网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()

A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.

B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.

C. Use class-based policing to limit the peer-to-peer traffic rate.

D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C


参考答案

更多 “ Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.C. Use class-based policing to limit the peer-to-peer traffic rate.D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C ” 相关考题
考题 You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

考题 You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()A.AB.BC.CD.D

考题 Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall

考题 Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()A、Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B、Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.C、Use class-based policing to limit the peer-to-peer traffic rate.D、Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C

考题 In a high-availability network, which command, when placed on ports that have connected end stations, will allow you to prevent delays in service for end stations by placing a port in blocking mode?()A、enable backbone fastB、enable uplink fastC、disable portfastD、enable portfast

考题 A technician at a company providing online, real-time media streaming to the Internet needs a network technology that will reduce bandwidth while delivering high throughput. Which of the following can the technician implement to fit these requirements?()A、SubnettingB、UnicastC、BroadcastD、Multicast

考题 Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()A、Modify the time zone for the computer.B、Modify the IPv4 settings on the computer.C、Create an A record for the computer in an internal DNS zone.D、Request that an administrator create a prestaged computer account in the domain.

考题 Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

考题 You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant users Special access for the reports on the network share.C、Use Windows Explorer to disable caching for the reports on the network share.D、Use Windows Explorer to disable Offline files.

考题 You administer Company's network that consists of 100 Windows 2000 Professional computers and nine Windows 2000 Server computers. All users at Company save their work files in home folders on a network server. The network server is configured with two NTFS volumes. One of the NTFS volumes contains the home folders for the users at Company and the other NTFS volume contains a shared folder named PROGRESS, which is used for users to save temporary work files in. Disk quotas and Encrypting File System (EFS) is enabled on the NTFS volume with the home folders. All users have a default limit of 100 MB and the option to deny space to users who exceed their limit has been enabled.  A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder. The user currently has no data stored in the PROGRESS folder. When he attempts to save files to his home folder, he receives the following error message: "Insufficient disk space." Other users are not experiencing this problem with their home folders. You want to allow the user to save files on the network server.  What should you do?()A、 Use Windows Backup to archive and remove old files on the server.B、 Compress the files in the user’s home folder to allow additional files to be saved.C、 Move some of the files from the user’s home folder to the PROGRESS share folder.D、 Log on the network as a Recovery Agent. Decrypt all of the user’s files in his home folder. E、 Lon on to the network by using the domain Administrator account. Grant the user Full Control permission to his home folder.

考题 Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.

考题 You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box. 

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. A server named TestKing2 functions as an application server. Users in the TestKing marketing department use an application on TestKing2 to analyze data. The application produces a high volume of disk activity. You give access to 15 new users for the application on TestKing2. Users in the TestKing marketing department report unacceptable delays when they use the application during periods of peak activity. You use System Monitor to analyze the performance of TestKing2. You need to ensure that TestKing2 can support the new users. Which counter should you monitor?()A The % Disk Time counter for the PhysicalDisk performance objectB The Current Disk Queue Length counter for the PhysicalDisk performance objectC The Free Megabytes counter for the LogicalDisk performance objectD The Disk Transfers/sec counter for the LogicalDisk performance object

考题 单选题Users at the Charleville Company began experiencing high network delays when Internetconnectivity was enabled for all users. After investigating the traffic flow, you determine that peer-to-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoSmechanism can you implement to improve the network response time?()A  Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B  Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions. C  Use class-based policing to limit the peer-to-peer traffic rate.D  Use class-based shaping to delay any excessive peer-to-peer traffic.

考题 单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A Use Windows Explorer to receive the offline filesB Using the Windows Explorer, disable the cache for the reports on the network shareC Use the Windows NT explorer to grant the special access for the reports on the network  shareD Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 单选题Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()A Create an Ipsec enforcement network policy.B Create an 802.1xenforcemen tnetwork policy.C Createa wired network(IEEE802.3)Group policy.D Create an extensible authentication protocol(EAP)enforcement network policy.

考题 单选题You use a Windows 2000 Professional portable computer both at the office and at home. In the office you connect the portable computer to a docking station and use Internet Explorer to access the Internet through your LAN connection.  At home, you configure a new dial-up connection to the Internet. Now when you attempt to access the Internet from the office you are prompted to connect via your dial-up connection. When you cancel this message, you can only work offline and cannot access the Internet.  You want to maintain your dial-up connection for home use and your ability to access the Internet when connected to the company LAN. What should you do?()A Reconfigure the dial-up connection to dial-up to a private network.B Create another connection that uses a virtual private network (VPN) to connect a private network though the Internet.C Configure Internet Explorer to automatically detect proxy settings.D Configure Internet Explorer to dial whenever a network connection is not present.

考题 单选题You are the network administrator for your company. The network contains an application server running Windows Server 2003.   Users report that the application server intermittently responds slowly. When the application server is responding slowly, requests that normally take 1 second to complete take more than 30 seconds to complete. You suspect that the slow server response is because of high broadcast traffic on the network.   You need to plan how to monitor the application server and to have a message generated when broadcast traffic is high. You also want to minimize the creation of false alarms when nonbroadcast traffic is high.   What should you do?  ()A  Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the UDPv4 object is high.B  Use System Monitor and configure it to monitor the Segments/sec counter in the TCPv4 object.  C  Use System Monitor and configure it to monitor the Datagrams/sec counter in the UDPv4 object.D  Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the TCPv4 object is high.

考题 单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A  Create an IPsec Enforcement Network policyB  Create an 802.1X enforcement network policyC  Create a wired network (IEEE 802.3) Group PolicyD  Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A  Configure the system event log to Do not overwrite.B  In IAS, in Remote Access Logging, enable the Authentication requests setting.C  Configure the Remote Access server to Log all events.D  Create a custom remote access policy and configure it for Authentication-Type.

考题 单选题You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D Configure the IP properties of the portable computers so that they have an alternate configuration. 

考题 多选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet.   What are two possible ways to achieve this goal?()AMonitor the events in the application log on Server1.BMonitor the events in the security log on Server1.CMonitor the Web server connections on Server1 by using a performance log.DMonitor network traffic to Server1 by using Network Monitor.EMonitor the IIS logs on Server1.