网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()
A
DHCP
B
PAT
C
Proxy
D
IPX
参考答案
参考解析
解析:
暂无解析
更多 “单选题A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A DHCPB PATC ProxyD IPX” 相关考题
考题
A typical application of this(71)is ADSL. It is emerging as the technology for home-and small-office Internet connectivity. It provides either 1.5 Mb/s~8 Mb/s from the network to the user and 64 Kb/s~512 Kb/s in the reverse direction depending on the distance, 12 000 or 18 000 feet.. The different speed for each direction gives it the(72)label. ADSL is designed to take advantage of the fact that video-on demand, telecommuting, and Internet access traffic are inherently asymmetrical. The user(73)a brief message up to the network and receives a ton of data coming back, either a movie or a piece of data download. Under such a scenario, low-speed traffic to the network is just fine. ADSL delivers high(74)where you need it and only uses a single copper pair. Through multiplexing, it also reserves(75)of the bandwidth for POTS.A.FTTHB.HFCC.FTTCD.HDSL
考题
A technician needs to ensure that a specific application on a single home user‘s computerreceives Internet traffic reliably. The home network provides access to three other users and theapplication relies on a specific protocol.Which of the following should the technician use?()A. DHCPB. PATC. ProxyD. IPX
考题
Which three statistics does the Executive report summarize?() (Choose three.)A、latency and lossB、compression resultsC、traffic (by application)D、CRC and alignment errorsE、user access (by username)
考题
A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()A、Remotely connect to the user's laptop and review the network configuration settingsB、Ping the web server from inside the network to ensure it is still up and running.C、Check to make sure the company's website is accessible from the Internet.D、Ensure the Ethernet cable is securely plugged into the user's laptop
考题
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()A、reflexiveB、extendedC、standardD、dynamic
考题
A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer. Which of the following would be another way for the user to send the Remote Assistance invitation? ()A、Configuring the Windows Firewall exceptions.B、Using Windows Messenger.C、Configuring My Network Places.D、Using Internet Explorer.
考题
A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A、DHCPB、PATC、ProxyD、IPX
考题
A customer’s computer crashes consistently when a specific application is launched. Thetechnician has looked at the computer and confirmed the cause of the crash. Which of thefollowing is the NEXT troubleshooting step the technician should take?()A、Verify full system functionality.B、Document the findings, actions, and outcomes.C、Establish a plan of action to resolve the problem.D、Question the user and identify changes the user has made to the system.
考题
An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()A、NATB、WPSC、MAC filteringD、Port forwarding
考题
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.
考题
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()A、 Configure the system event log to Do not overwrite.B、 In IAS, in Remote Access Logging, enable the Authentication requests setting.C、 Configure the Remote Access server to Log all events.D、 Create a custom remote access policy and configure it for Authentication-Type.
考题
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor. B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.
考题
You administer Company's network that consists of 100 Windows 2000 Professional computers and nine Windows 2000 Server computers. All users at Company save their work files in home folders on a network server. The network server is configured with two NTFS volumes. One of the NTFS volumes contains the home folders for the users at Company and the other NTFS volume contains a shared folder named PROGRESS, which is used for users to save temporary work files in. Disk quotas and Encrypting File System (EFS) is enabled on the NTFS volume with the home folders. All users have a default limit of 100 MB and the option to deny space to users who exceed their limit has been enabled. A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder. The user currently has no data stored in the PROGRESS folder. When he attempts to save files to his home folder, he receives the following error message: "Insufficient disk space." Other users are not experiencing this problem with their home folders. You want to allow the user to save files on the network server. What should you do?()A、 Use Windows Backup to archive and remove old files on the server.B、 Compress the files in the user’s home folder to allow additional files to be saved.C、 Move some of the files from the user’s home folder to the PROGRESS share folder.D、 Log on the network as a Recovery Agent. Decrypt all of the user’s files in his home folder. E、 Lon on to the network by using the domain Administrator account. Grant the user Full Control permission to his home folder.
