网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You need to create a new VLAN on your Catalyst switch. This VLAN is to be named TESTKING. Which of the following need to be completed for the creation of this new VLAN?()
A

The TESTKING VLAN must be created.

B

The desired ports must be added to the new TESTKING VLAN.

C

The TESTKING VLAN must be added to all of the domains.

D

The TESTKING VLAN must be named.

E

An IP address must be configured for the TESTKING VLAN.

F

None of the above. VLAN creations are automatic.


参考答案

参考解析
解析: 暂无解析
更多 “多选题You need to create a new VLAN on your Catalyst switch. This VLAN is to be named TESTKING. Which of the following need to be completed for the creation of this new VLAN?()AThe TESTKING VLAN must be created.BThe desired ports must be added to the new TESTKING VLAN.CThe TESTKING VLAN must be added to all of the domains.DThe TESTKING VLAN must be named.EAn IP address must be configured for the TESTKING VLAN.FNone of the above. VLAN creations are automatic.” 相关考题
考题 You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?A. STPB. GVRPC. SNMPD. VTPE. DHCPF. None of the above

考题 You need to create a new VLAN on your Catalyst switch. This VLAN is to be named EZONEXAM. Which of the following need to be completed for the creation of this new VLAN? (Select all that apply)A. The EZONEXAM VLAN must be created.B. The desired ports must be added to the new EZONEXAM VLAN.C. The EZONEXAM VLAN must be added to all of the domains.D. The EZONEXAM VLAN must be named.E. An IP address must be configured for the EZONEXAM VLAN.F. None of the above. VLAN creations are automatic.

考题 资料:Changing careers is becoming more popular. Not just because there are more career options available, but also out of necessity. As new industries arise, others die. It's up to you to figure out if your career is still going to be around in the next 5-10 years. Some studies say we could have as many as nine careers in our professional lifetime. Which begs the question: do you know what it takes to successfully change career lanes repeatedly? Switching careers is like changing highway lanes: you must signal! If you want to move in a new career direction, you need to signal to the professional world you intend to make a change. You need to do it with purpose and specificity. It must look well-thought out and intentional. Otherwise, people will A) not know you are looking to make the change, and B)assume you are doing it because you failed in your current career in some way. 1. Give the logic and passion behind your career change. When signaling to your network you want to switch careers you must explain why both your head and heart are ready to change. Perhaps there are financial or geographic reasons (i.e., you need to relocate or make more money). But, you must also convey the excitement and sincere desire you have for this new career (i.e., you want to make a difference or work on a particular type of problem that needs to be solved). 2. Build a marketing campaign for your business-of-one. Most employers prefer to hire people with previous experience. Thus, you're going to need a way to convey to them your transferable skills from your former career path will be equally valuable. The best way to do this is to create a targeted list of employers you want to work for and then strategically network with their employees. The more conversations and connections you can have within your new career path, the easier it will be to convince someone to hire you in spite of your lack of experience. To sum it up … Once you commit to a career change, the secret to success is to make sure everyone knows about it. Otherwise, you will struggle to change career lanes efficiently and effectively. What does the sentence “you must signal!” mean in paragraph 2?A.You need to have more conversations and connections within your new career path. B.You need to build a marketing campaign for your business-of-one. C.You need to give the logic and passion behind your career change. D.You need to make sure everyone knows about it.

考题 You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

考题 VLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan3 commmand interface configuration mode?()A、The command is accepted and the respective VLAN is added to vlan dat.B、The command is rejected.C、The command is accepted and you must configure the VLAN manually.D、The port turns amber.

考题 Your network consists of a single Active Directory domain. User accounts for engineering department  are located in an OU named Engineering.    You need to create a password policy for the engineering department that is different from your domain  password policy.    What should you do()A、Create a new GPO. Link the GPO to the Engineering OU.B、Create a new GPO. Link the GPO to the domain. Block policy inheritance on all OUs except for the  Engineering OU.C、Create a global security group and add all the user accounts for the engineering department to the  group. Create a new Password Policy Object (PSO) and apply it to the group.D、Create a domain local security group and add all the user accounts for the engineering department to  the group. From the Active Directory Users and Computer console, select the group and run the  Delegation of Control Wizard.

