网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()
A

On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy

B

On all client computers, implement logon auditing for all user account logons

C

On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy

D

On all domain controllers, implement logon auditing for all user account logons


参考答案

参考解析
解析: 暂无解析
更多 “单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB On all client computers, implement logon auditing for all user account logonsC On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD On all domain controllers, implement logon auditing for all user account logons” 相关考题
考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()

考题 your company uses DHCP to lease IPv4 addresses to computers at the main office. A WAN link connects the main office to a branch office. All computers in the branch office are configured with static ip addresses. The branch office does not use DHCP and uses a different subnet. You need to ensure that the portable computers can connect to network resources at the main office and the branch office. How should you configure each portable computer?()A、Use a static IPv4 address in the range used at the branch office.B、Use a alternate configuration that contains a static IP address in the range used at the main office.C、Use the address that was assigned by DHCP as a static IP address.D、Use an altermate configuration that contains a static IP address in the range used at the branch office.

考题 You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only. A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company's VPN. They must have 24-hour access to the files on Server1. You need to be able to identify the source of the recurring slowdowns in VPN access. First, you log on to Server1. What should you do next?()A、Use Task Manager to review network utilization of the VPN adapter.B、Use the Performance console to create a log of network utilization outside of business hours.C、Use System Monitor to review network utilization of the VPN connection.D、Use Task Manager to select Bytes Sent as the Network Adapter History setting.

考题 The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

考题 Your company uses DHCP to lease IPv4 addresses to computers at the main office. A WAN link connects the main office to a branch office. All computers in the branch office are configured with static IP addresses. The branch office does not use DHCP and uses a different subnet. You need to ensure that the portable computers can connect to network resources at the main office and the branch office. How should you configure each portable computer?()A、Use a static IPv4 address in the range used at the branch office.B、Use an alternate configureation that contains a static IP address in the range used at the main officeC、Use the address that was assigned by DHCP as a static IP addressD、Use an alternate configuration that contains a static Ip address in the range used at the branch office.

考题 A medium-sized company has a Class C IP address. It has two Cisco routers and one non-Cisco router. All three routers are using RIP version 1. The company network is using the block of 198.133.219.0/24. The company has decided it would be a good idea to split the network into three smaller subnets and create the option of conserving addresses with VLSM. What is the best course of action if the company wants to have 40 hosts in each of the three subnets?()A、Convert all the routers to EIGRP and use 198.133.219.32/27, 198.133.219.64/27, and 198.133.219.92/27 as the new subnetworks.B、Maintain the use of RIP version 1 and use 198.133.219.32/27, 198.133.219.64/27, and 133.219.92/27 as the new subnetworks.C、Convert all the routers to EIGRP and use 198.133.219.64/26, 198.133.219.128/26, and 133.219.192/26 as the new subnetworks.D、Convert all the routers to RIP version 2 and use 198.133.219.64/26, 198.133.219.128/26, and 133.219.192/26 as the new subnetworks.E、Convert all the routers to OSPF and use 198.133.219.16/28, 198.133.219.32/28, and 198.133.219.48/28 as the new subnetworks.F、Convert all the routers to static routes and use 198.133.219.16/28, 198.133.219.32/28, and

考题 You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company’s main office is in Barcelona, and it has branch offices in Paris and London. The company has no immediate plans to expand or relocate the offices.   The company wants to connect the office networks by using a frame relay WAN connection and Routing and Remote Access servers that are configured with frame relay WAN adapters. Computers in each office will be configured to use the local Routing and Remote Access server as a default gateway. You are planning the routing configuration for the Routing and Remote Access servers.   You need to allow computers in Barcelona, Paris, and London to connect to computers in any office. You want to minimize routing traffic on the WAN connection.   What should you do?  ()A、 At each office, add the OSPF routing protocol to Routing and Remote Access, add the WAN adapter to the OSPF routing protocol, and deploy OSPF as a single-area internetwork.B、 At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 broadcast and the incoming packet protocol as RIP version 1 and 2.C、 At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 multicast and the incoming packet protocol as RIP version 2 only.D、 At each office, configure the Routing and Remote Access server with static routes to the local networks at the other two offices.

考题 our company has a main office and 15 branch offices. The company has a single active directory domain. All servers run windows server 2008.You need to ensure that the VPN connections between the office and the branch offices meet the following requirements:All data must be encrypted by using end-to-end encryption.The vpn connection must use computer-level authentication.User names and passwords cannot be used for authentication.What should do?()A、Configure an ipsec connection to use tunnel mode and preshared key authentication.B、Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.C、Configure a L2TP/IPsec connection to use the EAP-TLS authentication.D、Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.

