网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

●WWW is a large network of Internet servers providing (75) and other services to terminals running client applications such as a browser.

(75)A.modem

B.compression

C.hypertext

D.encode


参考答案

更多 “ ●WWW is a large network of Internet servers providing (75) and other services to terminals running client applications such as a browser.(75)A.modemB.compressionC.hypertextD.encode ” 相关考题
考题 ●The Simple Network Management Protocol (SNMP)is an (71) protocol that facilitates the exchange of management information between (72) .It is part of the Transmission Control Protocol/Internet Protocol(TCP/IP) protocol suite.SNMP enables network (73) to manage network performance, find and sole network problems,and plan for (74) .An SNMP-managed network consists of three key components:managed devices , (75) ,and network-management systems .(71) A.Physical LayerB.Link LayerC.Network LayerD.Transport Layer(72) A.network stationsB.network clientsC.network devicesD.network servers(73) A.serversB.administratorsC.computersD.routers(74) A.network growthB.network structureC.network architectureD.network servers(75) A.administratorsB.agentsC.managersD.servers

考题 ● WWW is a large network of internet servers providing (75)and other services to terminals running client applications such as a browser.(75) A. modemB. compressionC. hypertextD. encode

考题 What do large banks allow individual banks to do?A.To sell credit cards to consumers.B.To join their credit card network.C.To provide other banking services.D.To specialize in federal funds.

考题 When you are(71)a home or small office network, it is recommended that you use the Network Setup Wizard in Windows XP Home Edition to enable Internet Connection Sharing. The Network Setup Wizard automatically provides all of the network settings you need to(72)one Internet connection with all the computers in your network.After ICS is enabled, and you make sure that all of your computers can(73)with each other and they have Internet(74), you can use programs such as Internet Explorer and Outlook Express as if they were(75)connected to the Internet service provider(ISP). When a request to the Internet is made, the ICS host computer connects to the ISP and creates the connection so that other computers can reach a specified Web address or download E-mail.A.creatingB.reachC.going forD.setting up

考题 WWW is a large network of Internet servers providing (75) and other services to terminals running client applications such as a browser.A.modemB.compressionC.hypertextD.encode

考题 You are the administrator of a Windows 2000 Network for Ezonexam Inc. The network includes four Web servers named WWW1, WWW2, WWW3, and WWW4. Your network also includes a Windows 2000 Server computer that uses DNS.Each Web server contains exactly the same content, and users accessing www.Ezonexam.com can be directed to any one of them.You add records to your DNS server, as shown in the following table.Record type Name IP addressCNAME www 192.168.10.5CNAME www 192.168.10.6CNAME www 192.168.10.7CNAME www 192.168.10.8When you examine the logs for the Web servers, you discover that all incoming traffic is being directed to 192.168.10.5, which is the IP address for WWW1.You want the incoming traffic to be balanced across the four Web servers. What should you do?A.Select the Disable recursion check box in the properties of the DNS server.B.Enable round-robin in the properties of the DNS server.C.Enable W3C logging in the properties of the Web servers.D.Install and configure Network Load Balancing on WWW1.

考题 WWW is a large network of Internet servers providing ______ and other services to terminals running client applications such as a browser. A.modem B.compression C.hypertext D.encode]

考题 WWW is a large network of Internet servers providing______and other services to terminals running client applications such as a browser.A.modem B.compression C.hypertext D.encode

考题 IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic] B.private] C.personal D.proper

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. Windows Server 2008 is run by your company named Wiikigo, Ltd. A Webserver named S01 is administered by you. Internet users utilize http://www.wiikigo.com and https://www.wiikigo.com to get access to S01. An SSL certificate from a public certification authority (CA) is utilized bythe S01 server. An additional Web server named S02 is installed. A Network Load Balancing cluster isconfigured to distribute the incoming HTTP and HTTPS traffic between both Web servers. Since you arethe technical support, you are required to have an SSL certificate configured on S02 to support HTTPSconnections. In addition, you should make sure all users are able to access https://www.wiikigo.com with nosecurity warnings received. Which action should be performed to achieve the goal?()A、A new SSL certificate should be requested from the public CA. and then, S02 should be utilized as theCommon Name in the request. At last, the new certificate should be installed on S02.B、The Internet Information Services (IIS) Manager console on S02 should be opened. And then, a self-signed certificate should be created.C、The Internet Information Services (IIS) Manager console on S01 should be opened. And then, the SSLcertificate should be exported to a .pfx file. At last, the .pfx file should be imported to S02.D、The Certificates snap-in should be opened on S01. And then, the SSL certificate should be exported to a .cer file. At last, the .cer file should be imported to S02.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are 10 servers, and Windows Server 2008 is run by the servers. TheWeb Server (IIS) server role is installed on the servers. The servers are configured as members of a Webserver farm. The same Web site is hosted by the servers. The servers should be configured and the requirements listed below should be met. First, you should permit the Web server configurations changesthat are made on one server to be made on all servers in the farm. Second, administrative effort should becut to the least to perform the configuration changes. Which action should be performed to meet the requirements?()A、A DFS Namespace should be created. And then, the Inetpub folder should be configured as the target of the DFS Namespace on each server.B、On all servers,the Shared Configuration settings should be configured.C、On one server,the Shared Configuration setting should be configured.D、On one server,a scheduled task that copies the Intepub folder to the other servers should be created.

