网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()
A
full mesh
B
peer-to-peer
C
partial mesh
D
hub and spoke
参考答案
参考解析
解析:
暂无解析
更多 “单选题You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()A full meshB peer-to-peerC partial meshD hub and spoke” 相关考题
考题
You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts.Which network mask should you use?()A.255.255.255.192B.255.255.255.224C.255.255.255.240D.255.255.255.248E.255.255.255.252F.255.255.255.254
考题
You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()A.full meshB.peer-to-peerC.partial meshD.hub and spoke
考题
You are the network consultant from Cisco.com. Please point out the reason that STP required when VLANs do not span access layer switches.()
A. ensure a loop-free topologyB. protect against user-side loopsC. support business applicationsD. risk of lost connectivity without STP
考题
You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?()
A. Flex LinksB. loop-free UC. looped squareD. looped triangle
考题
You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()A、EncryptionB、Bandwidth limitsC、Minimal signal lossD、No EMI
考题
You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts. Which network mask should you use?()A、255.255.255.192B、255.255.255.224C、255.255.255.240D、255.255.255.248E、255.255.255.252F、255.255.255.254
考题
You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A、 Easy VPNB、 IPsec GRE tunnelingC、 Virtual Tunnel InterfacesD、 Dynamic Multipoint VPN
考题
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A、Content storage networkingB、Network optimizationC、Network managementD、Network security
考题
As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()A、GLBPB、RSTPC、BPDU guardD、root guard
考题
You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()A、Protecting the business from information outagesB、Optimizing the efficiency with which IT operatesC、An increased need for specialized IT silosD、IT systems grow fast
考题
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()A、ExecutableB、TrojanC、VirusD、Worm
考题
You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?()A、Flex LinksB、loop-free UC、looped squareD、looped triangle
考题
Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site. The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network. You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server. What should you include in the plan?()A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync synchronization.B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync synchronization.C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the perimeter network.D、Deploy two Hub Transport servers on the internal network.
考题
You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). You need to monitor the performance of the VPN server for one day. What should you do? ()A、From the Performance console, create a trace log.B、From the Performance console, create a counter log.C、Install Network Monitor Tools. From Network Monitor create a new capture.D、Install Network Monitor Tools. From Network Monitor create a new parser file.
考题
You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet.Which of the following describes the results of running this cmdlet?()A、It removes one or more network adapters from a specified NIC team.B、It removes a team interface from a NIC team.C、It removes a specified NIC team from the host.D、It removes a network adapter member from a switch team.
考题
You need to recommend the server configurations for the new failover cluster. The configurations must support the company's planned changes Which two actions should you recommend?()A、From Hyper-V Manager on each node, configure one virtual network.B、From Hyper-V Manager on one node, configure two virtual networks.C、Install one network adapter on each node. Configure the network adapters to use multiple IP ddresses.D、Install two network adapters on each node. Configure the network adapters to communicate on separate subnets.
考题
Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()A、From Credential Manager, modify the generic credentials.B、From Credential Manager, modify the Windows credentials.C、From Network and Sharing Center, turn on Network discovery.D、From Network and Sharing Center, modify the wireless network connection settings.
考题
单选题You are the network consultant from Cisco.com. Please point out the reason that STP required when VLANs do not span access layer switches.()A
ensure a loop-free topologyB
protect against user-side loopsC
support business applicationsD
risk of lost connectivity without STP
考题
单选题You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A
Network managementB
Network optimizationC
Network securityD
Content storage networking
考题
单选题You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). You need to monitor the performance of the VPN server for one day. What should you do? ()A
From the Performance console, create a trace log.B
From the Performance console, create a counter log.C
Install Network Monitor Tools. From Network Monitor create a new capture.D
Install Network Monitor Tools. From Network Monitor create a new parser file.
考题
单选题Your network consists of a single Active Directory domain. You have 10 file servers that run Windows Server 2003 Service Pack 2 (SP2).You need to monitor the bandwidth usage on all the file servers from a central location. What should you do?()A
Open the Shared Folders snap-in on one of the servers. Examine the Sessions folder.B
Install Simple TCP/IP Services on all file servers. From one of the servers, run Netcap.exe.C
Install Network Monitor Tools on all file servers. From one of the servers, create a new capture.D
Open the Performance Logs and Alerts snap-in on one of the servers and create a new counter log.
考题
单选题You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A
Easy VPNB
IPsec GRE tunnelingC
Virtual Tunnel InterfacesD
Dynamic Multipoint VPN
考题
多选题You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()AEncryptionBBandwidth limitsCMinimal signal lossDNo EMI
考题
多选题You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()AAn increased need for specialized IT silosBProtecting the business from information outagesCIT systems grow fastDOptimizing the efficiency with which IT operates
热门标签
最新试卷