网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
As the Company wireless administrator, you required to be knowledgeable about the wireless LAN  components.  Which two statements about these components are true? ()
A

In the autonomous access point solution, control is provided by the WLAN controller.

B

In the lightweight access point solution, WLAN management is provided by the WLAN Control  System (WCS).

C

In the autonomous access point solution, control is provided by the WDS (Wireless Domain  Services).

D

Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless  Network.

E

Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution  Engine (WLSE).

F

Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless  Network.


参考答案

参考解析
解析: 暂无解析
更多 “多选题As the Company wireless administrator, you required to be knowledgeable about the wireless LAN  components.  Which two statements about these components are true? ()AIn the autonomous access point solution, control is provided by the WLAN controller.BIn the lightweight access point solution, WLAN management is provided by the WLAN Control  System (WCS).CIn the autonomous access point solution, control is provided by the WDS (Wireless Domain  Services).DCisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless  Network.EIi the lightweight access point solution, WLAN management is provided by the WLAN Solution  Engine (WLSE).FCisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless  Network.” 相关考题
考题 An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

考题 You need to set up a Company AP to act as a wireless repeater.  What are three characteristics of  this wireless repeater topology?()A、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  25%.B、 Autonomous access points are required.C、 The SSID of the root access point must be configured on the repeater access point.D、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  50%.E、 Lightweight access points are required.F、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  75%.G、 The SSID of the root access point must be distinct from that of the repeater access point.

考题 You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

考题 You are the administrator of your company’s network. You run the English (US) edition of Windows 2000 Professional on all computers in your network. As your company continues to grow, and the number of computers is continually expanding, you decide that another domain is needed. Management asks you about what is required to accommodate this new domain. What should you answer the Management in this regard? ()A、WINS, DHCP and DNSB、At least one domain controller and one DNS server.C、At least one domain controller, Active Directory and DNS server.D、Nothing more is needed.E、Nothing more is needed, we can just subnet the network.

考题 You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. The users report the slow performance of a SQL Server 2005 application. You are required to identify the queries which perform slowly because of blocking. Which action should you perform?()A、In a SQL Trace log file, you should look for queries with low duration values and high read and write values.B、In a query execution plan, you should look for queries with missing or out-of-date statistics.C、In a SQL Trace log file, you should look for queries with high duration values and low read and write values.D、In a query execution plan, you should look for queries with a large number of table scans.

考题 You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. A user database named Products is included by your SQL Server 2005 computer. SQL Server Integration Services (SSIS) packages are utilized to export data from the Products database to a text file. You deliver the text file to your company’s trading partners by utilizing FTP. You are required to make sure that your SSIS packages can be recovered from the occurrence of a disaster.  Which action should be performed to finish the task?()A、To finish the task,the Products database should be backed up.B、To finish the task,your server should be set to utilize the full recovery model.C、To finish the task,your server should be set to utilize the bulk-logged recovery model.D、To finish the task, the msdb database should be backed up.

考题 You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. You are log shipping the Adventureworks database to a remote SQL Server 2008 instance. The primary SQL Server instance required a restart during the weekend. But you notice that log shipping has stopped working after the weekend. You have to check log shipping of the Adventureworks database and find out the problem. What should you do? () A、You should use the EXTENDED_LOGICAL_CHECKS option to execute a DBCC CHECKDB statement on the AdventureWorks database by. B、You should identify whether the SQL Server Agent is started on the primary server. C、You should identify whether the AdventureWorks database uses the Simple recovery model. D、You should identify whether the SQL Server Volume Shadow Copy Service (VSS) Writer is started on the primary server

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()A、You should consider changing the EWS virtual directory.B、You should consider changing the Federation Trust.C、You should consider changing the Organizational Relationship.D、You should consider changing the default sharing policy.

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to have the size of the items in a public folder limited whilst ensuring you solution affects only the required public folder. What should you do?()A、You should consider having the Microsoft Office Outlook tool used.B、You should consider having the Public Folder Management Console tool used.C、You should consider having the Exchange Control Panel (ECP) tool used.D、You should consider having the Exchange Management Console (EMC) tool used.

