网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Users on the 192.168.1.0/24 network must access files located on the Server 1. What route could be configured on router R1 for file requests to reach the server()。
A.ip route 0.0.0.0 0.0.0.0 s0/0/0
B.ip route 0.0.0.0 0.0.0.0 209.165.200.226
C.ip route 209.165.200.0 255.255.255.0 192.168.1.250
D.ip route 192.168.1.0 255.255.255.0 209.165.100.250
参考答案
更多 “ Users on the 192.168.1.0/24 network must access files located on the Server 1. What route could be configured on router R1 for file requests to reach the server()。 A.ip route 0.0.0.0 0.0.0.0 s0/0/0B.ip route 0.0.0.0 0.0.0.0 209.165.200.226C.ip route 209.165.200.0 255.255.255.0 192.168.1.250D.ip route 192.168.1.0 255.255.255.0 209.165.100.250 ” 相关考题
考题
Your network contains the servers shown in the following table.Server name Server role Server location Server shareServer1 File server Office1 Data1Server2 File server Office2 Data2Office1 and Office2 connect to each other by using a WAN link. Users in Office2 frequently access the same set of files stored in Data1. You need to reduce the amount of file transfer traffic across the WAN link.What should you add to Server1?()A. the Background Intelligent Transfer Service (BITS) featureB. the BranchCache featureC. the BranchCache for network files role serviceD. the Distributed File System (DFS) role service
考题
you configure a new file server that runs windows server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files.The TCP/IP properties for the file server are configured as shown in the following exhibit.You need to ensure that users are able to access the shared files. What should you do?()A.Configure a static IP address.B.Configure the default gateway.C.Configure the DNS server address.D.Add the domain to the DNS suffix on the network interface.
考题
Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network.The network administrator connected to console port,issued the show ip route command,and was able to ping the server.Based on the output of the show ip route command topology shown in the graphic,what is the cause of the failure?()A.IP routing is not enabledB.A static route is configured incorrectlyC.The network has not fully convergedD.The FastEthernet interface on Coffee is disabledE.The routing table on Coffee has not updatedF.The neighbor relationship table is not correctly updated
考题
Users on the 192.168.1.0/24 network must access files located on the Server 1. What route could be configured on router R1 for file requests to reach the server()。A、ip route 0.0.0.0 0.0.0.0 s0/0/0B、ip route 0.0.0.0 0.0.0.0 209.165.200.226C、ip route 209.165.200.0 255.255.255.0 192.168.1.250D、ip route 192.168.1.0 255.255.255.0 209.165.100.250
考题
What must be configured on the network in order for users on the Internet to view web pages located on Web Server 2?()A、On router R2, configure a default static route to the 192.168.1.0 network.B、On router R2, configure DNS to resolve the URL assigned to Web Server 2 to the 192.168.1.10 address.C、On router R1, configure NAT to translate an address on the 209.165.100.0/24 network to 192.168.1.10.D、On router R1, configure DHCP to assign a registered IP address on the 209.165.100.0/24 network to Web Server 2.
考题
You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.
考题
Your network consists of a single Active Directory domain. All network servers run Windows Server2003 Service Pack 2 (SP2).Your organization has a storage area network (SAN). All shared folders on file servers are stored on theSAN.The Change permission for all shared folders is assigned to Domain Users. Different NTFS permissionsare also applied to the shared folders.You perform a daily full backup of all the files stored in the shared folders.A file server fails and requires several hours to repair.You need to provide users access to the shared folders that were on the failed file server as quickly aspossible. Existing permissions must be retained for all files.What should you do? ()A、Attach an existing file server to the SAN storage locations. Configure the shared folders on the server.B、Attach an existing file server to the SAN storage locations. Configure NTFS permissions for the folders.C、On an existing file server, restore the data from the tape backup. Configure NTFS permissions for the folders.D、On an existing file server, restore the data from the tape backup. Configure the shared folders on the server.
考题
Your company has a single active directory domain. All servers run windows server 2008. The company network has 10 servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network, you notice that the confidential files are stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()A、Deactivate all LM and NTLM authentication methods on the FSS1 server.B、Use IIS to publish the confidentials files. Activate SSL on the ISS server, and then open the files as a web folder.C、Use IPSec encryption between the FSS 1 server and the computers of the users who need to access the confidential files.D、Use the server messager block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.E、Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties dialog box, select the encrypt contents to secure data option.
