网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Your network contains two Web servers named Web1 and Web2. Web1 hosts the companys corporate Web site. Web2 is a test server that contains a copy of the Web site.Users connect to Web1 by using the URL http://www.contoso.com.A Web developer named User1 plans to test updates to the Web site on Web2.You need to ensure that User1 connects to Web2 by using the URL http://www.contoso.com. The solution must ensure that all other computers connect to Web1.What should you do?()

  • A、From User1s computer, create a record in the Hosts file.
  • B、From User1s computer, create a record in the Lmhosts file.
  • C、From a DNS server, create a new Host (A) resource record.
  • D、From a DNS server, create a new Alias (CNAME) resource record.

参考答案

更多 “Your network contains two Web servers named Web1 and Web2. Web1 hosts the companys corporate Web site. Web2 is a test server that contains a copy of the Web site.Users connect to Web1 by using the URL http://www.contoso.com.A Web developer named User1 plans to test updates to the Web site on Web2.You need to ensure that User1 connects to Web2 by using the URL http://www.contoso.com. The solution must ensure that all other computers connect to Web1.What should you do?()A、From User1s computer, create a record in the Hosts file.B、From User1s computer, create a record in the Lmhosts file.C、From a DNS server, create a new Host (A) resource record.D、From a DNS server, create a new Alias (CNAME) resource record.” 相关考题
考题 You create a Web Form that contains connected Web Parts. You write the following declaration in your Web Form.You need to ensure that your Web Part connection is valid. Which two actions should you perform? ()A. Include a data source identified as WebPartConnection1 on the Web Form.B. Include a Web Part identified as customerPart on the Web Form.C. Include a Web Part identified as ordersPart on the Web Form.D. Ensure that you declare an interface named IOrdersPart.E. Ensure that you declare an interface named ICustomerPart.F. Ensure that each Web Part declares either a GetInterface or ProvideInterface method.

考题 Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E

考题 Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A. core layerB. bridging two VLANs on one switchC. between two Layer 2 devices withtrunkingD. between two Layer 2 devices withouttrunking

考题 Your company has two data centers.  Each data center contains a perimeter network.  Your network contains an Exchange Server 2010 organization.  You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks.  You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers  .Ensure that users receive inbound e-mail messages if an Edge Transport server fails  .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable .Minimize costs  What should you recommend?()A、In each perimeter network, deploy one Edge Transport server. Implement failover clustering.B、In each perimeter network, deploy two Edge Transport servers. Implement failover clustering.C、In each perimeter network, deploy one Edge Transport server. Configure a mail exchange (MX) record for each server.D、In each perimeter network, deploy two Edge Transport servers. Configure a mail exchange (MX) record for each server.

考题 Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、 core layerB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunking

考题 Your network contains a Web-based application that runs on Windows Server 2003. You plan to  migrate the Web-based application to Windows Server 2008 R2. You need to recommend a server  configuration to support the Web-based application. The server configuration must meet the following  requirements:   èEnsure that the application is available to all users if a single server?fails èSupport the installation of .NET applications èMinimize software costs  What should you recommend?() A、Install the Server Core installation of Windows Server 2008 R2 Standard on two servers. Configure the servers in a Network Load Balancing cluster.B、Install the full installation of Windows Server 2008 R2 Web on two servers. Configure the servers in a Network Load Balancing cluster.C、Install the full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.D、Install the full installation of Windows Server 2008 R2 Datacenter on two servers. Configure the servers in a failover cluster.

考题 Your network contains an Active Directory domain that has two sites.    You need to identify whether logon scripts are replicated to all domain controllers.   Which folder should you verify()A、GroupPolicyB、NTDSC、SoftwareDistributionD、SYSVOL

考题 You create a Web Form that contains connected Web Parts. You write the following declaration in your Web Form. You need to ensure that your Web Part connection is valid. Which two actions should you perform? ()A、Include a data source identified as "WebPartConnection1" on the Web Form.B、Include a Web Part identified as "customerPart" on the Web Form.C、Include a Web Part identified as "ordersPart" on the Web Form.D、Ensure that you declare an interface named "IOrdersPart".E、Ensure that you declare an interface named "ICustomerPart".F、Ensure that each Web Part declares either a GetInterface or ProvideInterface method.

考题 Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync synchronization.B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync synchronization.C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the perimeter network.D、Deploy two Hub Transport servers on the internal network.

考题 Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

考题 Your network consists of a single Active Directory domain. The network contains five Windows Server 2008 R2 servers that host Web applications. You need to plan a remote management strategy to manage the Web servers.  Your plan must meet the following requirements: èAllow Web developers to configure features on the Web sites   èPrevent Web developers from having full administrative rights on the Web servers What should you include in your plan?()A、Configure request filtering on each Web server.B、Configure authorization rules for Web developers on each Web server.C、Configure the security settings in Internet Explorer for all Web developers by using a Group Policy.D、Add the Web developers to the Account Operators group in the domain.

