网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A server is configured with two network cards. To utilize the band width of both network cards at the same time without assigning more than one IP address,which of the following load balancing techniques should be used?()
A

 Clustering

B

 NIC teaming

C

 OSPF

D

 VLAN tagging


参考答案

参考解析
解析: 暂无解析
更多 “单选题A server is configured with two network cards. To utilize the band width of both network cards at the same time without assigning more than one IP address,which of the following load balancing techniques should be used?()A  ClusteringB  NIC teamingC  OSPFD  VLAN tagging” 相关考题
考题 Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()A. SHA not responding to NAP clientB. SHA unable to contact required servicesC. SHV not respondingD. SHV unable to contact required services

考题 When a DHCP server is configured, which two IP addresses should never be assignable to hosts?() A. network or subnetwork IP addressB. broadcast address on the networkC. IP address leased to the LAND. IP address used by the interfacesE. manually assigned address to the clientsF. designated IP address to the DHCP server

考题 When a DHCP server is configured, which two IP addresses should never be assignable to hosts? ()A、network or subnetwork IP addressB、broadcast address on the networkC、IP address leased to the LAND、IP address used by the interfacesE、manually assigned address to the clientsF、designated IP address to the DHCP server

考题 A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()A、For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.B、For the two vlans to communicate, a network statement for each subinterface needs to be  added  to the OSPF configuration.C、Direct inter-vlan communication does not require OSPFD、OSPF cannot be used if router-on-a-stick is configured on the router

考题 Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.  Server1 is a DHCP server that is configured to have a scope named Scope1. Server2 is configured to obtain an IP address automatically. In Scope1, you create a reservation named Res_Server2 for Server2. A technician replaces the network adapter on Server2. You need to ensure that Server2 can obtain the same IP address.  What should you modify on Server1?()A、The Advanced settings of Res_Server2B、The MAC address of Res Server2C、The Network Access Protection Settings of Scope1D、The Name Protection settings of Scope1

考题 A server is configured with two network cards. To utilize the bandwidth of both network cards at the same time without assigning more than one IP address, which of the following load balancing techniques should be used?()A、ClusteringB、NIC teamingC、OSPFD、VLAN tagging

考题 A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A、NIC filtering is enabled.B、Port security is configured.C、NIC is not in promiscuous mode.D、NIC is in promiscuous mode.

考题 A server is configured with two network cards. To utilize the band width of both network cards at the same time without assigning more than one IP address,which of the following load balancing techniques should be used?()A、 ClusteringB、 NIC teamingC、 OSPFD、 VLAN tagging

考题 An AIX server has 2 network interfaces and the system administrator wants to enable the users on the locally configured network interface to be able to connect to systems configured on the global network interface.  How is it accomplished?()A、Enable routed on the serverB、Enable gated on the serverC、Enable ipforwarding on the serverD、Set network options back to default

考题 Your network consists of a single Active Directory domain and a single network segment. All client computers are configured to receive their IP configurations automatically.You deploy two DHCP servers named Server1 and Server2. Each DHCP server has one scope. Users report IP address conflicts.You need to ensure that clients receive unique addresses.  What should you do on Server1 and Server2?()A、Create a superscope.B、Create a multicast scope.C、Configure Network Load Balancing.D、Modify the address range for the scopes on both servers.

考题 Your network uses IPv4. You install a server that runs Windows Server 008 at a brach office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office. Which two actions should you perform?() A、 Install the Routing and Remote Access role.B、 Run the netsh ras ip set access ALL commandC、 Run the netsh interface ipv4 enable commandD、 Enable the IPv4 Router Routing and Remote Access option

考题 Your network uses IPv4.You install a server that runs Windows Server 2008 R2 at a branch office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office.Which two actions should you perform?()A、Install the Routing and Remote Access Services role service.B、Run the netsh ras ip set access ALL command.C、Run the netsh interface ipv4 enable command.D、Enable the IPv4 Router Routing and Remote Access option.

考题 You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()A、Configure a Client Access server array.B、Deploy a second ISA server and create an ISA server array.C、Implement Windows Network Load Balancing for the Client Access servers.D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

考题 单选题Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.  Server1 is a DHCP server that is configured to have a scope named Scope1. Server2 is configured to obtain an IP address automatically. In Scope1, you create a reservation named Res_Server2 for Server2. A technician replaces the network adapter on Server2. You need to ensure that Server2 can obtain the same IP address.  What should you modify on Server1?()A The Advanced settings of Res_Server2B The MAC address of Res Server2C The Network Access Protection Settings of Scope1D The Name Protection settings of Scope1

考题 多选题Your network uses IPv4.You install a server that runs Windows Server 2008 at a branch office.The server is configured with two network interfaces. You need to configure routing on the server at the branch office.Which two actions should you perform? (Each correct answer presents part of the solution.()AInstall the Routing and Remote Access Services role service.BRun the netsh ras ip set access ALL command.CRun the netsh interface ipv4 enable command.DEnable the IPv4 Router Routing and Remote Access option.

考题 单选题Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()A SHA not responding to NAP clientB SHA unable to contact required servicesC SHV not respondingD SHV unable to contact required services

考题 单选题Your network contains two Windows Server Update Services (WSUS) servers named Server1 and Server2. Server1 is a member of a domain named contoso.com. Server2 is a standalone server. Server2 is configured as an autonomous downstream server.You need to ensure that all updates approved on Server1 are automatically approved on Server2. Which options should you modify?()A Automatic ApprovalsB Products and ClassificationsC Synchronization ScheduleD Update Source and Proxy Server

考题 单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()A  NIC filtering is enabled.B  Port security is configured.C  NIC is not in promiscuous mode.D  NIC is in promiscuous mode.

考题 单选题A server is configured with two network cards. To utilize the band width of both network cards at the same time without assigning more than one IP address,which of the following load balancing techniques should be used?()A  ClusteringB  NIC teamingC  OSPFD  VLAN tagging

考题 多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server bypassed.DIf the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

考题 单选题Your network consists of a single Active Directory domain and two network segments named Subnet1 and Subnet2.You deploy a server named Server1 that runs Routing and Remote Access. Server1 is configured as a router between the two network segments.You deploy a DHCP server on Subnet1. You configure a DHCP scope for each network segment.Client computers that run Windows XP Professional Service Pack 3 (SP3) are deployed on both network segments and are configured to receive IP configurations dynamically.You discover that all client computers on Subnet2 have Automatic Private IP Addressing (APIPA) addresses.You need to ensure that all client computers on Subnet2 receive their IP configurations from the DHCP server.  What should you do in Routing and Remote Access?()A Disable IP Routing. B Create a static route. C Enable demand-dial routing. D Enable a DHCP Relay Agent.

考题 多选题Your network uses ipv4. You install a server that runs windows server 008 at a brach office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office. Which two actions should you perform? ()AInstall the routing and remote access role.BRun the netsh ras ip set access ALL command.CRun the netsh interface ipv4 enable command.DEnable the IPV4 router routing and remote access option.

考题 单选题You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. Two servers on the network were configured as follows: Server01:Windows Media Services server role installed Server02:Windows Media Services server role installed and is also configured a License Clearing House.You published an audio file,which is licensed by Server02 on Server01. Which of the following optionswould you choose to ensure that users are allowed to use the audio file for only two days?()A Modify the license on Server02.B Modify the key ID on Server01.C Create a new package on Server02.D Modify the license key seed on Server01.