考题 Your company has client computers that run Windows Vista.   The company plans to upgrade the Windows Vista computers to Windows 7.   The current configuration of all client computers in your company is based on a common Windows Vista image.   Some branch offices use WAN connections to connect to the main office. You have the following requirements:   Transfer all user data from the original Windows Vista installation to the new Windows 7 installation.  Use the least amount of bandwidth while transferring the user data.  Support the same migration strategy for all offices.    You need to design a user state migration strategy that supports the requirements.   What should you do?()A、Use the multicast feature of Windows Deployment Services (WDS)B、Use the Deployment Image Servicing and Management (DISM) toolC、Use the User State Migration Tool (USMT) and a hard-link migration storeD、Use Windows PE to perform an offline migration

考题 ou work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. According to the company requirement, you intend to perform an installation of an instance of SQL Server Reporting Services (SSRS) to the same machine. Now your company CIO wants version histories of all deployed reports can be kept. As a technical support, what should you do to ensure this?()A、You should use the http.sys listener to install the SSRS instance. B、You should configure the SSRS database, make it use Native mode C、You should configure the SSRS database, make it use SharePoint integrated mode D、You should use the Internet Information Services default Web site to install the SSRS instance 

考题 You are a systems engineer for your company. Your company has 20,000 users in a large campus environment located in Los Angeles. Each department in the company is located in its own building. Each department has its own IT staff, which is responsible for all network administration within the building.   The company’s network is divided into several IP subnets that are connected to one another by using dedicated routers. Each building on the company’s main campus contains at least one subnet, and possibly up to five subnets. Each building has at least one router. All routers use RIP version 2 (RIPv2) broadcasts.   The company acquires a new business unit located in Denver. The Denver office has 25 users. The network in the Denver office is connected to the network at the main campus by using a leased frame relay connection. The network administrator at the Denver office installs a Windows Server 2003 computer and configures Routing and Remote Access on this server. The network administrator at the Denver office configures this server as a router and implements RIPv2 in Routing and Remote Access.   Later, the Denver administrator reports that his router is not receiving routing table updates from the routers on the main campus network. He must manually add routing entries to the routing table to enable connectivity between the locations. You investigate and discover that the RIPv2 broadcasts are not being received at the Denver office. You also discover that no routing table announcements from the Denver office are being received on the main campus network.  You need to ensure that the network in the Denver office can communicate with the main campus network and can send and receive automatic routing table updates as network conditions change.   What should you do on the router in the Denver office?()A、 Configure the router to use RIPv1 broadcasts.B、 Configure the router to use auto-static update mode.C、 Add the IP address ranges of the main campus network to the router’s Accept list and Announce list.D、 Add the IP addresses of the main campus routers to the router’s Neighbors list.

考题 单选题You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company’s main office is in Barcelona, and it has branch offices in Paris and London. The company has no immediate plans to expand or relocate the offices.   The company wants to connect the office networks by using a frame relay WAN connection and Routing and Remote Access servers that are configured with frame relay WAN adapters. Computers in each office will be configured to use the local Routing and Remote Access server as a default gateway. You are planning the routing configuration for the Routing and Remote Access servers.   You need to allow computers in Barcelona, Paris, and London to connect to computers in any office. You want to minimize routing traffic on the WAN connection.   What should you do?  ()A  At each office, add the OSPF routing protocol to Routing and Remote Access, add the WAN adapter to the OSPF routing protocol, and deploy OSPF as a single-area internetwork.B  At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 broadcast and the incoming packet protocol as RIP version 1 and 2.C  At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 multicast and the incoming packet protocol as RIP version 2 only.D  At each office, configure the Routing and Remote Access server with static routes to the local networks at the other two offices.

考题 单选题A medium-sized company has a Class C IP address. It has two Cisco routers and one non-Cisco router. All three routers are using RIP version 1. The company network is using the block of 198.133.219.0/24. The company has decided it would be a good idea to split the network into three smaller subnets and create the option of conserving addresses with VLSM. What is the best course of action if the company wants to have 40 hosts in each of the three subnets?()A Convert all the routers to EIGRP and use 198.133.219.32/27, 198.133.219.64/27, and 198.133.219.92/27 as the new subnetworks.B Maintain the use of RIP version 1 and use 198.133.219.32/27, 198.133.219.64/27, and 133.219.92/27 as the new subnetworks.C Convert all the routers to EIGRP and use 198.133.219.64/26, 198.133.219.128/26, and 133.219.192/26 as the new subnetworks.D Convert all the routers to RIP version 2 and use 198.133.219.64/26, 198.133.219.128/26, and 133.219.192/26 as the new subnetworks.E Convert all the routers to OSPF and use 198.133.219.16/28, 198.133.219.32/28, and 198.133.219.48/28 as the new subnetworks.F Convert all the routers to static routes and use 198.133.219.16/28, 198.133.219.32/28, and

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 单选题Why has Ms. Washington only placed a small order?A Her company recently went out of business.B She wants to judge the quality of the product.C Her warehouse does not have any more space.D She wants to terminate the transaction with the company.