考题
Your company has a main office and a branch office. Your network contains a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. An Active Directory site exists for each office. All servers run Windows Server 2008 R2. You plan to deploy file servers in each office. You need to design a file sharing strategy to meet the following requirements: èUsers in bothoffices must be able to access the same files. èUsers in both offices must use the same Universal Naming Convention (UNC) path to access files. èThe design must reduce the amount of bandwidth used to access files. èUsers must be able to access files even if a server fails. What should you include in your design?()A、A stand-alone DFS namespace that uses replication.B、A domain-based DFS namespace that uses replication.C、A multi-site failover cluster that contains a server located in the main office and another server located in the branch office.D、A Network Load Balancing cluster that contains a server located in the main office and another server located in the branch office.
考题
Your network contains a Windows Server 2008 R2 server that functions as a file server. All users have laptop computers that run Windows 7. The network is not connected to the Internet. Users save files to a shared folder on the server. You need to design a data provisioning solution that meets the following requirements: èUsers who are not connected to the corporate network must be able to access the files and the folders in the corporate network. èUnauthorized users must not have access to the cached files and folders. What should you do?()A、Implement a certification authority (CA). Configure IPsec domain isolation.B、Implement a certification authority (CA). Configure Encrypting File System (EFS) for the drive that hosts the files.C、Implement Microsoft SharePoint Foundation 2010. Enable Secure Socket Layer (SSL) encryption.D、Configure caching on the shared folder. Configure offline files to use encryption.
考题
Your company has two branch offices that connect by using a WAN link. Each office contains a server that runs Windows Server 2008 R2 and that functions as a file server. Users in each office store data on the local file server. Users have access to data from the other office. You need to plan a data access solution that meets the following requirements: èFolders that are stored on the file servers must be available to users in both offices. èNetwork bandwidth usage between offices must be minimized. èUsers must be able to access all files in the event that a WAN link fails. What should you include in your plan?()A、On both servers, implement DFS Replication.B、On both servers, install and configure File Server Resource Manager (FSRM) and File Replication service (FRS).C、On one server, install and configure File Server Resource Manager (FSRM). On the other server,install and configure File Replication Service (FRS).D、On one server, install and configure Distributed File System (DFS). On the other server, install and configure the Background Intelligent Transfer Service (BITS).
考题
多选题Your company has a single Active Directory domain. All servers run Windows Server 2008. The company network has 10 servers that perform as Web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most securemanner. When you monitor the network, you notice that the confidential files are stored on the FSS1 server are being transmitted over the network without encryption. You need to ensure taht encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal?()ADeactivate all LM and NTLM authentication methods on the FSS1 serverBUse IIS to publish the confidentials files. activate SSL on the ISS server, and then open the files as a web folder.CUse IPSec encryption between the FSS1 server and the computers of the users who need to access the confidential filesDUse the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the Folder Advanced.Properties dialog box, select the Encrypt contents to secure data option.
考题
单选题Your network consists of a single Active Directory domain. All network servers run Windows Server 2003 Service Pack 2 (SP2). You need to use Windows Backup to restore files to a shared folder located on a file server. The restore must maintain all the file versions saved by users since the last backup. What should you do?()A
Restore the files to their original location and select the Replace existing files option.B
Restore the files to their original location and select the Replace existing files if they are older than the backup files option.C
Restore the files to an alternate location. Copy the files to the shared folder and choose to overwrite the files with duplicate file names.D
Restore the files to an alternate location. Copy the files to the shared folder and choose not to overwrite thefiles with duplicate file names.
考题
单选题Your company has two branch offices that connect by using a WAN link. Each office contains a server that runs Windows Server 2008 R2 and that functions as a file server. Users in each office store data on the local file server. Users have access to data from the other office. You need to plan a data access solution that meets the following requirements: èFolders that are stored on the file servers must be available to users in both offices. èNetwork bandwidth usage between offices must be minimized. èUsers must be able to access all files in the event that a WAN link fails. What should you include in your plan?()A
On both servers, implement DFS Replication.B
On both servers, install and configure File Server Resource Manager (FSRM) and File Replication service (FRS).C
On one server, install and configure File Server Resource Manager (FSRM). On the other server,install and configure File Replication Service (FRS).D
On one server, install and configure Distributed File System (DFS). On the other server, install and configure the Background Intelligent Transfer Service (BITS).
考题
单选题Your network contains an Active Directory domain. The domain contains a member server that runs Windows Server 2008 R2.You have a folder named Data that is located on the C drive. The folder has the default NTFS permissions configured.A support technician shares C:/Data by using the File Sharing Wizard and specifies the default settings.Users report that they cannot access the shared folder.You need to ensure that all domain users can access the share.What should you do?()A
Enable access-based enumeration (ABE) on the share.B
Assign the Read NTFS permission to the Domain Users group.C
From the Network and Sharing Center, enable public folder sharing.D
From the File Sharing Wizard, configure the Read permission level for the Domain Users group.
