网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()
- A、 Only use fiber in pairs.
- B、 Configure root guard on your switches.
- C、 Do not use fiber but use copper.
- D、 Configure UDLD to prevent one-way link conditions.
参考答案
更多 “You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()A、 Only use fiber in pairs.B、 Configure root guard on your switches.C、 Do not use fiber but use copper.D、 Configure UDLD to prevent one-way link conditions.” 相关考题
考题
Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.Which three are supported to determine the users location?()A. MAC addressB. DNS serverC. DHCP serverD. resolve addressE. endpoint address
考题
Which two statements about the use of SCREEN options are correct? ()(Choose two.)
A. SCREEN options offer protection against various attacksB. SCREEN options are deployed prior to route and policy processing in first path packet processingC. SCREEN options are deployed at the ingress and egress sides of a packet flowD. SCREEN options, you must take special care to protect OSPF
考题
An application that needs to use a shared library has a deployment descriptor that only specifies the Specification-Version and Extension-Name of the shared library. When the application is deployed, which shared library will be used?()A、The application will go into an ADMIN state and fail to deploy because the Implementation- Version is required.B、The application will be deployed but the classes in the shared library will not be available.C、If you are using the WebLogic Admin Console, you will be prompted for the version you want to use; otherwise, the application will fail to deploy.D、If there are multiple versions of the shared library deployed, WebLogic will use the one with the highest Implementation-Version.E、If there are multiple versions of the shared library deployed, WebLogic will use the one that was deployed most recently.
考题
You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. A new TestKing.com security policy requires that smart cardauthentication be used for all connections to Outlook Web App (OWA). During the course of day you receive an instruction form the CIO to recommend a solution to management that will comply with the new security policy. What should you do?()A、You should recommend that an Edge Transport server be deployed.Thereafter Windows Integrated authentication should be disabled.B、You should recommend that a certificate-based authentication be required for all Internet-facing Client access servers.C、You should recommend that a server that is configured to run Microosft Internet Security and acceleration (ISA)Server be deployed.Thereafter Kerberos contrained delegation should be enabled.D、You should recommend that Windows Integrated Authentication be compulsary for all Internet-facing client Access servers.
考题
Your customer has deployed a cisco wireless location appliance within its warehouse environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. you use an access point scan to determine if the location appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct the problem?()A、ensure channels are deployed such that they do not overlapB、allow for the automatic containment of rogue access pointsC、ensure each area is covered by a minimum of three access pointsD、ensure a minimum rssi value of -50
考题
If it is properly deployed,a controller-based access point is capable of monitoring all VLANs on anetwork when you select which of the following modes from the AP Mode drop-down menu on thecontroller?()A、MirrorB、Rogue DetectorC、SnifferD、Monitor
考题
If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on anetwork when you select which of the following modes from the AP Mode drop-down menu onthe controller?()A、MonitorB、Rogue DetectorC、SnifferD、Mirror
考题
You are the network administrator of an enterprise company that just deployed a global IP telephony environment. In order to guarantee good voice quality, you asked your provider to implement QoS on the CE routers of your MPLS network. On your LAN, you have also deployed QoS. Users, however, keep complaining about bad voice quality, and the provider does not see matches on the DSCP values that you have asked him to match upon. What is most likely the problem?()A、The phones are not sending traffic with the correct DSCP value.B、The Cisco CallManager is not marking the traffic correctly.C、This is most likely a bug on the CE routers.D、Your LAN QoS is incorrectly configured.
考题
You deployed a Java EE Shared Library and want to use it from an application that is also deployed on the same cluster. Which two manifest attributes must be specified at a minimum with corresponding values in the deployment descriptor of the application that requires?()A、Implementation-VersionB、Specification-VersionC、Extension-Name D、Specification-VendorE、Implementation-Vendor
考题
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2003 as their messaging solution.You have added a new server to the network and deployed Exchange Server 2010 on it with the default settings.What command must be used to change the default e-mail address policy?()A、You must use the setup /NewProvisionedServer.B、You must use the lpsetupui.exe.C、You must use the Set-EmailAddressPolicy cmdlet.D、You must use the Setup.com /AnswerFile:Exchange-All.xml.
考题
An administrator named Admin1 plans to deploy operating systems to the planned VMs. You need to recommend a configuration plan for the VMs. The plan must ensure that the operating systems can be deployed to the VMs. What should you include in the recommendation?()A、a synthetic network adapterB、an emulated network adapterC、virtual machine queue (VMQ)D、Virtual Machine Chimney
考题
You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()A、virtual machine queue (VMQ)B、Virtual Machine ChimneyC、a synthetic network adapterD、an emulated network adapter
考题
多选题Your network contains an Active Directory domain. The network has DirectAccess deployed.You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.You need to ensure that users can view their DirectAccess status by using the DCA.Which two group policy settings should you configure?()ADynamic Tunnel Endpoints (DTEs)BCorporate Portal SiteCCorporate ResourcesDPortalName
考题
单选题You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()A
virtual machine queue (VMQ)B
Virtual Machine ChimneyC
a synthetic network adapterD
an emulated network adapter
考题
单选题Your network contains an Active Directory domain named contoso.com. The network has DirectAccess deployed.You deploy a new server named Server1 that hosts a management application.You need to ensure that Server1 can initiate connections to DirectAccess client computers.Which settings should you modify from the DirectAccess Setup console?()A
Application ServersB
DirectAccess ServerC
Infrastructure ServersD
Remote Clients
考题
多选题You deployed a Java EE Shared Library and want to use it from an application that is also deployed on the same cluster. Which two manifest attributes must be specified at a minimum with corresponding values in the deployment descriptor of the application that requires?()AImplementation-VersionBSpecification-VersionCExtension-NameDSpecification-VendorEImplementation-Vendor
考题
多选题You need to recommend which role services must be deployed to support the company’s planned changes. Which two role services should you recommend?()AHealth Registration Authority (HRA)BHost Credential Authorization Protocol (HCAP)CNetwork Policy Server (NPS)DRouting and Remote Access service (RRAS)
考题
单选题If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on a networkwhen you select which of the following modes from the AP Mode drop-down menu on the controller?()A
MonitorB
Rogue DetectorC
SnifferD
Mirror
考题
多选题Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()AMAC addressBDNS serverCDHCP serverDresolve addressEendpoint address
考题
多选题Which two statements about the use of SCREEN options are correct? ()(Choose two.)ASCREEN options offer protection against various attacksBSCREEN options are deployed prior to route and policy processing in first path packet processingCSCREEN options are deployed at the ingress and egress sides of a packet flowDSCREEN options, you must take special care to protect OSPF
考题
单选题You work as an Exchange Administrator for TechWorld Inc.The company has a Windows 2008 Active Directory-based contains an Exchange Server 2010 organization.You have deployed Hub Transport server, Client Access server, Unti Mailbox server in the messaging organization.You have not deployed any Edge Transport server in the messaging c following servers can be used to receive and send mail traffic to the Internet?()A
Server configured with the Client Access server role.B
Server configured with the Hub Transport role.C
Server configured with the Mailbox role.D
Server configured with the Unified Messaging server role.
热门标签
最新试卷