考题 Your company has a server that runs Windows Server 2008 R2.You have a new application that locates remote resources by name. The new application requires IPv6.You need to ensure that the application can locate remote resources by using IPv6.What should you do?()A、Create a new Pointer (PTR) DNS record.B、Create a new Quad-A (AAAA) DNS record.C、Create a new Signature (SIG) DNS record.D、Create a new Route Through (RT) DNS record.

考题 Your network contains one Exchange Server 2010 Service Pack 1 (SP1) Client Access server named Server1. You have a user named User1. You need to limit the size of the attachments that User1 can download by using Windows Mobile 6.5 devices. What should you do first?()A、Create a new Exchange ActiveSync device access rule.B、Create new managed content settings.C、Modify the message size restrictions for User1.D、Create a new Exchange ActiveSync mailbox policy.

考题 You need to identify the hardware failures have occurred on your computer in the past six months. What should you do?()A、Open Device Manager.B、Open Reliability Monitor.C、Create a User Defined Data Collector Set.D、Create a new Event Trace Sessions Data Collector Set.

考题 You need to create a new VLAN on your Catalyst switch. This VLAN is to be named TESTKING. Which of the following need to be completed for the creation of this new VLAN?()A、The TESTKING VLAN must be created.B、The desired ports must be added to the new TESTKING VLAN.C、The TESTKING VLAN must be added to all of the domains.D、The TESTKING VLAN must be named.E、An IP address must be configured for the TESTKING VLAN.F、None of the above. VLAN creations are automatic.

考题 By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access? ()A、Create an additional ACL to block the access to VLAN 1.B、Move the management VLAN to something other than default.C、Move all ports to another VLAN and deactivate the default VLAN.D、Limit the access in the switch using port security configuration.E、Use static VLAN in trunks and access ports to restrict connections.F、Shutdown all unused ports in the Catalyst switch.

考题 You completed the development of a new application and want to create a new domain in a new environment for functional testing. You want to have the same settings for your new domain as your old domain, with the option of changing the configuration in the new target environment. Which two actions should you execute?()A、Use the introspect () command in WLST to gather the configuration information from the  original domain.B、Use pack/unpack to transfer the domain from one machine to another.C、Create a domain template from the original domain using the Domain Template Builder and use  the Configuration Wizard to create a new domain from the template.D、Use the Admin Console of the original domain to create a domain template from the original  domain and use the Configuration Wizard to create a new domain from the template.

考题 Your end users will need to change values in a REF lookup field in the form application you create. To facilitate choosing a new appropriate value, your provide them with? ()A、An LOV for REFS. B、A list item for REFs. C、A radio group for REFs. D、A hierarchical tree for REFS

考题 You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact.  Which of the following is true regarding your recovery?()  A、 You will need to open the database with the resetlogs command.B、 All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.C、 You will use the resetlogs version of the create controlfile command.D、 You will use the noresetlogs version of the create controlfile command.E、 You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command

考题 Your network consists of a single Active Directory domain. User accounts for engineering  department are located in an OU named Engineering.     You need to create a password policy for the engineering department that is different from your  domain password policy.     What should you do()A、Create a new GPO. Link the GPO to the Engineering OU.B、Create a new GPO. Link the GPO to the domain. Block policy inheritance on all OUs except for the Engineering OUC、Create a global security group and add all the user accounts for the engineering department to the group. Create aD、Create a domain local security group and add all the user accounts for the engineering department to the group. Fr

