网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework

A. application

B. presentation

C. session

D. transport

E. internet

F. data link


参考答案

更多 “ A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework A. applicationB. presentationC. sessionD. transportE. internetF. data link ” 相关考题
考题 In the "host to host" layer of the DOD model, which of the following is a valid connection oriented protocol?() A.ARPB.RARPC.TCPD.UDPE.IPF.ICMPG.BootP

考题 A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A. applicationB. presentationC. sessionD. transportE. internetF. data link

考题 DHCP是下面哪些英语单词的缩写(). A.Dynamic Host Configuration ProtocolB.Dynamic Host Connection ProtocolC.Dynamic Hot Connection ProtocolD.Denial Host Configuration Protocol

考题 In the "host to host" layer of the DOD model, which of the following is a valid connection oriented protocol?()A、ARPB、RARPC、TCPD、UDPE、IPF、ICMPG、BootP

考题 The SCTP layer in the C7 signalling protocol stack is responsible for which of the following:()A、Establishing a signaling channel between two signaling entities in an ATM networkB、Provide reliable connection for signaling between two IP signaling nodesC、Provide routing for IP signaling messages in an IP signaling network

考题 A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A、applicationB、presentationC、sessionD、transportE、internetF、data link

考题 An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configured.D、The PC has connectivity up to Layer 5 of the OSI model.E、The PC has the TCP/IP protocol stack correctly installed.

考题 An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC.If a reply is received, what does this confirm?()A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configuredD、The PC has connectivity up to Layer 5 of the OSI modelE、The PC has the TCP/IP protocol stack correctly installed.

考题 A technician is troubleshooting a host connectivity problem. The host is unable to ping a server connected to Switch_A. Based on the results of the testing, what could be the problem()。A、A remote physical layer problem exists.B、The host NIC is not functioning.C、TCP/IP has not been correctly installed on the host.D、A local physical layer problem exists.

考题 A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A、applicationB、presentationC、sessionD、transportE、internetF、datalink

考题 The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()A、The local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/IP) installed and configured. B、The remote host must support NFS. C、The remote host must have an NFS exported directory defined such that the local host has read and write permissions to the dump file on the remote host. D、The remote host can be the same as the local host.

考题 All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services  (RDS).You are configuring the Remote Desktop Session Host (RD Session Host) role service. You need to ensure that authentication occurs before the Remote Desktop Connection logon screen appears. What should you do?()A、In the RD Session Host Configuration tool, select the Allow connections only from computers running Remote Desktop with Network Level Authentication option.B、In the RD Session Host Configuration tool, select the Allow connections from computers running any version of Remote Desktop option.C、In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use smart card.D、In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use locally logged-on credentials.

考题 All servers on your companys network run Windows Server 2008 R2. You deploy Remote Desktop Services (RDS). The company has a load-balanced Remote Desktop Connection Broker (RD Connection Broker) cluster. You are adding a Remote Desktop Session Host (RD Session Host) server to the cluster. You need to ensure that the RD Session Host server will receive only half of the RDS sessions. What should you do?()A、Enable IP redirection on the RD Session Host server.B、Enable token redirection on the RD Session Host server.C、Configure the server weight for the RD Session Host server.D、Configure the DNS weight priority for the RD Session Host server.

考题 You have a server that runs Windows Server 2008 You need to configure the server as a VPN server. What should you install on the server()A、Windows Deployment Services role and Deployment Server role serviceB、Windows Deployment Services role and Deployment transport role serviceC、Network Policy and Access services role and routing and remote access services role serviceD、Network Policy and access services and host credential authorization protocol role service

考题 单选题All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services  (RDS).You are configuring the Remote Desktop Session Host (RD Session Host) role service. You need to ensure that authentication occurs before the Remote Desktop Connection logon screen appears. What should you do?()A In the RD Session Host Configuration tool, select the Allow connections only from computers running Remote Desktop with Network Level Authentication option.B In the RD Session Host Configuration tool, select the Allow connections from computers running any version of Remote Desktop option.C In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use smart card.D In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use locally logged-on credentials.

