网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
You are a senior network administrator at TestKing, and while performing thepassword recovery procedure on your 2500 series Cisco router, you type in thefollowing command:o/r 0x2142What is the purpose of this command?()
A. It is used to restart the router.
B. It is used to bypass the configuration in NVRAM.
C. It is used to enter ROM Monitor mode.
D. It is used to view the lost password.
E. It is used to save the changes to the configuration.
参考答案
更多 “ You are a senior network administrator at TestKing, and while performing thepassword recovery procedure on your 2500 series Cisco router, you type in thefollowing command:o/r 0x2142What is the purpose of this command?()A. It is used to restart the router.B. It is used to bypass the configuration in NVRAM.C. It is used to enter ROM Monitor mode.D. It is used to view the lost password.E. It is used to save the changes to the configuration. ” 相关考题
考题
You are a senior network administrator at Ezonexam, and while performing the password recovery procedure on your 2500 series Cisco router, you type in the following command:o/r 0x2142What is the purpose of this command?A.It is used to restart the router.B.It is used to bypass the configuration in NVRAM.C.It is used to enter ROM Monitor mode.D.It is used to view the lost password.E.It is used to save the changes to the configuration.
考题
You are the network administrator for TestKing. Your network consists of a singleActive Directory domain. You manage a Terminal Server farm that includes fiveterminal servers and a Terminal Services Licensing server named testking9. Allservers run Windows 2000 Server. There are 2,500 users who log on to the terminalservers to access a custom human resource (HR) application.You install Windows Server 2003 on a new server named testking10. Testking10 isconfigured with all default settings enabled. You install Terminal Services and theHR application on testking10. You instruct some users to access the HR applicationon testking10.Four months later, users report that they can no longer establish Terminal Servicessessions to testking10. You verify that users can connect to the other terminalservers in your Terminal Server farm.You need to ensure that users can run the HR application on all terminal servers onthe network.What should you do?()
考题
You are the network administrator for The network consists of asingle DNS domain named.You replace a UNIX server with a Windows Server 2003 computer namedTestKing1.TestKing1 is the DNS server and start authority (SOA) for testking.com. A UNIXserver named TestKing2 is the mail server for testking.com.You receive reports that Internet users cannot send e-mail to the testking.comdomain. The host addresses are shown in the following window.You need to ensure that Internet users can send e-mail to the testking.com domain.What should you do?()A. Add an _smtp service locator (SRV) DNS record for TestKing2.B. Add a mail exchange (MX) DNS record for TestKing2.C. Add an alias (CNAME) record for mail.testking.com.D. Enable the SMTP service on TestKing1.
考题
You are the network administrator for TestKing. All network servers run Windows Server 2003.A server named TestKing18 functions as a domain controller. You back up TestKing18 and generate a detailed backup log.You need to view the full backup log.What should you do?()A. Run the ntbackup command with the /L option.B. Run the ntbackup command with the /F option.C. Open the Backup utility. On the Tools menu, click Report.D. Open Event Viewer. In the application log, view Ntbackup events
考题
You are a network administrator at TestKing, Inc. and you‘re getting complaintsthat users on the TestKing2 Ethernet network can‘t access the TestKing1 site. Totroubleshoot this, you begin by looking at the Testking1 and Testking2 routerconfigurations as shown below:Based on the above output, what is the underlying cause of this problem?()A. Link state routing protocol is missing.B. Incorrectly configured IP addressesC. IGRP is incorrectly configured.D. Frame relay is not configured.E. None of the above
考题
You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()
A. Configuration registerB. NVRAMC. Boot flashD. CMOSE. Flash
考题
You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A.14B.16C.30D.32E.62F.64
考题
You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A、14B、16C、30D、32E、62F、64
考题
You are a senior network administrator at TestKing, and while performing thepassword recovery procedure on your 2500 series Cisco router, you type in thefollowing command:o/r 0x2142What is the purpose of this command?()A、It is used to restart the router.B、It is used to bypass the configuration in NVRAM.C、It is used to enter ROM Monitor mode.D、It is used to view the lost password.E、It is used to save the changes to the configuration.
