Reporting Services. It will also be configured to automatically perform database backups and other maintenance tasks. There are no other SQL Server computers in the network environment. All access to SQL1 will be made by using SQL1s DNS name. You need to disable any unnecessary services on SQL1. Which service or services should you disable?()A、Internet Information ServicesB、SQL Server BrowserC、SQL Server AgentD、Microsoft Distributed Transaction Coordinator

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server in your company. Windows Server 2008 is run by the serverand the server has the Hyper-V server role installed.A new virtual machine is created. You are required to configure the virtual machine, and the requirements listed below should be satisfied.First, network communications should be permitted between the virtual machine and the host system.Second, communications should be prevented with other network servers. To achieve the goal,which action should be performed first?()A、To achieve the goal, the Connection should be set to None for the network interface card.B、To achieve the goal, the Microsoft Loopback Adapter should be installed.C、To achieve the goal, a new Virtual Network should be created.D、To achieve the goal, Internet Connection Sharing (ICS) should be enabled.

考题 You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You have a Terminal Services farm that contains several Terminal Servers. One of the Terminal Serversshould be configured as a dedicated redirector. After you configure the appropriate DNS records,what action should you perform next?()A The server should be configured to deny new user logons from Terminal Services Configuration.B The licensing mode should be set to per user from Terminal Services Configuration.C The licensing mode should be set to per device from Terminal Services Configuration.D The relative weight of the server should be changed to 50 from Terminal Services Configuration.

考题 单选题You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()A You should consider configuring recipient filtering.B You should consider configuring sender reputation.C You should consider configuring content filtering.D You should consider configuring sender filtering.

考题 单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A STPB GVRPC SNMPD VTPE DHCP

考题 多选题You are a Windows Server 2008 systems administrator responsible for configuring the Streaming MediaServices server role. Your organization would like to make numerous human resources training videosavailable for access by its employees. Employees should be able to pause and fast-forward content asneeded. You also want to ensure that users can access the content only while they are connected to your company's LAN. Which actions should you take?()ACreate a new broadcast publishing point.BCreate a new on-demand publishing point.CEnable WMS IP Address Authorization for the publishing point.DEnable WMS Negotiate Authentication for the publishing point.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A new server is administered by you, and Windows Server 2008 is run by theserver. You decide to have the Streaming Media Services role installed on the server. Users will utilizeWindows Media Player to access content on the new server for Windows Vista and Windows Media Playerfor Mac. And you are required to have the Streaming Media Services server role installed on the server tosupport both media players.  Which action should be performed to achieve the goal?()A To achieve the goal,Session Initiation Protocol (SIP) should be installed.B To achieve the goal,Simple Object Access Protocol (SOAP) should be installed.C To achieve the goal,Stream Control Transmission Protocol (SCTP) should be installed.D To achieve the goal,RPC over HTTPS should be installed.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server in your company. And windows Server 2008 is run. WindowsSharepoint Services (WSS) is installed on the server. You configure the server so as to make it receiveincoming e-mail. A new document library should be created. In addition, you should make sure that e-mailcan be sent to the document library by any user. Which action should be performed to achieve the goal?()A To achieve the goal,Enable anonymous authentication should be enabled for the Web applicationB To achieve the goal,the RSS setting should be changed for the document libraryC To achieve the goal,the permissions should be changed for the document libraryD To achieve the goal,the incoming e-mail settings should be changed for the document library

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The TerminalServices server role is installed on the server. A Terminal Services application runs on the server. Now youreceive report from users saying that that the application stops responding. You monitor the memory usageon the server for a week and find that the application has a memory leak. A patch is not currently available.You create a new resource-allocation policy in Microsoft Windows System Resource Manager (WSRM).You configure a Process Matching Criteria named TrackShip and choose the application. You have toterminate the application when the application consumes more than half of the available memory on theserver. What action should you perform?()A The resource-allocation policy and the maximum working set limit option should be set to half the available memory on the server. The new policy should be set as a Managing Policy.B The resource-allocation policy and the maximum committed memory option should be set to half the available memory on the server. The new policy should be set as a Profiling Policy.C The resource-allocation policy and the maximum committed memory option should be set to half the available memory on the server. The new policy should be set as a Managing Policy.D The resource-allocation policy should be configured and the maximum working set limit option should be set to half the available memory on the server. The new policy should be set as a Profiling Policy.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server in your company. Windows Server 2008 is run by the serverand the server has the Hyper-V server role installed.A new virtual machine is created. You are required to configure the virtual machine, and the requirements listed below should be satisfied.First, network communications should be permitted between the virtual machine and the host system.Second, communications should be prevented with other network servers. To achieve the goal,which action should be performed first?()A To achieve the goal, the Connection should be set to None for the network interface card.B To achieve the goal, the Microsoft Loopback Adapter should be installed.C To achieve the goal, a new Virtual Network should be created.D To achieve the goal, Internet Connection Sharing (ICS) should be enabled.

考题 单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed. Some of ABC.com’s workstations have Windows 7 installed, while the rest have Windows 8 installed.  After installing a new Windows Server 2012 R2 computer in the ABC.com domain, you configure it to run the File and Storage Services server role.You are instructed to create a shared folder on the new server, and configure the use of Previous Versions for restoring files located in the shared folder.  Which of the following actions should you take?()A You should consider configuring the Shadow Copies settings on the new server.B You should consider configuring the Snapshot settings on the new server.C You should consider configuring the Background Copy settings on the new server.D You should consider configuring the Permission settings on the new server.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The Web developer at your company creates a new Web sitethat runs an ASP.NET 3.0 Web application. The ASP.NET Web application must run under a securitycontext that is separate from any other ASP.NET application on the Web server. You create a local useraccount and grant account rights and permissions to run the ASP.NET Web application. Authentication forthe new Web site should be configured to support the Web application. What action should you perform?()A The ASP.NET Impersonation setting should be configured to Enabled. Edit the ASP.NET Impersonation setting by specifying the new local user account.B The Windows Authentication setting should be configured to Enabled.C The Forms Authentication setting should be configured to Enabled by using all the default settings.D The ASP.NET State Service should be configured to log on to the new local user account by using the Services console.

考题 单选题You need to recommend a solution for configuring the Automatic Updates settings on the VMs.   What should you include in the recommendation?()A block inheritanceB loopback processingC security filteringD WMI filtering

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server that runs Windows Server 2008. The Terminal Services server role is installed on theserver. You have a new application deployed on the server. The application creates files that have anextension of .xyz. You have to make sure that users are able to launch the remote application from theircomputers by double-clicking a file that has the .xyz extension. What action should you perform?()A The Remote Desktop Connection Client on the users’ computers should be configured to point to theserver.B Configure the application as a published application You should use a Remote Desktop Program file.C Configure the application as a published application by using a Microsoft Windows Installer packagefile.D Configure the application as a published application by using a Terminal Server Web Access Web site.

考题 单选题Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A You should consider configuring the sender reputation.B You should consider configuring the sender filtering.C You should consider configuring the content filtering.D You should consider configuring the recipient filtering.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a Windows Server 2008 server, and the Web Server (IIS) server roleis installed on the server. Multiple Web sites are hosted by the server. Since you are the technical support,you are required to set the server to make it automatically release memory for a single Web site. What's more, no other Web sites should be impacted. Which action should be performed to achieve the goal?()A From the Application Pool Defaults, the Recycling options should be changed.B A new Web site should be created and the bindings should be edited for the Web site.C A new application pool should be created and the Web site should be associated to the application pool.D A new virtual directory should be created and the Physical Path Credentials on the virtual directoryshould be changed.