网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are using VTP version 2 in your network to transport VLAN information between switches. When adding a switch to the network that has been used in the lab previously, you notice that a lot of the existingVLANs have been deleted or replaced with other names. What can you do to prevent this from happeningin the future, without losing all VTP features that you are using today?()
A

configure a hard-to-guess VTP domain name

B

use a hard-to-guess VTP password

C

use VTP transparent mode

D

implement VTP version 3


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are using VTP version 2 in your network to transport VLAN information between switches. When adding a switch to the network that has been used in the lab previously, you notice that a lot of the existingVLANs have been deleted or replaced with other names. What can you do to prevent this from happeningin the future, without losing all VTP features that you are using today?()A configure a hard-to-guess VTP domain nameB use a hard-to-guess VTP passwordC use VTP transparent modeD implement VTP version 3” 相关考题
考题 Which method should be used to dynamically elect an RP when your network is using PIM version1?() A. auto-RPB. static RPC. discovery modeD. bootstrap protocol

考题 You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D

考题 You are the network administrator for All network servers run Windows Server 2003.A file server named TestKingSrvA has shadow copies enabled. One shared folder on TestKingSrvA has the configuration shown in the following table.While viewing a previous version of TestKingDocs, you open and edit Financials.xls.However, when you try to save the edited file, you receive the following error message:You need to save your changes to the previous version of Financials.xls. You must ensure that other users can continue to access current data on TestKingSrvA without interruption.What should you do?()A. Copy the previous version of TestKingDocs to a separate location.B. Restore the previous version of TestKingDocs to the default location.C. Save Financials.xls in a separate location by using Microsoft Excel.D. In the security properties of Financials.xls, assign the Allow - Modify permissions to the Everyone group.

考题 You are a network administrator and you need to implement a routing protocol onyour network that provides:* Scalability* VLSM support* Minimal overhead* Support for connecting networks using routers of multiple vendorsWhich of the following routing protocol would best serve your needs?()A. VTPB. RIP version 1C. EIGRPD. OSPFE. IGRPF. CDP

考题 You are a network administrator and you need to implement a routing protocol on your network that provides: * Scalability * VLSM support * Minimal overhead * Support for connecting networks using routers of multiple vendors Which of the following routing protocol would best serve your needs?()A、VTPB、RIP version 1C、EIGRPD、OSPFE、IGRPF、CDP

考题 You want to configure switch R1 to propagate VLAN information across the Company network  using VTP. What must be configured on a Cisco switch in order to advertise VLAN information?()A、VTP modeB、VTP passwordC、VTP revision numberD、VTP pruningE、VTP domain nameF、None of the other alternatives apply

考题 Your company has two data centers.  Each data center contains a perimeter network.  Your network contains an Exchange Server 2010 organization.  You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks.  You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers  .Ensure that users receive inbound e-mail messages if an Edge Transport server fails  .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable .Minimize costs  What should you recommend?()A、In each perimeter network, deploy one Edge Transport server. Implement failover clustering.B、In each perimeter network, deploy two Edge Transport servers. Implement failover clustering.C、In each perimeter network, deploy one Edge Transport server. Configure a mail exchange (MX) record for each server.D、In each perimeter network, deploy two Edge Transport servers. Configure a mail exchange (MX) record for each server.

考题 You are a senior network administrator at TestKing and your trusty junior administrator tells you that he failed his task of adding VLAN 50 to a Catalyst switch in the network. You enter in the 'show vtp status' command and get this output: TK2# show vtp status VTP Version :2 Configuration Revision :7 Maximum VLANs supported local :68 Number of existing VLANs :8 VTP Operating Mode :Client VTP Domain Name :corp VTP Pruning Mode :Disabled VTP V2 Mode :Disabled VTP Traps Generation :Disabled MD5 digest :0x22 0xF3 0x1A Configuration last modified by 172.18.22.15 at 5-28-03 1t:53:20 What commands must be issued on this switch to add VLAN 50 to the database?()A、TK2(config-if)# switchport access vlan 50B、TK2(vlan)# vtp serverC、TK2(config)# config-revision 20D、TK2(config)# vlan 50 name TechE、TK2(vlan)# vlan 50F、TK2(vlan)# switchport trunk vlan 50

考题 The Company switches have all been upgraded to use VTP version 2. What are two benefits  provided in VTP Version 2 that are not available in VTP Version 1?()A、VTP version 2 supports Token Ring VLANsB、VTP version 2 allows VLAN consistency checksC、VTP version 2 allows active redundant links when used with spanning treeD、VTP version 2 reduces the amount of configuration necessaryE、VTP version 2 saves VLAN configuration memory

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network for TestKing.com The organization contains three Exchange Server 2010 Edge Transport Servers and seven ExchangeServer 2010 Hub Transport servers. The Edge Transport server is used to transfer e-mail from your organization to the Internet. During the course of day you receive an instruction form the CIO to ensure that all clients is able to send encrypted messages to other organizations over the Internet as well asensuring that communications between the Hub Transport servers and the Edge Transport servers isencrypted. What should you do?()A、Your best option would be to deploy SMTP over SSL.B、Your best option would be to implement Security/Multipurpose Internet Mail Extensions (S/MINE).C、Your best option would be to deploy IPsec.D、Your best option would be to implement Domain Securtiy.

