网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts.Which network mask do you use?()
A

/26

B

/27

C

/28

D

/29


参考答案

参考解析
解析: 暂无解析
更多 “单选题You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts.Which network mask do you use?()A /26B /27C /28D /29” 相关考题
考题 Your network contains a server that runs Windows Server 2008 R2. You need to schedule backups of the server. The solution must ensure that multiple versions of the backup are available.Which two possible backup locations should you use?()A. external hard diskB. internal hard diskC. optical mediaD. remote shared folder

考题 You are the administrator of your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 10 non-PXE-compliant computers that are on the marketing segment of your network. You start one of the computers by using a RIS boot disk. However, you cannot connect to the RIS server.You verify that the existing client computers on the network can connect to network servers, including the RIS server. The network router does not support BOOTP, so existing client computers use manually configured TCP/IP addresses. You want to enable the computers to connect to the RIS server.What should you do?A.Add a computer running DHCP Relay Agent to the marketing segment.B.Add a computer running the network monitor driver to the marketing segment.C.Move the Windows 2000 Server computer running WINS to the marketing segment.D.Move the Windows 2000 Server computer running Active Directory to the marketing segment.

考题 Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?() A. State synchronization occurs only through the internal network interface card (NIC)B. Latency of the WAN must be less than 300 ms.C. Authenticating endpoints must be on the same LAN segment.D. Cluster members must use the same hardware platfor

考题 You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts. Which network mask do you use?() A. /26B. /27C. /28D. /29

考题 You must segement your internal 192.168.1.0/24 network into a minimun of 12 subnet, each containing a minimun of 12 hosts. Which network mask do you use?() A. /26B. /27C. /28D. /29

考题 You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts.Which network mask should you use?()A.255.255.255.192B.255.255.255.224C.255.255.255.240D.255.255.255.248E.255.255.255.252F.255.255.255.254

考题 You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts. Which network mask should you use?()A、255.255.255.192B、255.255.255.224C、255.255.255.240D、255.255.255.248E、255.255.255.252F、255.255.255.254

考题 You must segement your internal 192.168.1.0/24 network into a minimun of 12 subnet, each containing a minimun of 12 hosts. Which network mask do you use?()A、/26B、/27C、/28D、/29

考题 Your network contains a server that runs Windows Server 2008 R2. You need to schedule backups of the server. The solution must ensure that multiple versions of the backup are available. Which two possible backup locations should you use?()A、external hard diskB、internal hard diskC、optical mediaD、remote shared folder

考题 Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A、3389 and 25B、3389 and 636C、50636 and 25D、50636 and 135

考题 You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts. Which network mask do you use?()A、/26B、/27C、/28D、/29

考题 Your company is designing its public network. The network will use an IPv4 range of 131.107.40.0/22.The network must be configured as shown in the following exhibit.You need to configure subnets for each segment. Which network addresses should you assign?()A、Segment A: 131.107.40.0/23 Segment B: 131.107.42.0/24 Segment C: 131.107.43.0/25 Segment D: 131.107.43.128/27B、Segment A: 131.107.40.0/25 Segment B: 131.107.40.128/26 Segment C: 131.107.43.192/27 Segment D: 131.107.43.224/30C、Segment A: 131.107.40.0/23 Segment B: 131.107.41.0/24Segment C: 131.107.41.128/25 Segment D: 131.107.43.0/27D、Segment A: 131.107.40.128/23 Segment B: 131.107.43.0/24Segment C: 131.107.44.0/25 Segment D: 131.107.44.128/27

考题 Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

考题 Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft   Online Responder on the internal network.   You need to recommend a secure method for Internet users to verify the validity of individual certificates.   The solution must minimize network bandwidth. What should you recommend?()A、Deploy a subordinate CA on the perimeter network.B、Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.C、Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication  requests to a server on the internal network.D、Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS  to redirect requests to the Online Responder on the internal network.

考题 Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync synchronization.B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync synchronization.C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the perimeter network.D、Deploy two Hub Transport servers on the internal network.

考题 Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()A、Join the new server to an Active Directory domain.B、Install Active? Directory Lightweight Directory Services on the new server.C、Run ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.D、Open TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.

考题 Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

考题 单选题Your company is designing its public network. The network will use an IPv4 range of 131.107.40.0/22.The network must be configured as shown in the following exhibit.You need to configure subnets for each segment. Which network addresses should you assign?()A Segment A: 131.107.40.0/23 Segment B: 131.107.42.0/24 Segment C: 131.107.43.0/25 Segment D: 131.107.43.128/27B Segment A: 131.107.40.0/25 Segment B: 131.107.40.128/26 Segment C: 131.107.43.192/27 Segment D: 131.107.43.224/30C Segment A: 131.107.40.0/23 Segment B: 131.107.41.0/24Segment C: 131.107.41.128/25 Segment D: 131.107.43.0/27D Segment A: 131.107.40.128/23 Segment B: 131.107.43.0/24Segment C: 131.107.44.0/25 Segment D: 131.107.44.128/27

考题 单选题By regulation,you MUST keep a record of the use of your radiotelephone for a minimum of().A six monthsB one yearC two yearsD thirty months

考题 单选题Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A 3389 and 25B 3389 and 636C 50636 and 25D 50636 and 135

考题 单选题You must segement your internal 192.168.1.0/24 network into a minimun of 12 subnet, each containing a minimun of 12 hosts. Which network mask do you use?()A /26B /27C /28D /29

考题 多选题Your network contains a Hyper-V host named Host1 that runs Windows Server 2008 R2. The host is connected to VLAN ID 10. For testing purposes, you plan to deploy several virtual machines (VMs) on the Host1. You need to recommend which virtual networks must be created for the VMs. The solution must ensure that the VMs can only connect to other VMs. Which network configuration or configurations should you recommend?()Aan external network on VLAN ID 10Ban internal network on VLAN ID 11Can external network on VLAN ID 11Da private network on VLAN ID 10Ean internal network on VLAN ID 10

考题 单选题Your network includes 40 servers that run Windows Server 2008 R2. You plan to virtualize the servers by using Hyper-V in a failover cluster. Your plan must allow for up to two offline host servers while still maintaining highly available virtual machines. You need to recommend the minimum number of Hyper-V host servers for the cluster. How many servers should you recommend?()A FiveB ThreeC FourD Six

考题 多选题Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()AState synchronization occurs only through the internal network interface card (NIC)BLatency of the WAN must be less than 300 ms.CAuthenticating endpoints must be on the same LAN segment.DCluster members must use the same hardware platfor

考题 单选题Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()A Configure a Windows Connect Now Group Policy.B Configure a Wireless Network (IEEE 802.11) Policy.C Delete the rogue network from the Network and Sharing Center on each computer.D Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

考题 单选题You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts. Which network mask do you use?()A /26B /27C /28D /29