考题 How does network integration help businesses keep pace with changing network demands?()A、 addition of strict firewallsB、 limiting Internet accessC、 intelligence on foundation network devicesD、 increased use of network services

考题 Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

考题 Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers.  All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements: .Ensure that users can send encrypted messages to any other organization on the Internet  .Ensure that all Exchange-related communication between Hub Transport servers and Edge Transport servers is encrypted What should you recommend?()A、Deploy IPsec.B、Deploy SMTP over SSL.C、Implement Domain Security.D、Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).

考题 Your network consists of a single Active Directory site that includes two network segments. Thenetwork segments connect by using a router that is RFC 1542 compliant. You plan to use Windows Deployment Services (WDS) to deploy Windows Server 2008 R2 servers. All new servers support Pre-Boot Execution Environment (PXE).  You need to design a deployment strategy to meet the following requirements: èSupport Windows Server?2008 R2   èDeploy the servers by using WDS in both network segments èMinimize the number of servers used to support WDS What should you include in your design?() A、Deploy one server. Install WDS and DHCP on the server. Configure the IP Helper tables on therouterbetween the network segments.B、Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 60.C、Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 252.D、Deploy two servers. Install WDS and DHCP on one server. Install DHCP on the other server. Place one server on each of the network segments. Configure both servers to support DHCP option60.

考题 You are the network administrator for The network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is exposed to the Internet. You are deploying 10 Windows Server 2003 computers as Web servers. The servers will be located in the perimeter network. The servers will host only publicly available Web pages. You want to reduce the possibility that users can gain unauthorized access to the servers. You are concerned that a user will probe the Web servers and find ports or services to attack. What should you do?()A、Disable File and Printer Sharing on the servers.B、Disable the IIS Admin service on the servers.C、Enable Server Message Block (SMB) signing on the servers.D、Assign the Secure Server (Require Security) IPSec policy to the servers.

考题 You need to design a strategy for providing e-mail access to the subsidiary users. What should you do?()A、Deploy POP3 and IMAP4 services on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of POP3, IMAP4, and SMTP onlyB、Deploy Microsoft Outlook Web Access on Exchange mailbox servers. Make the mailbox servers accessible from the Internet by means of HTTPS and SMTP onlyC、Deploy Microsoft Outlook Web Access on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of HTTPS onlyD、Deploy an additional Exchange mailbox server that contains all subsidiary mailboxes. Deploy Microsoft Outlook Web Access on the server. Make the server accessible from the Internet by means of HTTPS only

考题 You are a Windows Server 2008 systems administrator responsible for providing access to a large volumeof video files to registered users of your organization??s public Web site. All the video files are located within the D:///Public/Videos folder. Content producers often create and modify these videos. Recently, usershave complained that they are experiencing poor performance when accessing videos during busy times.During these images, the Windows Media Services server that hosts the content is experiencing high CPUand network bandwidth use. You want to minimize the administrative time and effort required to increaseperformance. Which of the following actions should you take to resolve the problem?()A、Copy the training videos to another folder on the Windows Media Services server.B、Install the Streaming Media Services server role on additional servers, and configure them as cachingservers.C、Install the Streaming Media Services server role on additional servers, and configure them as proxyservers.D、Enable the Limit Outgoing Distribution Connections option in the properties of the publishing point.

考题 Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server in your company. Windows Server 2008 is run by the serverand the server has the Hyper-V server role installed.A new virtual machine is created. You are required to configure the virtual machine, and the requirements listed below should be satisfied.First, network communications should be permitted between the virtual machine and the host system.Second, communications should be prevented with other network servers. To achieve the goal,which action should be performed first?()A、To achieve the goal, the Connection should be set to None for the network interface card.B、To achieve the goal, the Microsoft Loopback Adapter should be installed.C、To achieve the goal, a new Virtual Network should be created.D、To achieve the goal, Internet Connection Sharing (ICS) should be enabled.