考题 Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS).   The Network Policy Server has a certificate installed.   Client computers are unable to connect to the wireless access points.    You need to enable client computers to connect to the wireless network.   What should you do?()A、Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).B、Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).C、Install a certificate in the Trusted Root Certification Authorities certificate store.D、Install a certificate in the Third-Party Root Certification Authorities certificate store.

考题 Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

考题 Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync synchronization.B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync synchronization.C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the perimeter network.D、Deploy two Hub Transport servers on the internal network.

考题 Your company has an Exchange 2010 organization that contains multiple Hub Transport servers. You have a line-of-business application that relays e-mail messages by using a Hub Transport servernamed Hub1.  The application only supports sending e-mail to a single SMTP server.  You need to ensure that the application can relay e-mail messages if Hub1 fails.  What should you do?()A、Implement log truncationB、Install and configure failover clustering on the Hub Transport servers.C、Implement Windows network load balancing on the Hub Transport servers.D、Create multiple MX records for the Hub Transport servers in the internal DNS zone.

考题 Your network contains a single Active Directory site.   You plan to deploy 1,000 new computers that will run Windows 7 Enterprise. The new computers have Pre-boot Execution Environment (PXE) network adapters.   You need to plan the deployment of the new computers to meet the following requirements:  èSupport 50 simultaneous installations of Windows 7   èMinimize the impact of network operations during the deployment of the new computers   èMinimize the amount of time required to install Windows 7 on the new computers What should you include in your plan?()A、Deploy the Windows Deployment Services (WDS) server role. Configure the IP Helper tables on all  routers.  B、Deploy the Windows Deployment Services (WDS) server role. Configure each WDS server by using native mode.  C、Deploy the Windows Deployment Services (WDS) server role and the Transport Server feature.Configure the Transport Server to use a custom network profile.  D、Deploy the Windows Deployment Services (WDS) server role and the Transport Server feature. Configure the Transport Server to use a static multicast address range.

考题 You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A、Use Windows Explorer to receive the offline filesB、Using the Windows Explorer, disable the cache for the reports on the network shareC、Use the Windows NT explorer to grant the special access for the reports on the network  shareD、Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 单选题Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()A Implement Network Policy and Access Services (NPAS).B Implement Active Directory Federation Services (AD FS).C Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.D Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

考题 多选题The Company switches have all been upgraded to use VTP version 2. What are two benefits  provided in VTP Version 2 that are not available in VTP Version 1?()AVTP version 2 supports Token Ring VLANsBVTP version 2 allows VLAN consistency checksCVTP version 2 allows active redundant links when used with spanning treeDVTP version 2 reduces the amount of configuration necessaryEVTP version 2 saves VLAN configuration memory

考题 单选题You are able to access a Web server from your computer by using the IP address of the Web server. You fail to access the Web server when you use its fully qualified domain name. Other users on your network can access the Web server by using both the IP address and the fully  qualified domain name. You need to access the Web server by using the fully qualified domain name.  What should you do? ()A Use the Diagnose and repair feature in the Network and Sharing Center.B At the command prompt, type ipconfig /allcompartments.C Disable the NetBIOS feature on your network adapter.D Configure the correct default gateway on the Alternate Configuration tab of your network connection properties dialog box.

考题 单选题Your company has two data centers.  Each data center contains a perimeter network.  Your network contains an Exchange Server 2010 organization.  You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks.  You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers  .Ensure that users receive inbound e-mail messages if an Edge Transport server fails  .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable.Minimize costs  What should you recommend?()A In each perimeter network, deploy one Edge Transport server. Implement failover clustering.B In each perimeter network, deploy two Edge Transport servers. Implement failover clustering.C In each perimeter network, deploy one Edge Transport server. Configure a mail exchange (MX) record for each server.D In each perimeter network, deploy two Edge Transport servers. Configure a mail exchange (MX) record for each server.

考题 单选题Which method should be used to dynamically elect an RP when your network is using PIM version1?()A auto-RPB static RPC discovery modeD bootstrap protocol

考题 单选题You are a network administrator and you need to implement a routing protocol on your network that provides: * Scalability * VLSM support * Minimal overhead * Support for connecting networks using routers of multiple vendors Which of the following routing protocol would best serve your needs?()A VTPB RIP version 1C EIGRPD OSPFE IGRPF CDP

考题 单选题You have a computer that runs Windows 7. You connect to your company s network by using a VPNconnection. You discover that when you establish the VPN connection, you are unable to access InternetWeb sites. When you disconnect the VPN connection, you can access Internet Web sites. You need toaccess Internet Web sites while you are connected to the VPN.  What should you do?()A Configure the VPN connection to use only PPTP.B Configure the VPN connection to use only L2TP/IPSec.C From the Internet Protocol Version 4 (TCP/IPv4) properties of the local area connection, disable theAutomatic metric setting.D From the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection, disable the Usedefault gateway on remote network setting.

考题 单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()A Configure the network category of your wireless network connection to Private.B Configure the network category of your wireless network connection to Public.C Configure the TCP/IP packet filtering on the wireless network connection.D Configure the wireless network connection with the appropriate authentication to the router.

考题 单选题Your company’s network has client computers that run Windows 7.   A software vendor releases version 2 of an application that your company uses.  Your company currently uses version 1.  Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application.   You have the following requirements:Users must be able to run both versions of the application on their computers.   Version 2 must be available when a client computer is not connected to the network.  You need to plan a software deployment process that meets the requirements.   What should you do?()A  Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B  Deploy version 2 of the application as a Remote Desktop Services RemoteApp.C  Deploy version 2 of the application by using a Group Policy Software Installation policy.D  Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.