考题
You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()A、Configuration registerB、NVRAMC、Boot flashD、CMOSE、Flash
考题
You are the network administrator for TestKing. All servers run Windows 2003. All client computers run Windows XP Professional. You log on to a server named Testking15 by using the local Administrator account. You start the installation of a new server application. After you start the installation, you return to your office, which is located in another building. You need to find out the status of the installation that is in progress on Testking15. What should you do?()A、Select the Remember server connections option in Terminal Service Manager.B、Use Terminal Service Manager to connect to Testking15.C、Use Remote Assistance from a client computer.D、Use the Remote Desktop Client to connect to the console session on Testking15
考题
You are the network administrator for All network servers run Windows Server 2003. Recently, another network administrator create a scheduled task to perform a normal backup of Microsoft Exchange Server 2003 compuer every Saturday night. You need to perform maintenance tasks on the Exchange server on this Saturday night only. If the backup starts while you are performing the maintenance tasks,data might be corrupted. You need to ensure that the backup task does not start while you perform the maintenance tasks. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.()Choose two.)A、In the Backup utility, clear the Enabled (scheduled tasks runs at specified time) check box.B、In Control Panel, use Scheduled Tasks to pause Task Scheduler.C、Run the Schtasks command with the /end /p parameters.D、Use the Services snap-in to change the startup type of the Task Scheduler service from Automatic to Manual.
考题
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A member server named Testking1 functions as a file and print server. Testking1 is configured with default operating system settings. A user named Tess is a member of the local Backup Operators group on Testking1. She is responsible for performing backups on this computer. You need to ensure that Tess can create Remote Assistance invitations from Testking1. What are two possible ways for you to achieve this goal? ()(Each correct answer presents a complete solution. Choose two)A、Log on to Testking1 with administrative privileges.Use the System Properties dialog box to enable Remote Assistance.B、Direct Tess to use the System Properties dialog box to enable Remote Assistance on Testking1.C、In your Default Domain Policy, enable the Solicit Remote Assistance setting.D、In your Default Domain Policy, enable the Offer Remote Assistance setting.E、Log on to Testking1 with administrative privileges. Use GPedit.msc to enable the Offer Remote Assistance setting.
考题
You work as the exchange administrator at Testking.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network for TestKing.com. Currently Microsoft Office Outlook is used by all TestKing.com users to connect to their mailboxes. Thecompliance policy of the organization states that a copy of messages sent to the Finance department fromthe Internet is archived. The archived e-mails need to be stored on a third-party archival server. You areinstructed to recommend a solution that will comply with the set criteria. What should you do?()A、You should include Retention Policies.B、You should include Transport Protection Rules.C、You should include Personal archives.D、You should include Journal rules.
考题
You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.
考题
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You create a shared folder named TestKing Docs on a member server named TestKing3. TestKing Docs will store project documents. You need to ensure that users can access previous version of the documents in TestKing Docs. What should you do?()A、Modify the Offline Settings option for TestKing Docs to make all files available offline.B、Configure shadow copies of the volume containing TestKing Docs.C、Use Task Scheduler to create a job that uses the Copy command to copy all changed documents to another folder every day.D、Use the Backup utility to schedule a backup of all changed documents every hou
考题
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()A、The best option is to use port 3309 and 25 from the internal network to the perimeter network.B、The best option is to use port 3309 and 636 from the internal network to the perimeter network.C、The best option is to use port 50636 and 25 from the internal network to the perimeter network.D、The best option is to use port 50636 and 135 from the internal network to the perimeter network.
考题
You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. You are in the process of enabling journaling within the TestKing.com organization. During the course ofday you receive an instruction form the CIO to stop administrators form reading classified e-mailmessages that is sent between senior management. What should you do?()A、Your best option would be to deploy an X.509 certificate from an enterprise certification authority (CA)to all senior management.B、Your best option would be to deploy Active Directory Rights Management Services (AD RMS)Templates.C、Your best option would be to deploy an X.509 certificate from a trusted third-party certification authority(CA) to all senior management.D、Your best option would be to deploy Active Directory Rights Management Services (AD RMS)Templates.Thereafter Transport Protection Rules should be created.
考题
You are a network administrator for All servers run Windows Server 2003. A server named Testking6 runs an application named App1. Testking6 has one network adapter installed. App1 uses a large amount of network bandwidth per client connection. You suspect the network connection on Testking6 is running out of available network capacity. You need to view how much total network bandwidth is being used on Testking6. What are two possible ways to achieve this goal?() (Each correct answer presents a complete solution. Choose two)A、Use System Monitor to configure the Network Interface object.B、Run the netstat command.C、In Task Manager, monitor the Networking tab.D、Use Network Monitor to configure a capture filter for the local area connection.
