网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Your network uses the172.12.0.0 class B address. You need to support 459 hosts per subnet, while accommodating the maximum number of subnets. Which mask wouldyou use?()
A

255.255.0.0.

B

255.255.128.0.

C

255.255.224.0.

D

255.255.254.0.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Your network uses the172.12.0.0 class B address. You need to support 459 hosts per subnet, while accommodating the maximum number of subnets. Which mask wouldyou use?()A 255.255.0.0.B 255.255.128.0.C 255.255.224.0.D 255.255.254.0.” 相关考题
考题 Part A51. Directions:You are preparing to ask for some help from your teacher, write a letter that:1) detail what you want him or she does for you,2) express your thanks to your teacher,You should write about i00 words on ANSWER SHEET II. Do not sign your own name at the end of the letter. You do not need to write the address.

考题 Part A51. Directions:You are a senior of computer science. You'd like to be an intern for an IT company. Write a letter to present your willings including:1) your education background;2) your purpose of being an intern.You should write about 100 words on ANSWER SHEET Ⅱ. Do not sign your own name at the letter. You do not need to write the address.

考题 Your network uses the172.12.0.0 class B address. You need to support 459 hosts per subnet, while accommodating the maximum number of subnets. Which mask would you use?A.255.255.0.0.B.255.255.128.0.C.255.255.224.0.D.255.255.254.0.E.None of the above

考题 Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()A.AB.BC.CD.D

考题 Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E

考题 You connect your computer to a wireless network. You discover that this new connection fails to show in the Connect to a network window.You need to view this connection in the Connect to a network window.What should you do?()A.AB.BC.CD.D

考题 Directions:Suppose your class is to holda charity sale for kids in need of help.Write your classmates an email to inform them about the details,and encourage them to participate.You should write about 100 words on the ANSWER SHEET.Do not use your own name;use"Li Ming”instead.Do not write your address.

考题 You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

考题 You develop a service application that needs to be deployed. Your network administrator creates a specific user account for your service application.You need to configure your service application to run in the context of this specific user account. What should you do?()A、Prior to installation,set the StartType property of the ServiceInstaller class.B、Prior to installation,set the Account,Username,and Password properties of theServiceProcessInstaller class.C、Use the CONFIG option of the net.exe command-line tool to install the service.D、Use the installutil.exe command-line tool to install the service.

考题 Your network contains an Active Directory forest. The functional level of the forest is Windows Server 2008 R2.You plan to deploy DirectAccess.You need to configure the DNS servers on your network to support DirectAccess.What should you do?()A、Modify the GlobalQueryBlockList registry key and restart the DNS Server service.B、Modify the EnableGlobalNamesSupport registry key and restart the DNS Server service.C、Create a trust anchor that uses a certificate issued by an internal certification authority (CA).D、Create a trust anchor that uses a certificate issued by a publicly trusted certification authority (CA).

考题 Your network uses the172.12.0.0 class B address. You need to support 459 hosts per subnet, while accommodating the maximum number of subnets. Which mask wouldyou use?()A、255.255.0.0.B、255.255.128.0.C、255.255.224.0.D、255.255.254.0.

考题 Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use NetBIOS names to connect to all shared resources as the network. You configure a TCP/IP address and a subnet mask on each new computer. Which 2 additional TCP/IP properties should you configure on each new computer?()A、The bindings.B、A DNS address.C、A Gateway address.D、A WINS server address.E、A DHCP server address.

考题 You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.

考题 You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()A、Configure a HOSTS file.B、Configure a LMHOSTS file.C、Configure a WINS server database.D、Configure a DHCP server address.E、Configure at least one DNS address.

考题 You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A、The method must return a type of either IEnumerator or IEnumerable.B、The method must return a type of IComparable.C、The method must explicitly contain a collection.D、The method must be the only iterator in the class.

考题 Your computer uses both wired and wireless network connections. The networks are not connected to each other.  You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder.  You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.  What should you do?()A、Turn off the Windows Firewall feature.B、Disable the Block all incoming connections option.C、Turn off the Spyware and other malware protection option.D、Enable the File and Printer Sharing exception in the firewall settings of the wireless network adapter.

考题 You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()A、Configure the network category of your wireless network connection to Private.B、Configure the network category of your wireless network connection to Public.C、Configure the TCP/IP packet filtering on the wireless network connection.D、Configure the wireless network connection with the appropriate authentication to the router.

考题 You report to the IT department in your company that your computer has a connectivity problem. The department requests that you configure your system with the following value:  2001::f85c:494e:7:4bd4  You need to configure your computer accordingly.  What should you do?()A、Use the given value as an IPv6 address.B、Use the given value as a DNS suffix search item.C、Use the given value as a WEP key for a wireless network.D、Use the given value as a manually assigned MAC address.

考题 单选题Your computer uses both wired and wireless network connections. The networks are not connected to each other.  You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder.  You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.  What should you do?()A Turn off the Windows Firewall feature.B Disable the Block all incoming connections option.C Turn off the Spyware and other malware protection option.D Enable the File and Printer Sharing exception in the firewall settings of the wireless network adapter.

考题 多选题Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use NetBIOS names to connect to all shared resources as the network. You configure a TCP/IP address and a subnet mask on each new computer. Which 2 additional TCP/IP properties should you configure on each new computer?()AThe bindings.BA DNS address.CA Gateway address.DA WINS server address.EA DHCP server address.

考题 单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A STPB GVRPC SNMPD VTPE DHCP

考题 问答题Directions:  Suppose you are Li Ming and your friend Li Hua has just won the first-class science award because of the work in the field of applied chemistry. Write a letter of congratulation to her, and the letter should include the following information:  (1)express your congratulations on the award-winning.  (2)express your opinion that she deserves the award.  (3)express your hope for greater success in her field.  You should write about 100 words. Do not sign your own name at the end of the letter. Use “Li Ming” instead. You do not need write the address.

考题 单选题You report to the IT department in your company that your computer has a connectivity problem. The department requests that you configure your system with the following value:  2001::f85c:494e:7:4bd4  You need to configure your computer accordingly.  What should you do?()A Use the given value as an IPv6 address.B Use the given value as a DNS suffix search item.C Use the given value as a WEP key for a wireless network.D Use the given value as a manually assigned MAC address.

考题 多选题You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a HOSTS file.BConfigure a LMHOSTS file.CConfigure a WINS server database.DConfigure a DHCP server address.EConfigure at least one DNS address.

考题 单选题Your network contains an Active Directory forest. The functional level of the forest is Windows Server 2008 R2.You plan to deploy DirectAccess.You need to configure the DNS servers on your network to support DirectAccess.What should you do?()A Modify the GlobalQueryBlockList registry key and restart the DNS Server service.B Modify the EnableGlobalNamesSupport registry key and restart the DNS Server service.C Create a trust anchor that uses a certificate issued by an internal certification authority (CA).D Create a trust anchor that uses a certificate issued by a publicly trusted certification authority (CA).

考题 单选题You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A The method must return a type of either IEnumerator or IEnumerable.B The method must return a type of IComparable.C The method must explicitly contain a collection.D The method must be the only iterator in the class.

考题 单选题You develop a service application that needs to be deployed. Your network administrator creates a specific user account for your service application.You need to configure your service application to run in the context of this specific user account. What should you do?()A Prior to installation,set the StartType property of the ServiceInstaller class.B Prior to installation,set the Account,Username,and Password properties of theServiceProcessInstaller class.C Use the CONFIG option of the net.exe command-line tool to install the service.D Use the installutil.exe command-line tool to install the service.