考题 单选题The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()A The local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/IP) installed and configured. B The remote host must support NFS. C The remote host must have an NFS exported directory defined such that the local host has read and write permissions to the dump file on the remote host. D The remote host can be the same as the local host.

考题 单选题You create a shared Internet connection on a Windows 2000 Professional computer. Your network has 10 users on the LAN. All of the users can connect to HTTP sites, FTP sites, and streaming audio content on the Internet. One of the computers on your LAN is running an FTP host application. Users on the Internet cannot connect to the FTP host on your network. What should you do?()A Configure the FTP host to accept incoming requests on service port 80.B Configure an Internet Connection Sharing application type for FTP to use remote server port 23.C Configure an Internet Connection Sharing service type for FTP use service port 21 on the FTP host computer.D Configure an Internet Connection Sharing service type for FTP use service port 23 on the FTP host computer.

考题 单选题A technician is troubleshooting a host connectivity problem. The host is unable to ping a server connected to Switch_A. Based on the results of the testing, what could be the problem()。A A remote physical layer problem exists.B The host NIC is not functioning.C TCP/IP has not been correctly installed on the host.D A local physical layer problem exists.

考题 单选题You are an enterprise administrator for Cer-tech .com. All the servers on the network run Windows Server2008. The network consists of a Server that has the Windows Server virtualization role service installed.You create a new virtual machine, installed Windows Server 2008 on it, and configure it to use the physicalnetwork card of the host server. After this installation and configuration the virtual machine, you wereunable to access network resources from the virtual machine. Which of the following options would youchoose to ensure that the virtual host can connect to the physical network?()A Install the MS Loopback adapter on the virtual machine.B Enable the Multipath I/O feature on the host server.C Install Windows Server virtualization Guest Integration Components on the virtual machine.D Install the MS Loopback adapter on the host server.E None of the above

考题 单选题You install Windows 2000 Professional on your portable computer. You create a new dial up connection to connect to your company’s remote access server. You connect to the remote access server by using the dial up connection. You can connect to the servers on the same segment as the remote access server. You cannot access the shared resources that are on the remote segments from the remote access server. What should you do? ()A Configure the company remote access server to accept multilink connections.B Configure the TCP/IP program for the dial up connection to disable IP header compression.C Configure the TCP/IP properties for the dial up connection to use the default gateway on theremote network.D Grant your user account dial in permission on the company remote access server.

考题 单选题Your company has an Active Directory Domain Services (AD DS) domain. Al l client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that each user is authenticated to the RD Session Host server before a session is created. What should you do?()A Set the security layer op tion to RDP Security Layer.B Set the encryption level option to FIPS Compliant.C Set the log on option to Always prompt for password.D Set the security option to Allow connections only from computers running Remote Desktop with Network Level Authenticat ion.

考题 单选题DHCP是下面哪些英语单词的缩写().A Dynamic Host Configuration ProtocolB Dynamic Host Connection ProtocolC Dynamic Hot Connection ProtocolD Denial Host Configuration Protocol

考题 单选题An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。A The PC has connectivity with a local host.B The PC has connectivity with a Layer 3 device.C The PC has a default gateway correctly configured.D The PC has connectivity up to Layer 5 of the OSI model.E The PC has the TCP/IP protocol stack correctly installed.

考题 单选题A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A applicationB presentationC sessionD transportE internetF data link

考题 单选题A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A applicationB presentationC sessionD transportE internetF datalink

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. Another system administrator, Tess King, needs your help in configuring the volume shadow copy settings on a member server. Tess is logged on to the server console. The settings are configured to allow the proper use of all available remote tools. You need to provide remote help to Tess by using a remote administration tool. You also need to ensure that Tess can observe your actions from the console. What should you do?()A Use Remote Desktop in Windows XP Professional to establish a Remote Desktop connection to the member server.B Use Help and Support in Windows XP Professional to offer Remote Assistance to the member server.C Use Computer Management to connect remotely to the member server.D Use the Remote Registry tool to connect to the server.

考题 单选题In the "host to host" layer of the DOD model, which of the following is a valid connection oriented protocol?()A ARPB RARPC TCPD UDPE IPF ICMPG BootP