考题 Your network contains an Exchange Server 2010 server.You need to prevent a user named User1 from downloading attachments larger than 50 KB when using Exchange ActiveSync.Your solution must not affect other users.  What should you do first?()A、Modify User1 Mailbox propertiesB、Create a New ActiveSync Mailbox PolicyC、Create a New Exchange ActiveSync Mailbox policyD、Modify properties of Default Exchange ActiveSync Mailbox policy

考题 Your network consists of a single Active Directory domain named contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2).You plan to deploy a new DNS zone named adatum.com. You need to ensure that only computers in the contoso.com domain can update host records in the new DNS zone. What should you do?()A、Create a new Active Directory forest named adatum.com. B、Create a new Active Directory-integrated zone named adatum.com. C、Create a new standard primary zone named adatum.com. Disable round robin. D、Create a new standard primary zone named adatum.com. Disable netmask ordering.

考题 You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOB、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOC、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOD、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

考题 Your network consists of a single Active Directory domain. The domain contains 10 domain controllers. The domain controllers run Windows Server 2008 and are configured as DNS servers. You plan to create a new Active Directory-integrated zone. You need to ensure that the new zone is only replicated to four of your domain controllers. What should you do first()A、Create a new delegation in the ForestDnsZones application directory partition.B、Create a new delegation in the DomainDnsZones application directory partition.C、From the command prompt, run dnscmd and specify the /enlistdirectorypartition parameter.D、From the command prompt, run dnscmd and specify the /createdirectorypartition parameter.

考题 Company.com has employed you as their Exchange administrator.The Company.com network contains Mailbox servers that are configured to run either Exchange Server 2007 or Exchange Server 2010.During the course of the week you receive an instruction from the CIO to ensure that all e-mail messages stored for more than 90 days in the Inbox folder of clients be deleted. What should you do?()A、Your best option would be to create a new retention policy.B、Your best option would be to create a new message classification.C、Your best option would be to create new managed content settings.D、Your best option would be to create a new managed custom folder.

考题 Your network contains Mailbox servers that run Exchange Server 2007 and Exchange Server 2010.You need to ensure that all e-mail messages located in the Inbox folders of all users are deleted after 120 days.What should you create first?()A、a new managed custom folderB、a new message classificationC、a new retention policyD、new managed content settings

考题 You are building a test environment to evaluate DNS Security Extensions (DNSSEC). You have a domain controller named Server1 that runs Windows Server 2008 R2 in your test environment. Server1 has the DNS Server server role installed. You need to configure Server1 to support the DNSSEC evaluation. Which two actions should you perform?()A、Create a new Quad-A (AAAA) DNS record.B、Create a new Signature (SIG) DNS record.C、Create a new Public key (KEY) DNS record.D、Create a new Well-known service (WKS) DNS record.

考题 You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()A、Create a child OU within the existing domainB、Create a child domain of the existing domainC、Create a new domain in a new forest. Configure the new domain to trust the existing domainD、Create a new tree in the existing forest. Configure the new domain to trust the existing domain

考题 Your company acquires a new Internet domain name.You need to ensure that all users can receive e-mail messages sent to the new domain name.Which two actions should you perform?()A、Create a sharing policy.B、Create a remote domain.C、Create an accepted domain.D、Create an e-mail address policy.E、Modify the properties of the default Receive connector.

考题 You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()A、Create the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.B、Create a new FileSecurity object.C、Apply the permissions by using the File class.D、Create a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.E、Create a new FileSystem Audit Rule object and add it to the FileSecurity object.

考题 单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A STPB GVRPC SNMPD VTPE DHCP

考题 单选题VLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan3 commmand interface configuration mode?()A The command is accepted and the respective VLAN is added to vlan dat.B The command is rejected.C The command is accepted and you must configure the VLAN manually.D The port turns amber.

考题 单选题Your network contains Mailbox servers that run Exchange Server 2007 and Exchange Server 2010.You need to ensure that all e-mail messages located in the Inbox folders of all users are deleted after 120 days.What should you create first?()A a new managed custom folderB a new message classificationC a new retention policyD new managed content settings