考题
You are the network administrator for TestKing. The network consists of a single Active Directory domain. All network servers run Windows Server 2003 and all client computers run Windows XP Professional. Terminal Services is installed on a member server named Testking1. Currently, 30 active terminal server sessions are connected to Testking1. An unforeseen hardware upgrade will require shutting down the server. You need to provide a two-minute warning about the shutdown to all active terminal sessions. First, you log on to Testking1 as an administrator. What should you do next?()A、From a command prompt, run the tsdisconn command.B、From a command prompt, run the net send /users command to send a warning message. After two minutes, manually shut down Testking1.C、From a command prompt, run the tsshutdn 120 /server:Testking1 command.D、Run Tsadmin.exe to disconnect all active sessions. After two minutes, manually shut down Testking1.
考题
单选题You are a senior network administrator at TestKing, and while performing thepassword recovery procedure on your 2500 series Cisco router, you type in thefollowing command:o/r 0x2142What is the purpose of this command?()A
It is used to restart the router.B
It is used to bypass the configuration in NVRAM.C
It is used to enter ROM Monitor mode.D
It is used to view the lost password.E
It is used to save the changes to the configuration.
考题
多选题You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()AConfiguration registerBNVRAMCBoot flashDCMOSEFlash
考题
多选题You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal?() (Each correct answer presents a complete solution. Choose two)AEnable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.BUse IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.CUse Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.DDisable all LM and NTLM authentication methods on TestKing1.EUse IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.
考题
单选题You are the network administrator for The network consists of a single Active Directory domain named A Windows Server 2003 computer named TestKing3 is configured as a member server in your domain. You install Terminal Services on TestKing3. You also install several legacy applications on TestKing3. Users report that they cannot run many of the legacy applications on TestKing3 through their Terminal Services sessions. You establish a Terminal Services session by using the Administrator account, and you verify that you can run the legacy applications. You need to ensure that users can run the legacy applications on TestKing3 while they are connected through Terminal Services. What should you do?()A
Add all Terminal Services users to the domain Server Operators group.B
Share the C:/Program Files folders on TestKing2. Assign the Domain Users group the Allow - Full Control share permissions.C
Install Terminal Server Licensing Server on TestKing3.D
Use Terminal Services Configuration to change the Permissions Compatibility setting.
考题
单选题You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A
14B
16C
30D
32E
62F
64
考题
单选题You are the network administrator for . You are the administrator of a Windows Server 2003 computer named TestKing8. You log on to TestKing8 and attempt to access the network. You discover that the server is not communicationg on the network. You discover that a service pack and an updated network adapter driver were installed on TestKing8 the previous night. A complete backup, including the System State data, was performed before the service pack and the driver were installed. You need to restore network communications. What should you do first?()A
Use Roll Back Driver to reinstall the previous driver for the network adapter.B
Use the Backp or Restore Wizard to restore the backup from the previous night.C
Restart TestKing8 by using Last Known Good Configuration option.D
Use the Registry Editor to delete the registry settings for the network adapter driver.
考题
单选题You are the network administrator for TestKing. All servers run Windows Server 2003. Twenty TestKing employees connect to a terminal server named Testking2 to run applications and to gain access to the Internet. The 20 employees report that they receive security messages while browsing Internet Web sites. The employees report that they cannot modify the Internet Explorer security settings on their client computers while connected to Testking2. You need to allow these 20 employees to modify the Internet Explorer security settings in their client computers while connected to Testking2. What should you do?()A
Log on to Testking2 as Administrator and add http:// to the list of trusted sites in Internet Explorer.B
Instruct the 20 employees to add http:// to the list of trusted sites in Internet Explorer on their client computers.C
Instruct the 20 employees to change the Internet Explorer privacy settings on their client computers to Low.D
Uninstall Internet Explorer Enhanced Security Configuration on Testking2.
考题
单选题You are the network administrator for The network consists of a single Active Directory domain. The domain contains 20 Windows Server 2003 computers and 400 Windows XP Professional computers. Software Update Services (SUS) is installed on a server named Testking2. The network security administrator wants you to ensure that the administrative password is not compromised when an administrator connects to Testking2's SUSAdmin Web site remotely by using HTTP. You want only SSL to be used to connect to the SUSAdmin Web site. The network security administrator creates a digital certificate and enables communication for SSL on port 443 of Testking2. However, administrators are still able to connect to the SUSAdmin Web site by using HTTP. You need to ensure that communication to the SUSAdmin Web site is always secure. What should you do?()A
Disable port 80 on the SUSAdmin Web site.B
Require 128-Bit SSL on all directories related to the SUSAdmin Web site.C
Change the default Web site to require 128-Bit SSL.D
Enable IPSec on Testking2 with the Request Security IPsec template.
热门标签
最新试卷