网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Your company is designing its public network. The network will use an IPv4 range of 131.107.40.0/22.The network must be configured as shown in the following exhibit.You need to configure subnets for each segment. Which network addresses should you assign?()
A

Segment A: 131.107.40.0/23    Segment B: 131.107.42.0/24    Segment C: 131.107.43.0/25    Segment D: 131.107.43.128/27

B

Segment A: 131.107.40.0/25    Segment B: 131.107.40.128/26    Segment C: 131.107.43.192/27    Segment D: 131.107.43.224/30

C

Segment A: 131.107.40.0/23    Segment B: 131.107.41.0/24    Segment C: 131.107.41.128/25    Segment D: 131.107.43.0/27

D

Segment A: 131.107.40.128/23    Segment B: 131.107.43.0/24    Segment C: 131.107.44.0/25    Segment D: 131.107.44.128/27


参考答案

参考解析
解析: 暂无解析
更多 “单选题Your company is designing its public network. The network will use an IPv4 range of 131.107.40.0/22.The network must be configured as shown in the following exhibit.You need to configure subnets for each segment. Which network addresses should you assign?()A Segment A: 131.107.40.0/23 Segment B: 131.107.42.0/24 Segment C: 131.107.43.0/25 Segment D: 131.107.43.128/27B Segment A: 131.107.40.0/25 Segment B: 131.107.40.128/26 Segment C: 131.107.43.192/27 Segment D: 131.107.43.224/30C Segment A: 131.107.40.0/23 Segment B: 131.107.41.0/24Segment C: 131.107.41.128/25 Segment D: 131.107.43.0/27D Segment A: 131.107.40.128/23 Segment B: 131.107.43.0/24Segment C: 131.107.44.0/25 Segment D: 131.107.44.128/27” 相关考题
考题 Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets.Which network mask should you use?()A. /61B. /62C. /63D. /64

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 You administer your company‘s network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the applicatin.What should you do?()A.AB.BC.CD.D

考题 You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

考题 One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()A、Virtual GatewayB、Real-IP GatewayC、NAT GatewayD、IP-IP Gateway

考题 Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network.  You need to ensure that the computer is able to connect to the wireless network.  What should you do?()A、Change the Network Category setting of the wireless connection to Public.B、Enable the Internet Connection Sharing feature on the wireless network adapter.C、Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.D、Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.

考题 Acme Costume Company is connecting its manufacturing facilties to its stores with a small point-to-multipoint Frame Relay IP WAN. Little growth is expected in the network infrastructure.Up tothis point the company has been using a dial-on-demand network. Dropping WAN costs, however,have led them to consider using a high-speed WAN solution to improve access. Which two routingprotocols could you deploy to support the new larger network while keeping costs down?()A、 RIPB、 RIPv2C、 EIGRPD、 OSPF

考题 You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

考题 Your company is designing its public network. The network will use an IPv4 range of 131.107.40.0/22.The network must be configured as shown in the following exhibit.You need to configure subnets for each segment. Which network addresses should you assign?()A、Segment A: 131.107.40.0/23 Segment B: 131.107.42.0/24 Segment C: 131.107.43.0/25 Segment D: 131.107.43.128/27B、Segment A: 131.107.40.0/25 Segment B: 131.107.40.128/26 Segment C: 131.107.43.192/27 Segment D: 131.107.43.224/30C、Segment A: 131.107.40.0/23 Segment B: 131.107.41.0/24Segment C: 131.107.41.128/25 Segment D: 131.107.43.0/27D、Segment A: 131.107.40.128/23 Segment B: 131.107.43.0/24Segment C: 131.107.44.0/25 Segment D: 131.107.44.128/27

考题 You are the administrator of your company’s network. You run the English (US) edition of Windows 2000 Professional on all computers in your network. As your company continues to grow, and the number of computers is continually expanding, you decide that another domain is needed. Management asks you about what is required to accommodate this new domain. What should you answer the Management in this regard? ()A、WINS, DHCP and DNSB、At least one domain controller and one DNS server.C、At least one domain controller, Active Directory and DNS server.D、Nothing more is needed.E、Nothing more is needed, we can just subnet the network.

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()A、WLAN AutoConfigB、WWAN AutoConfigC、Computer BrowserD、Portable Device Enumerator Service

考题 You are the administrator of your company’s network. A user named Peter runs Windows 2000 Professional on his portable computer. Peter wants to be able to work at home on files that were created in the office on the company network.  Prior to logging off the network and leaving the office, Peter enables Offline Files. Peter calls you from home and reports that copies of his folders and files on the network are not available on his portable computer.  What should you instruct Peter to do? ()A、 Enable file and print sharing.   Peter will be able to access his files at home immediately. B、 Synchronize all offline files.   Peter will be able to access his files at home immediately. C、 At the office, make the files available offline.   Peter will be able to access his files the next time he logs off the network. D、 At the office, create a shortcut to the Offline Files folder.   Peter will be able to access his files the next time he logs off the network. 

考题 You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.   What must you do so that you can access the Internet?()A、Configure the ISDN connection to use SLIP instead of PPP.B、Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.C、Clear the Use default gateway on remote network check box.D、Install and configure the SAP Agent service.

考题 You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.

考题 You are the administrator of Etechsol.com Enterprises. Your company consists of a small 20-user network. Management has decided to upgrade all computers to Windows 2000.   After having a closer examination of your company’s network, you realize that only half of the network interface cards are Net PC compliant. You decide to create Windows 2000 remote boot floppies.  What executable is used for creating RIS boot disks for non-PXE compliant clients?()A、RBFG*EXEB、RIPREP*EXEC、RIS*EXED、RISPXE*EXEE、RISBOO*EXE

考题 单选题Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()A Configure the NWLink frame type of the network adapters to be ethernet 802.3.B Configure the NWLink frame type of the network adapters to be ethernet II.C Replace the network adapters with 10/100 BNC adapters.D Replace the network adapters with 10/100 UTP network adapters.

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()A Set the driver signing option to block.B Set the driver signing option to ignore.C In the computer’s BIOS, reserve an unused IRQ for ISA devices.D In the Device Manager, configure the second ISA network adapter to use an unused IRQ.

考题 单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A STPB GVRPC SNMPD VTPE DHCP

考题 单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()A msiB mstC zapD zip

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB detailed security device specificationsC results from pilot network testingD results from a network audit

考题 单选题Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A /61B /62C /63D /64

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A a list of applications currently in use in the networkB IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsC detailed security device specificationsD results from pilot network testing

考题 多选题You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a HOSTS file.BConfigure a LMHOSTS file.CConfigure a WINS server database.DConfigure a DHCP server address.EConfigure at least one DNS address.

考题 单选题Your Company upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings to be the same as they were for the previously installed network adapter.   When you restart eh computer, however, you cannot access the network. You try to ping your network adapter’s TCP/IP address locally. You receive the following error message. “Request timed out.” Next, you try to ping 127.0.0.1 and receive the same error message.   What must you do?()A Configure a different TCP/IP addressB Enable DHCP in the TCP/IP propertiesC Enable DNS in the TCP/IP propertiesD Configure the network adapter to run at 100 Mbps onlyE Replace the network adapter.

考题 单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()A Configure the network category of your wireless network connection to Private.B Configure the network category of your wireless network connection to Public.C Configure the TCP/IP packet filtering on the wireless network connection.D Configure the wireless network connection with the appropriate authentication to the router.