网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)

A. no single point of failure

B. determine which protocol to use

C. trading database server location

D. deterministic response to all failures


参考答案

更多 “You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)A. no single point of failureB. determine which protocol to useC. trading database server locationD. deterministic response to all failures” 相关考题
考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center

考题 Your customer wants to build a network for a financial trading floor that has a requirement for multiple high-value transactions, which are also vital to the customer. What are the two most critical requirements? ()(Choose two.)A. no single point of failureB. trading database server locationC. redundant application servers locationD. deterministic response to all failuresE. determine which protocol to use

考题 You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

考题 You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()A、 Only use fiber in pairs.B、 Configure root guard on your switches.C、 Do not use fiber but use copper.D、 Configure UDLD to prevent one-way link conditions.

考题 Your customer wants to build a network for a financial trading floor that has a requirement for multiple high-value transactions, which are also vital to the customer. What are the two most critical requirements? ()(Choose two.)A、no single point of failureB、trading database server locationC、redundant application servers locationD、deterministic response to all failuresE、determine which protocol to use

考题 You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet.  You have enabled Internet connection sharing. You do not want to initiate this connection automatically when a request for Internet reaches your computer. What should you do? ()A、You should uncheck “Enable on demand dialingB、Enable on-demand dialingC、Enable sharing a modem on one computer on the networkD、Configure a DHCP ServerE、Disable Internet Connection Sharing

考题 As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()A、GLBPB、RSTPC、BPDU guardD、root guard

考题 You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions. And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)A、no single point of failureB、determine which protocol to useC、trading database server locationD、deterministic response to all failures

考题 You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

考题 As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)A、It provides reliable input for verifying network consistency.B、It requires a network audit to support some upgrade decisions.C、It requires a network audit to support any network restructuring.D、It begins with gathering organizational input that may be inaccurate.

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

考题 You are the administrator of your company’s network. You run the English (US) edition of Windows 2000 Professional on all computers in your network. As your company continues to grow, and the number of computers is continually expanding, you decide that another domain is needed. Management asks you about what is required to accommodate this new domain. What should you answer the Management in this regard? ()A、WINS, DHCP and DNSB、At least one domain controller and one DNS server.C、At least one domain controller, Active Directory and DNS server.D、Nothing more is needed.E、Nothing more is needed, we can just subnet the network.

考题 You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()A、Enable Internet Connection SharingB、Enable on-demand dialingC、Enable sharing a modem on one computer on the networkD、Configure a DHCP ServerE、Disable Internet Connection Sharing

考题 You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()A、Configure a HOSTS file.B、Configure a LMHOSTS file.C、Configure a WINS server database.D、Configure a DHCP server address.E、Configure at least one DNS address.

考题 You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B、Start the RunAs service and configure the service to start automatically.C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D、Use Scheduled Tasks to configure the task to run under the security context of your account.

考题 You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()A、Enable Internet Connection SharingB、Enable on-demand dialingC、Enable sharing a modem on one computer on the networkD、Configure a DHCP ServerE、Disable Internet Connection SharingF、Configure all the other computers to be DHCP enabled.

考题 You need to recommend the server configurations for the new failover cluster. The configurations must support the company's planned changes    Which two actions should you recommend?()A、From Hyper-V Manager on each node, configure one virtual network.B、From Hyper-V Manager on one node, configure two virtual networks.C、Install one network adapter on each node. Configure the network adapters to use multiple IP ddresses.D、Install two network adapters on each node. Configure the network adapters to communicate on  separate subnets.

考题 You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

考题 Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

考题 You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.

考题 多选题Your customer wants to build a network for a financial trading floor that has a requirement for multiple high-value transactions, which are also vital to the customer. What are the two most critical requirements? ()(Choose two.)Ano single point of failureBtrading database server locationCredundant application servers locationDdeterministic response to all failuresEdetermine which protocol to use

考题 单选题You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()A  Only use fiber in pairs.B  Configure root guard on your switches.C  Do not use fiber but use copper.D  Configure UDLD to prevent one-way link conditions.

考题 单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A STPB GVRPC SNMPD VTPE DHCP

考题 多选题Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()AWhen you configure access to the wired network at home, set the wired network adapter location type to Public.BWhen you configure access to the wired network at home, set the wired network adapter location type to Private.CWhen you configure access to the public wireless access points, set the wireless network adapter location type to Public.DWhen you configure access to the public wireless access points, set the wireless network adapter location type to Private.

考题 单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A Use Windows Explorer to receive the offline filesB Using the Windows Explorer, disable the cache for the reports on the network shareC Use the Windows NT explorer to grant the special access for the reports on the network  shareD Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 多选题As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)AIt provides reliable input for verifying network consistency.BIt requires a network audit to support some upgrade decisions.CIt requires a network audit to support any network restructuring.DIt begins with gathering organizational input that may be inaccurate.

考题 多选题You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions. And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)Ano single point of failureBdetermine which protocol to useCtrading database server locationDdeterministic response to all failures