考题 问答题Practice 3  ● Look at the leaflet below. It shows a list of talks organized by a marketing association for its member.  ● For questions 6-10, decide which event (A-H) is the most suitable for each person.  ● For each question, mark one letter (A-H) on your Answer Sheet.  ● Do not use any letter more than once.  BA Marketing Association  Events for March  A Business to business marketing: secrets of successful networking  B Improving e-marketing performance  C Using market researchers—why and how  D IT in presentations—what’s available and how to use it  E Advertising, PR or Marketing— which is king  F Making the appearance of products more attractive  G Well trained staff—an important marketing tool  H Tripton Motors, marketing success story  6. Eddie Smith’s director wants him to attend a talk on the benefits of updating employees’ marketing skills.  7. The product manager of Smiths Engineering wants to know about the effectiveness of computer graphics when giving talks to major clients.  8. Rachel Green’s company advertises mainly through magazines. But she needs to make more effective use of the company’s website.  9. An advertising trainee has read a research report on the importance of design and packaging and would like more information.  10. Computer services provider McDonald wants to find out about ways of making useful contacts in other companies.

考题 单选题Your company has a main office and plans to open a new branch office. All servers run Windows Server 2003 Service Pack 2 (SP2).You assign the network address of 192.168.1.64/26 to the new branch office. You need to configure the network settings for a server in the branch office. Which IP address should you use?()A 192.168.1.10B 192.168.1.63C 192.168.1.125D 192.168.1.200

考题 单选题Your company has 250 client computers connected to the office LAN. The company has a pool of five public IP addresses. All client computers have dynamically assigned IP addresses. You need to provide all client computers with Internet access.  What should you use?()A  DHCP Relay AgentB  Routing Information Protocol (RIP)C  Internet Group Management Protocol (IGMP)D  Network Address Translation (NAT)/Basic Firewall

考题 单选题This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use SSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario The company hires a new desktop support technician. The technician is added to the Administrators group on all client computers and the DHCP Users group on all DHCP servers. The new technician reports that the DHCP snap-in is unavailable on his computer. You need to ensure that the technician can view the configurations of the DHCP servers. What should you do?()A Instruct the technician to customize the Start menu to display the administrative tools.B Instruct the technician to install Remote Server Administration Tools (RSAT) and to modify the Windows Features.C Request that the technician be added to the Server Operators group in Active Directory.D Request that the technician be added to the Network Configuration Operators group in Active Directory and modify the Windows Features.

考题 单选题Your company has 1,000 computers in the main office and 20 computers in store kiosks.All the computers run Windows 7 Enterprise.   The kiosk computers do not have network connections.  The company brands the Internet Explorer program window on all computers by displaying the company logo at the left end of the title bar.  The company changes its logo.   You have the following requirements:   Display the new logo on the Internet Explorer program window title bar on the main office computers and the kiosk computers.  Modify the search providers that are available to main office computers. You need to define Internet Explorer settings to support the requirements.   What should you do?()A  Save the logo as Logo.png and copy the file to the C:///Windows/Branding/ directory on each kiosk computer. Createand distribute a new OpenSearch description file for the main office computers.B  Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package on the main office computers. Enable automatic version synchronization and specify a flash drive for the path. Distribute the configuration package to the kiosk computers.C  Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package on the main office computers. Create a deployment CD for the kioskcomputers.D  Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package. Copy the setup file to a flash drive,and distribute the file to all computers.

考题 单选题All the traveling ______ are paid by the company if you travel on business.A chargesB moneyC pricesD expenses

考题 单选题Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()A BranchCacheB DirectAccessC Distributed File System Replication (DFSR)D Universal Group Membership Caching

考题 单选题You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet.   The company’s written security policy includes the following requirements for VPN connections over the Internet:  All data must be encrypted with end-to-end encryption.  VPN connection authentication must be at the computer level.   Credential information must not be transmitted over the Internet as part of the authentication process.   You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy.   What should you do?  ()A  Use a PPTP connection with EAP-TLS authentication.B  Use a PPTP connection with MS-CHAP v2 authentication.C  Use an L2TP connection with EAP-TLS authentication.D  Use an L2TP connection with MS-CHAP v2 authentication.