考题
You use Microsoft .NET Framework 4 to create a Windows application. You use ClickOnce technology to install the application on computers that run Windows 7 with User Access Control (UAC) enabled. The application requires access to environment variables on each computer. You need to ensure that users who do not have administrative permissions can install the application. Which deployment method should you use? ()A、Start from Web.B、Install from Web.C、Start from network shareD、Install from network share.
考题
单选题Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. All client computers run Windows 7. All user accounts are stored in an organizational unit (OU) named Staff. All client computer accounts are stored in an OU named Clients. You plan to deploy a new application. You need to ensure that the application deployment meets the following requirements: èUsers must access the application from an icon on the Start menu. èThe application must be available to remote users when they are offline. What should you do?()A
Publish the application to users in the Staff OU.B
Publish the application to users in the Clients OU.C
Assign the application to computers in the Staff OU.D
Assign the application to computers in the Clients OU.
考题
单选题A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()A
reflexiveB
extendedC
standardD
dynamic
考题
单选题A customer’s computer crashes consistently when a specific application is launched. Thetechnician has looked at the computer and confirmed the cause of the crash. Which of thefollowing is the NEXT troubleshooting step the technician should take?()A
Verify full system functionality.B
Document the findings, actions, and outcomes.C
Establish a plan of action to resolve the problem.D
Question the user and identify changes the user has made to the system.
考题
单选题You use Microsoft .NET Framework 4 to create a Windows application. You use ClickOnce technology to install the application on computers that run Windows 7 with User Access Control (UAC) enabled. The application requires access to environment variables on each computer. You need to ensure that users who do not have administrative permissions can install the application. Which deployment method should you use? ()A
Start from Web.B
Install from Web.C
Start from network shareD
Install from network share.
考题
单选题An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()A
NATB
WPSC
MAC filteringD
Port forwarding
考题
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()A
Monitor the performance monitor counters on the application server by using System Monitor. B
Monitor the network traffic on the application server by using Network Monitor.C
Monitor network statistics on the application server by using Task Manager.D
Run network diagnostics on the application server by using Network Diagnostics.
考题
多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.
考题
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()A
Configure the system event log to Do not overwrite.B
In IAS, in Remote Access Logging, enable the Authentication requests setting.C
Configure the Remote Access server to Log all events.D
Create a custom remote access policy and configure it for Authentication-Type.
考题
单选题You administer Company's network that consists of 100 Windows 2000 Professional computers and nine Windows 2000 Server computers. All users at Company save their work files in home folders on a network server. The network server is configured with two NTFS volumes. One of the NTFS volumes contains the home folders for the users at Company and the other NTFS volume contains a shared folder named PROGRESS, which is used for users to save temporary work files in. Disk quotas and Encrypting File System (EFS) is enabled on the NTFS volume with the home folders. All users have a default limit of 100 MB and the option to deny space to users who exceed their limit has been enabled. A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder. The user currently has no data stored in the PROGRESS folder. When he attempts to save files to his home folder, he receives the following error message: "Insufficient disk space." Other users are not experiencing this problem with their home folders. You want to allow the user to save files on the network server. What should you do?()A
Use Windows Backup to archive and remove old files on the server.B
Compress the files in the user’s home folder to allow additional files to be saved.C
Move some of the files from the user’s home folder to the PROGRESS share folder.D
Log on the network as a Recovery Agent. Decrypt all of the user’s files in his home folder. E
Lon on to the network by using the domain Administrator account. Grant the user Full Control permission to his home folder.
考题
单选题A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()A
Remotely connect to the user's laptop and review the network configuration settingsB
Ping the web server from inside the network to ensure it is still up and running.C
Check to make sure the company's website is accessible from the Internet.D
Ensure the Ethernet cable is securely plugged into the user's laptop
考题
单选题A technician is trying to connect from a home computer to their office computer, but cannotconnect via Remote Desktop. Which of the following ports needs to be open for RDP traffic to be allowed?()A
21B
80C
443D
3389
考题
单选题A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer. Which of the following would be another way for the user to send the Remote Assistance invitation? ()A
Configuring the Windows Firewall exceptions.B
Using Windows Messenger.C
Configuring My Network Places.D
Using Internet Explorer.
考题
单选题A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A
DHCPB
PATC
ProxyD
IPX
热门标签
最新试卷