考题 You have an Exchange Server 2010 organization.  Company policy states that a copy of a users mailbox must be kept for one year after the user leaves the company.  All user accounts are in an organizational unit (OU) named OU1.  A compliance administrator plans to export the mailboxes to personal folders.  You need to recommend a solution that allows the compliance administrator to meet the requirements ofthe company policy.  What should you include in the solution?()A、a new management role assignmentB、delegated permissions to OU1C、managed folder mailbox policiesD、new Personal Archives

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover.  What should you do? () A、The contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS) B、You should restore a backup to the active node C、You should get rid of the shared array from the active node D、From the active node, you have to uplug the network cable(s)

考题 单选题A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()A The laptop is missing the software supplicantB The access point SSID is hidden.C The laptop only supports TKIP and AES encryption,D The access point is on the wrong channel.

考题 单选题An administrator has added a new access point to the network to provide additional coverage. A heat-map survey shows coverage now extends beyond company property and is interfering with other wireless networks in the area. How should the administrator modify the new installation to stop the interference?()A Turn down the transmission strength of the access point.B Replace the antenna with a smaller one.C Change the wireless password to a more complex one.D Change the SSID of the access point

考题 单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()A msiB mstC zapD zip

考题 单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to have the size of the items in a public folder limited whilst ensuring you solution affects only the required public folder. What should you do?()A You should consider having the Microsoft Office Outlook tool used.B You should consider having the Public Folder Management Console tool used.C You should consider having the Exchange Control Panel (ECP) tool used.D You should consider having the Exchange Management Console (EMC) tool used.

考题 单选题You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A Wireless routerB HubC RepeaterD Wireless network adapter

考题 单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance on the same physical computer. Now users report that they are unable to connect to the named instances. You check and verify that they can only connect to the default instance. You also ensure that all SQL Server instances run normally. You have to start the service which is required to connect to the named instances.  Which service should you start?()A Server B SQL Server Agent C SQL Server Browser D SQL Active Directory Helper

考题 单选题You have an Exchange Server 2010 organization.  Company policy states that a copy of a users mailbox must be kept for one year after the user leaves the company.  All user accounts are in an organizational unit (OU) named OU1.  A compliance administrator plans to export the mailboxes to personal folders.  You need to recommend a solution that allows the compliance administrator to meet the requirements ofthe company policy.  What should you include in the solution?()A a new management role assignmentB delegated permissions to OU1C managed folder mailbox policiesD new Personal Archives

考题 多选题You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()ACreate a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.BConfigure a wired adapter and assign the required SSID under User Roles Agent Odyssey Settings.CCreate a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.DCreate a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.

考题 单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now you get an order from your company CIO, you have to identify whether a database integrity check (DBCC CHECKDB) was run for a particular database.  Which log file should you examine?()A log.trc B default.trc C ERRORLOG D SQLAGENT

考题 单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The company wants to export data from SQL Server to a Microsoft Excel file. The company assigns this task to you. You perform this by using the SQL Server Import and Export Wizard. After this, you save the package definition to a file. Now you have to reexecute the package from the command line.  In the options below, which utility should you choose to use?()A bcp.exe B dta.exe C dtexec.exe D sqlmaint.exe

考题 单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()A The SetupUser profileB The Default User profileC The Administrator profileD The System profileE The All Users profile

考题 单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005.You work as a database administrator for your company. A SQL Server 2005 database is utilized in your company. And a table named Inventory is contained by the database. A column named Price is included by the table. According to the company policy, you cannot reduce more than 10 percent the value in the Price column in any single database operation. Through many kinds of method, the company makes updates to the Price column. For instance, the utilization of ad hoc queries is one of the methods. Since you are the database administrator, you should confirm that this company policy takes its effect. Which action should be performed?()A A stored procedure should be created, and changes are disallowed by the procedure to the Price column that violates company policy.B On the Price column, a check constraint should be created, and a specified minimum value is required by the check constraint.C A trigger should be created, and changes are rolled back by the trigger to the Price column that violates company policy.D On the Price column, a foreign key constraint is created to a table that valid prices are included.

考题 单选题You have been called upon to add location-based services into an existing controller-based wireless designwhich primarily encompasses handheld devices such as barcode scanners and Cisco 7920 wireless IPphones. In which mode should you deploy the additional access points to achieve the density required without excessive co-channel interference?()A sniffer modeB monitor modeC location modeD tracking mode

考题 单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. For some reason, now the company wants to view the number of users who access the SQL Server instance. The company CIO assigns this task to you. You have to use Windows System Monitor to find out the concrete number. Which performance object should you capture?()A SQLServer:Buffer Manager B SQLServer:Access Methods C SQLServer:General Statistics D SQLServer:Exec Statistics