考题
单选题You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only. A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company's VPN. They must have 24-hour access to the files on Server1. You need to be able to identify the source of the recurring slowdowns in VPN access. First, you log on to Server1. What should you do next?()A
Use Task Manager to review network utilization of the VPN adapter.B
Use the Performance console to create a log of network utilization outside of business hours.C
Use System Monitor to review network utilization of the VPN connection.D
Use Task Manager to select Bytes Sent as the Network Adapter History setting.
考题
单选题Your network contains a file server that runs Windows Server 2008 R2. The server has File Server Resource Manager (FSRM) installed.A file screen is created for a folder named Data. Data is located on the C drive. The file screen is configured to block files contained in the Audio and Video file group.You need to allow users in the sales department to upload video files to C:/Data/Sales. What should you do?()A
Create a file screen exception.B
Modify the Audio and Video file group.C
Implement an active file screen on C:/Data/Sales.D
Implement a passive file screen on C:/Data/Sales.
考题
多选题Your company has a single active directory domain. All servers run windows server 2008. The company network has servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network you notice that the confidential files stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()ADeactivate all LM and NTLM authentication methods on FSS1 server.BUse IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folder.CUse IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.DUse the server message block (SMB) signing between the FSS1 serve and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties box, select the encrypt contents to secure data option.
考题
单选题What must be configured on the network in order for users on the Internet to view web pages located on Web Server 2?()A
On router R2, configure a default static route to the 192.168.1.0 network.B
On router R2, configure DNS to resolve the URL assigned to Web Server 2 to the 192.168.1.10 address.C
On router R1, configure NAT to translate an address on the 209.165.100.0/24 network to 192.168.1.10.D
On router R1, configure DHCP to assign a registered IP address on the 209.165.100.0/24 network to Web Server 2.
考题
单选题you configure a new file server that runs windows server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files.The TCP/IP properties for the file server are configured as shown in the following exhibit.You need to ensure that users are able to access the shared files. What should you do?()A
Configure a static IP address.B
Configure the default gateway.C
Configure the DNS server address.D
Add the domain to the DNS suffix on the network interface.
考题
单选题Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a member server named Server1. Server1 has the File Server server role installed. On Server1, you create a share named Documents. The Documents share will contain the files and folders of all users. You need to ensure that when the users connect to Documents, they only see the files to which they have access. What should you do?()A
Modify the NTFS permissionsB
Modify the Share permissionsC
Enable access-based enumerationD
Configure Dynamic Access Control
考题
单选题You configure a new file server that runs Windows Server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files. The TCP/IP properties for the file server are configured as shown in the following exhibit.(exhibit not there again wtf!) You need to ensure that users are able to access the shared files. How should you configure the TCP/IP properties in the file server?()A
Configure a static IP addressB
Configure the default gatewayC
Configure the DNS server addressD
Add the domain to the DNS suffix on the network interface
考题
多选题Your company has a single Active Directory domain. All servers run Windows Server 2008. The company network has servers that perform as Web Servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network you notice that the confidential files stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always usedwhen the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()ADeactivate all LM and NTLM authentication methods on FSS1 serverBUse IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folderCUse IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.DUse the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the Folder avanced Properties box, select the Encrypt contents to secure data optiion
考题
单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Some users have laptop computers and work remotely from home. You need to plan a data provisioning infrastructure to secure sensitive files. Your plan must meet the following requirements: èFiles must be stored in an encrypted format. èFiles must be accessible by remote users over the Internet. èFiles must be encrypted while they are transmitted over the Internet. What should you include in your plan?()A
Deploy one Microsoft SharePoint Foundation 2010 site. Require users to access the SharePoint site by using a Secure Socket Transmission Protocol (SSTP) connection.B
Deploy two Microsoft SharePoint Foundation 2010 sites.Configure one site for internal users. Configure the other site for remote users. Publish the SharePoint sites by using HTTPS.C
Configure a Network Policy and Access Services (NPAS) server to act as a VPN server. Require remote users to access the files by using an IPsec connection to the VPN server.D
Store all sensitive files in folders that are encrypted by using Encrypting File System (EFS). Require remote users to access the files by using Secure Socket Transmission Protocol (SSTP).
考题
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()A
Configure the system event log to Do not overwrite.B
In IAS, in Remote Access Logging, enable the Authentication requests setting.C
Configure the Remote Access server to Log all events.D
Create a custom remote access policy and configure it for Authentication-Type.
热门标签
最新试卷