网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()
A

An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.

B

The counters were deleted.

C

The ARP cache was removed.

D

The IP EIGRP neighbor relationship was cleared manually.


参考答案

参考解析
解析: 暂无解析
更多 “多选题As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()AAn update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.BThe counters were deleted.CThe ARP cache was removed.DThe IP EIGRP neighbor relationship was cleared manually.” 相关考题
考题 You administer your company‘s network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the applicatin.What should you do?()A.AB.BC.CD.D

考题 You work as a network engineer at TestKing.com. You are required to allow establishment of a Telnet session with a router TestKingC.Which set command must be configured?() A.B.C.D.E.F.

考题 You work as a network engineer for the company, you want to configure two BGP speakers to form an EBGP session across a firewall. On the engineer’s network, the firewall always permits TCP sessions that are initiated from the inside network (the network attached to the inside interface of the firewall). What prerequisite is there for enabling BGP to run on this network?()A、EBGP multihop will need to be configured for this to work.B、This should work with normal BGP peering, with no additional configuration on the BGP speakers or the firewall.C、The BGP protocol port must be opened on the firewallD、There is no way to make BGP work across a firewall.

考题 As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()A、An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.B、The counters were deleted.C、The ARP cache was removed.D、The IP EIGRP neighbor relationship was cleared manually.

考题 You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

考题 As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()A、Perform a network audit.B、Form an impression about the network.C、Use traffic analysis to augment organizational input.D、Prepare and add to the network description.

考题 As an experienced Network Engineer, you are responsible for network connectivity and system configuration. Which of the following protocols will be supported by Cisco Nonstop Forwarding (NSF)?()A、ISSU,OSPF,IS-ISB、IETF,OSPF,ISSUC、IS-IS,EIGRP,SSO,BGPD、EIGRP,BGP,OSPF,IS-IS

考题 As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)A、cost savingsB、product varietyC、well-tested interoperabilityD、regular upgrade process

考题 Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows7 on a new portable computer and join the computer to the domain. You need to ensure that the computercan establish DirectAccess connections.  What should you do?()A、Install a computer certificate.B、Create a new network connection.C、Enable the Network Discovery firewall exception.D、Add the computer account to the Network Configuration Operators group.

考题 Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft   Online Responder on the internal network.   You need to recommend a secure method for Internet users to verify the validity of individual certificates.   The solution must minimize network bandwidth. What should you recommend?()A、Deploy a subordinate CA on the perimeter network.B、Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.C、Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication  requests to a server on the internal network.D、Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS  to redirect requests to the Online Responder on the internal network.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()A、You should create a discover imageB、You should create an install imageC、You should create a capture imageD、You should create a CD-ROM that contains PXE drivers

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A、Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B、Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C、Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D、Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

考题 You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.

考题 You create Windows Forms application by using the .Net FrameWork 3.5 You plan to deploy a new application to client computers that use the Windows Vista operating system. You need to ensure that the user can install the application without being prompted fore elevated permission.What should you do?()A、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a CD-ROM.Install the application on each client computer from the CD-ROMB、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a server on the network.Install the application on each client computer.C、Add the requestedExecutionLevel="highestAvailable" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.D、Add the requestedExecutionLevel="requiresAdministrator" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.

考题 You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). You need to monitor the performance of the VPN server for one day. What should you do? ()A、From the Performance console, create a trace log.B、From the Performance console, create a counter log.C、Install Network Monitor Tools. From Network Monitor create a new capture.D、Install Network Monitor Tools. From Network Monitor create a new parser file.

考题 You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The Hyper-V server role is installed on a server named ABC_SR07.ABC_SR07 has a legacy network card that you use when creating a virtual machine named ABC_VT01.  What is the first thing you should do when assigning bandwidth to ABC_VT01?()A、You need to install a Hyper-V Virtual Switch on ABC_SR07.B、You need to install Integration Services on ABC_VT01.C、You need to remove the legacy network card and replace it with a new one.D、You need to install a second legacy network card on ABC_SR07.E、You need to create an external virtual network.