考题 多选题Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.  Certkiller .com requires every server in the company to access Internet.  Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.  Which two actions should you perform to achieve this task()ATrigger the Virtual DHCP server for the external virtual network and run  ipconfig/renew command on each virtual serverBOn CKT’s physical network interface, activate the Internet Connection Sharing (ICS)CUse Certkiller .com intranet IP addresses on all virtual servers on CKT.DAdd and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.ENone of the above

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. Windows Server 2008 is run by your company named Wiikigo, Ltd. A Webserver named S01 is administered by you. Internet users utilize http://www.wiikigo.com and https://www.wiikigo.com to get access to S01. An SSL certificate from a public certification authority (CA) is utilized bythe S01 server. An additional Web server named S02 is installed. A Network Load Balancing cluster isconfigured to distribute the incoming HTTP and HTTPS traffic between both Web servers. Since you arethe technical support, you are required to have an SSL certificate configured on S02 to support HTTPSconnections. In addition, you should make sure all users are able to access https://www.wiikigo.com with nosecurity warnings received. Which action should be performed to achieve the goal?()A A new SSL certificate should be requested from the public CA. and then, S02 should be utilized as theCommon Name in the request. At last, the new certificate should be installed on S02.B The Internet Information Services (IIS) Manager console on S02 should be opened. And then, a self-signed certificate should be created.C The Internet Information Services (IIS) Manager console on S01 should be opened. And then, the SSLcertificate should be exported to a .pfx file. At last, the .pfx file should be imported to S02.D The Certificates snap-in should be opened on S01. And then, the SSL certificate should be exported to a .cer file. At last, the .cer file should be imported to S02.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server in your company. Windows Server 2008 is run by the serverand the server has the Hyper-V server role installed.A new virtual machine is created. You are required to configure the virtual machine, and the requirements listed below should be satisfied.First, network communications should be permitted between the virtual machine and the host system.Second, communications should be prevented with other network servers. To achieve the goal,which action should be performed first?()A To achieve the goal, the Connection should be set to None for the network interface card.B To achieve the goal, the Microsoft Loopback Adapter should be installed.C To achieve the goal, a new Virtual Network should be created.D To achieve the goal, Internet Connection Sharing (ICS) should be enabled.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are 10 servers, and Windows Server 2008 is run by the servers. TheWeb Server (IIS) server role is installed on the servers. The servers are configured as members of a Webserver farm. The same Web site is hosted by the servers. The servers should be configured and the requirements listed below should be met. First, you should permit the Web server configurations changesthat are made on one server to be made on all servers in the farm. Second, administrative effort should becut to the least to perform the configuration changes. Which action should be performed to meet the requirements?()A A DFS Namespace should be created. And then, the Inetpub folder should be configured as the target of the DFS Namespace on each server.B On all servers,the Shared Configuration settings should be configured.C On one server,the Shared Configuration setting should be configured.D On one server,a scheduled task that copies the Intepub folder to the other servers should be created.

考题 单选题Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers.  All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements:.Ensure that users can send encrypted messages to any other organization on the Internet  .Ensure that all Exchange-related communication between Hub Transport servers and Edge Transportservers is encrypted What should you recommend?()A Deploy IPsec.B Deploy SMTP over SSL.C Implement Domain Security.D Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).

考题 多选题What are three advantages of VLANs?()AVLANs establish broadcast domains in switched networks.BVLANs utilize packet filtering to enhance network security.CVLANs provide a method of conserving IP addresses in large networks.DVLANs provide a low-latency internet working alternative to routed networks.EVLANs allow access to network services based on department, not physical location.FVLANs can greatly simplify adding, moving, or changing hosts on the network.

考题 单选题You are the network administrator for TestKing. Your network consists of a single Active Directory domain. You manage a Terminal Server farm that includes five terminal servers and a Terminal Services Licensing server named testking9. All servers run Windows 2000 Server. There are 2,500 users who log on to the terminal servers to access a custom human resource (HR) application. You install Windows Server 2003 on a new server named testking10. Testking10 is configured with all default settings enabled. You install Terminal Services and the HR application on testking10. You instruct some users to access the HR application on testking10. Four months later, users report that they can no longer establish Terminal Services sessions to testking10. You verify that users can connect to the other terminal servers in your Terminal Server farm. You need to ensure that users can run the HR application on all terminal servers on the network. What should you do?()A On testking10, set the License Logging service to Automatic, and the start the service.B On testking10, install Terminal Service Licensing. Activate the Terminal Services Licensing server.C Install Windows Server 2003 on all domain controllers on the network.D Deactivate and activate Terminal Service Licensing on Testking9.