考题 Your network contains a server named Server1 that has the Routing role service installed. Server1 has two network connections. One network connection connects to the internal network. The other network connection connects to the Internet.All network connections connected to the internal network use private IP addresses. You install a Web server named Web1. Web1 hosts a secured Web site that only allows connections over TCP port 8281. Web1 is connected to the internal network.You need to ensure that the secure Web site can be accessed from the Internet.What should you do from the Routing and Remote Access console?()A、Configure Routing Information Protocol (RIP), and then activate authentication on the RIP interface.B、Configure Routing Information Protocol (RIP), and then configure the incoming packet protocol settings on the RIP interface.C、Configure Network Address Translation (NAT), and then add a new service to the NAT interface.D、Configure Network Address Translation (NAT), and then enable the Secure Web Server (HTTPS) service on the NAT interface.

考题 Your network contains two servers that run the Server Core installation of Windows Server 2008 R2.  The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site.  Administrators use client computers that run Windows 7.   You need to recommend a strategy that allows the administrators to remotely manage the Network Load  Balancing cluster. Your strategy must support automation.  What should you recommend?()A、On the servers, enable Windows Remote Management (WinRM).B、On the servers, add the administrators to the Remote Desktop Users group.C、On the Windows 7 client computers,enable Windows Remote Management (WinRM).D、On the Windows 7 client computers,add the administrators to the Remote Desktop Users group.

考题 Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()A、Port mirroringB、DHCP guardC、Router guardD、MAC address

考题 单选题Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files.    You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity   èMinimizes the amount of time to restore the server What should you include in your plan?()A Windows Deployment Services (WDS)B Windows Automated Installation Kit (Windows AIK) and folder redirectionC the Multipath I/O feature and Volume Shadow CopiesD the Windows Server Backup feature and System Image Recovery

考题 多选题Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()ALog on to one of the cluster nodes and run the wlbs disable all command.BOpen the Network Load Balancing Clusters console and delete the default port rules.COpen the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.DOpen the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

考题 单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   You plan to publish a Web site on two Web servers.   You need to deploy an availability solution for your Web servers that meets the following requirements: èSupports the addition of more Web servers without interrupting client connections  èEnsures that the Web site is accessible even if a single server fails What should you do?()A Configure a failover cluster.B Configure a Web garden on each Web server.C Create a Network Load Balancing cluster.D Create two application pools on each Web server.

考题 单选题You are able to access a Web server from your computer by using the IP address of the Web server. You fail to access the Web server when you use its fully qualified domain name. Other users on your network can access the Web server by using both the IP address and the fully  qualified domain name. You need to access the Web server by using the fully qualified domain name.  What should you do? ()A Use the Diagnose and repair feature in the Network and Sharing Center.B At the command prompt, type ipconfig /allcompartments.C Disable the NetBIOS feature on your network adapter.D Configure the correct default gateway on the Alternate Configuration tab of your network connection properties dialog box.

考题 单选题You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()A Create a Network Load Balancing cluster that contains the Outlook Web Access serversB Create a Microsoft Cluster Server cluster that contains the Outlook Web Access serversC Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailboxD Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers

考题 单选题Your network contains a DNS server named DNS1 that runs Windows Server 2008 R2. DNS1 hosts a zone named contoso.com.Dynamic updates are enabled on the zone.The network contains a server named Web1.contoso.com.All computers on the network are configured to use DNS1 as their DNS server.You need to ensure that users can connect to Web1.contoso.com by using the name portal.contoso.com.The solution must ensure that the users can connect by using portal. contoso.com if the IP address of Web1.contoso.com changes.Which type of resource record should you create?()A Alias (CNAME)B Host (A)C Host Information (HINFO)D Pointer (PTR)

考题 多选题Your network contains an Active Directory domain named contoso.com. Contoso.com contains  three servers.The servers are configure as shown in the following table.     Server name   Server roel Service   Server1                          Certification authority (CA)   Server2                         Certificate Enrollment Web Service  Server3                          Certificate Enrollment Policy Web Service   You need to ensure that users can manually enroll and renew their certificates by using the  Certificate Enrollment Web Service.     Which two actions should you perform()AConfigure the policy module setting.BConfigure the issuance requeriments for the certificate templates.CConfigure the Certificate Services Client - Certificate Enrollment Policy Group Policy setting.DConfigure the delegation setting for the Certification Enrollment Web Service application pool account.

考题 多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()Acore layerBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunking

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.  You need to collect information about which users are connecting to the Web site by using HTTPS.   What should you do?()A Check the application log on the Web server.B Use Network Monitor to capture network traffic on the Web server.C Review the log files created by IIS on the Web server.D Configure a performance log to capture all Web service counters. Review the performance log data.

考题 多选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet.   What are two possible ways to achieve this goal?()AMonitor the events in the application log on Server1.BMonitor the events in the security log on Server1.CMonitor the Web server connections on Server1 by using a performance log.DMonitor network traffic to Server1 by using Network Monitor.EMonitor the IIS logs on Server1.