考题 Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()A、Join the new server to an Active Directory domain.B、Install Active? Directory Lightweight Directory Services on the new server.C、Run ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.D、Open TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.

考题 You use Microsoft .NET Framework 4 to create a Windows application. You use ClickOnce technology to install the application on computers that run Windows 7 with User Access Control (UAC) enabled. The application requires access to environment variables on each computer. You need to ensure that users who do not have administrative permissions can install the application. Which deployment method should you use? ()A、Start from Web.B、Install from Web.C、Start from network shareD、Install from network share.

考题 You want to implement IP address to Computer Name resolving on your Windows 2000 network. How do you configure this in a NETBIOS environment?()A、Install a DHCP ServerB、Install a DNS ServerC、Install a WINS ServerD、Install an LMHOST Converter

考题 单选题Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()A Join the new server to an Active Directory domain.B Install Active? Directory Lightweight Directory Services on the new server.C Run ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.D Open TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.

考题 单选题You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of whichtype of tunnel?()A L2F tunnelB L2TP tunnelC GRE tunnelD ISAKMP tunnel

考题 单选题Your network consists of a single Active Directory forest. You have 50 portable computers and 50 desktopcomputers. All computers have 32-bit hardware. You plan to deploy Windows 7 and 10 corporateapplications to the computers by using a custom image. You need to prepare for the deployment by usingthe minimum amount of administrative effort.  What should you do first?()A On one computer, install Windows 7 and the corporate applications.B On one portable computer and one desktop computer, install Windows 7 and the corporate applications.C On a server, install and run the Microsoft Assessment and Planning (MAP) Toolkit.D On a server, install the Windows Automated Installation Kit (AIK) and run Windows System ImageManager (Windows SIM).

考题 单选题As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()A Enable the highest level of Syslogging available to ensure you log all possible event messagesB Use SSH to access your Syslog informationC Log all messages to the system buffer so that they can be displayed when accessing the routerD Syncronize clocks on the network with a protocol such as Network Time Protocol

考题 多选题As a Network Engineer, you have to master how to deploy Virtual Storage Area Network and what are the results of the deployment. Which two of the following are resulting from its deployment?()Areduced backupBincreased securityCgreater storage demandDimproved availability

考题 多选题You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()ARestart the computer in the docking station.BRun the Add/Remove Hardware wizard.CUse Device Manager to scan for hardware changes.DCopy the network adapter driver to the Winnt/Driver Cache/i386 folder.EInstall the new network adapter driver.

考题 单选题You have a server that runs Windows Server 2008. The server has the Windows Server virtualization role service installed.  You create a new virtual machine and perform an installation of Windows Server 2008 on the virtual machine. You configure the virtual machine to use the physical network card of the host server. You notice that you are unable to access network resources from the virtual machine. You need to ensure that the virtual host can connect to the physical network. What should you do?()A On the host server, install the MS Loopback adapter.B On the host server, enable the Multipath I/O feature.C On the virtual machine, install the MS Loopback adapter.D On the virtual machine, install Windows Server virtualization Guest Integration Components.

考题 单选题You are the network administrator for your company. All client computers run Windows XP Professional. All servers run Windows Server 2003.The company has offices in Los Angeles, San Francisco, and Seattle. Each office is configured as a separate IP subnet. DNS is the only method of name resolution used on the network.You need to implement a software update infrastructure on the network. You install Windows Server Update Services (WSUS) on a computer named Server1 in the Los Angeles office. You install WSUS on Server1 with all default settings. You create a Group Policy object (GPO) named WSUS. You have no plans to install additional WSUS servers.You need to ensure that client computers can successfully connect to the WSUS server.  What should you do?()A Configure the Internet browser home page on all client computers to point to http: //windowsupdate.microsoft.com.B In the WSUS GPO, specify the Server Name property to be the server’s fully qualified domain name (FQDN).C On the WSUS server, configure the IIS Manager to require HTTP over SSL.D Enable communication over port 443 between all client computers and the WSUS server.