网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53. You need to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()
A

/61

B

/62

C

/63

D

/64


参考答案

参考解析
解析: 暂无解析
更多 “单选题Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53. You need to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A /61B /62C /63D /64” 相关考题
考题 Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets.Which network mask should you use?()A. /61B. /62C. /63D. /64

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?() A.Virtual GatewayB.Real-IP GatewayC.NAT GatewayD.IP-IP Gateway

考题 One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()A、Virtual GatewayB、Real-IP GatewayC、NAT GatewayD、IP-IP Gateway

考题 Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A、Configure all access points to use 802.1x authentication.B、Configure all protable computers to use MS-CHAP v2 authentication.C、Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.D、Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.

考题 You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

考题 Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP)  deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht  use a wireless connection to access the network. What should you do?()A、 Configure all access points to use 802.1X authenticationB、 Configure all protable computers to use MS-CHAP v2 authenticationC、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.

考题 Your company is designing its public network. The network will use an IPv4 range of 131.107.40.0/22.The network must be configured as shown in the following exhibit.You need to configure subnets for each segment. Which network addresses should you assign?()A、Segment A: 131.107.40.0/23 Segment B: 131.107.42.0/24 Segment C: 131.107.43.0/25 Segment D: 131.107.43.128/27B、Segment A: 131.107.40.0/25 Segment B: 131.107.40.128/26 Segment C: 131.107.43.192/27 Segment D: 131.107.43.224/30C、Segment A: 131.107.40.0/23 Segment B: 131.107.41.0/24Segment C: 131.107.41.128/25 Segment D: 131.107.43.0/27D、Segment A: 131.107.40.128/23 Segment B: 131.107.43.0/24Segment C: 131.107.44.0/25 Segment D: 131.107.44.128/27

考题 You are the administrator of your company’s network. You run the English (US) edition of Windows 2000 Professional on all computers in your network. As your company continues to grow, and the number of computers is continually expanding, you decide that another domain is needed. Management asks you about what is required to accommodate this new domain. What should you answer the Management in this regard? ()A、WINS, DHCP and DNSB、At least one domain controller and one DNS server.C、At least one domain controller, Active Directory and DNS server.D、Nothing more is needed.E、Nothing more is needed, we can just subnet the network.

考题 You are the administrator of your company's network. You are preparing to deploy 20 new Windows 2000 Professional computers on your network. You want to be able to recover from disk failures and corrupt system files on the new computers. You want to configure the computers to automatically update their system configuration and emergency repair files on a scheduled bases.   What should you do?()A、Use the at command to schedule a weekly job to back up the boot partition.B、Use the at command to schedule a weekly job to run the system file checker.C、Use Windows backup to schedule a backup of the System State Data.D、Use Windows backup to schedule a backup of the system partition and the boot partition.

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()A、WLAN AutoConfigB、WWAN AutoConfigC、Computer BrowserD、Portable Device Enumerator Service

考题 You are designing a DNS implementation strategy for the network.  Which two zone types should you use?()A、Reverse lookup zonesB、Standard primary zonesC、Standard secondary zonesD、Active Directory-integrated zones

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and each one has a locally attached tape device. You need to back up each domain controller. Your backup process must fulfill the following requirements: System recovery must be possible in the event of server failure. The system configuration and all current dynamic disk configurations must be backed up. Other data partitions do not need to be backed up. What should you do?()A、Use the Backup utility to back up the system files and to create an Automated System Recovery (ASR) disk.B、Use the Backup utility to back up the contents of all mounted drives.C、Use the Backup utility to back up only the System State data.D、Use the Copy command to copy C:/windows and its subfolders to a shared folder on the network.E、Use the Xcopy command to copy C:/windows and its subfolders to a shared folder on the network.

考题 You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.   What must you do so that you can access the Internet?()A、Configure the ISDN connection to use SLIP instead of PPP.B、Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.C、Clear the Use default gateway on remote network check box.D、Install and configure the SAP Agent service.

考题 Network topology exhibit: You are the administrator at ExamSheet.net.  You use TCP/IP as the only protocol on your network. The network is configured as in the network topology exhibit. All existing computers and devices use 255.255.240.0 as the subnet mask. You install Windows 2000 Professional on a computer named ExamSheet2. You configure ExamSheet2 to have a TCP/IP address of 10.10.20.234, a default gateway of 10.10.20.1, a subnet mask of 255.255.0.0 and a WINS server address of 10.10.13.10. You cannot connect to  shared resources on ExamSheetB by using its UNC name. You want ExamSheet2 to be able to connect to ExamSheetB. What should you do? ()A、Install a WINS server on the same segment as Company2B、Install and configure a DNS server and configure Company2 to use the DNS Server service.C、Configure Company2 with a default gateway address 10.10.13.1.D、Configure Company2 with a default gateway address of 10.10.30.1.E、Configure Company2 with a TCP/IP address of 10.10.20.234.

考题 You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box. 

考题 You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.

考题 You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A、Use Windows Explorer to receive the offline filesB、Using the Windows Explorer, disable the cache for the reports on the network shareC、Use the Windows NT explorer to grant the special access for the reports on the network  shareD、Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 单选题Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()A Configure the NWLink frame type of the network adapters to be ethernet 802.3.B Configure the NWLink frame type of the network adapters to be ethernet II.C Replace the network adapters with 10/100 BNC adapters.D Replace the network adapters with 10/100 UTP network adapters.

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()A Set the driver signing option to block.B Set the driver signing option to ignore.C In the computer’s BIOS, reserve an unused IRQ for ISA devices.D In the Device Manager, configure the second ISA network adapter to use an unused IRQ.

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB detailed security device specificationsC results from pilot network testingD results from a network audit

考题 单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()A Configure the wireless network to use WPA2, PEAP and MSCHAP v2.B Configure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.C Configure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.D Configure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.

考题 单选题Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP)  deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht  use a wireless connection to access the network. What should you do?()A  Configure all access points to use 802.1X authenticationB  Configure all protable computers to use MS-CHAP v2 authenticationC  Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D  Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.

考题 单选题Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A /61B /62C /63D /64

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A a list of applications currently in use in the networkB IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsC detailed security device specificationsD results from pilot network testing

考题 单选题One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()A  Virtual GatewayB  Real-IP GatewayC  NAT GatewayD  IP-IP Gateway

考题 多选题You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a HOSTS file.BConfigure a LMHOSTS file.CConfigure a WINS server database.DConfigure a DHCP server address.EConfigure at least one DNS address.