单选题You are the administrator of a company with BGP connections to multiple ISP’s. How could youconfigure BGP to make it favor one particular ISP for outbound traffic?()AConfigure weightBEnable route reflectorCCreate a distribute listDEnable the Longer Autonomous System path optionEAll of the above
单选题
You are the administrator of a company with BGP connections to multiple ISP’s. How could youconfigure BGP to make it favor one particular ISP for outbound traffic?()
A
Configure weight
B
Enable route reflector
C
Create a distribute list
D
Enable the Longer Autonomous System path option
E
All of the above
参考解析
解析:
暂无解析
相关考题:
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?() A.IDSB.IPSC.FirewallD.Managed PKI
You are the administrator of a company with BGP connections to multiple ISP’s. How could youconfigure BGP to make it favor one particular ISP for outbound traffic?()A、Configure weightB、Enable route reflectorC、Create a distribute listD、Enable the Longer Autonomous System path optionE、All of the above
You work as a network engineer for the company, you want to configure two BGP speakers to form an EBGP session across a firewall. On the engineer’s network, the firewall always permits TCP sessions that are initiated from the inside network (the network attached to the inside interface of the firewall). What prerequisite is there for enabling BGP to run on this network?()A、EBGP multihop will need to be configured for this to work.B、This should work with normal BGP peering, with no additional configuration on the BGP speakers or the firewall.C、The BGP protocol port must be opened on the firewallD、There is no way to make BGP work across a firewall.
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI
You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command: LSNRCTLSTATUS listener1 Which information will NOT be displayed when you issue the above command?() A、 whether the password is set in the listener or a file or notB、 the number of client connections the service handler has refusedC、 the information will be displayed whether the instance can accept connections or notD、 the protocol addresses on which the listener is configured to listen
ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU. You need to verify that users are connecting to the two servers by using encrypted connections. What should you do?()A、Run the net view command.B、Run the gpresult command.C、Use the IP Security Monitor console.D、Use the IPSec Policy Management console.
You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()A、You should consider changing the EWS virtual directory.B、You should consider changing the Federation Trust.C、You should consider changing the Organizational Relationship.D、You should consider changing the default sharing policy.
You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for managing a mailbox server named -ex02.all users within the organization make use of microsoft office outlook 2010 to connect to the exchange organization.you receive an instruction to determine the latency of user connections to-ex02. What should you do?()A、You should consider running the Test-OutlookConnectivity cmdlet.B、You should consider running the Exchange Best Practices Analyzer.C、You should consider running the Test-OutlookWebServices cmdlet.D、You should consider running the Message Tracking Performance tool.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You have received instructions from the CIO to support Autodiscover from the Internet by creating a resource record in DNS.What should you do?()A、You should consider creating a Host (A) resource record.B、You should consider creating a Text (TXT) resource record.C、You should consider creating a Pointer (PTR) resource record.D、You should consider creating a Mail exchange (MX) resource record.
You have an Exchange Server 2010 organization. Company policy states that a copy of a users mailbox must be kept for one year after the user leaves the company. All user accounts are in an organizational unit (OU) named OU1. A compliance administrator plans to export the mailboxes to personal folders. You need to recommend a solution that allows the compliance administrator to meet the requirements ofthe company policy. What should you include in the solution?()A、a new management role assignmentB、delegated permissions to OU1C、managed folder mailbox policiesD、new Personal Archives
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? () A、You should configure SQL Server VSS Writer B、You should configure Distributed File System C、You should configure SQL Server D、You should configure SQL Server Full Text
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover. What should you do? () A、The contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS) B、You should restore a backup to the active node C、You should get rid of the shared array from the active node D、From the active node, you have to uplug the network cable(s)
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now in a high security environment, you manage a SQL Server 2008 cluster. You intend to configure and use encrypted connections for the clustered virtual SQL Server. You have to install a certificate. The cetification will be used for encryption. What should you do?()AIn the cluster quorum drive, install the encryption certificate BIn the SQL Server shared disk, install the encryption certificate Cin the cluster group, install the encryption certificate. DOn each individual node, install the encryption certificate
单选题A company has a BGP network and a BGP route of 196.27.125.0/24 that should be propagated toall of the devices. The route is not now in any of the routing tables. The administrator determinesthat an access list is the cause of the problem. The administrator changes the access list to allowthis route, but the route still does not appear in any of the routing tables. What should be done topropagate this route?()AClear the BGP sessionBChange both the inbound and outbound policy related to this routeCUse the service-policy command to adjust the QOS policy to allow the route to propagateDUse the release BGP routing command
单选题You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command: LSNRCTLSTATUS listener1 Which information will NOT be displayed when you issue the above command?()A whether the password is set in the listener or a file or notB the number of client connections the service handler has refusedC the information will be displayed whether the instance can accept connections or notD the protocol addresses on which the listener is configured to listen
单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()AmsiBmstCzapDzip
单选题You are the network administrator for Company. Laura is a sales representative for the company. Shetravels on a regular basis and dials into the company network from her Windows 2000 Professionalportable computer. Company recently implemented a new computing security policy that mandates allremote connections be established by a two-way authentication method. You configure a Windows 2000Server computer to run Routing and Remote Access Server for Windows 2000 to meet the requirementsof the new security policy. Laura reports she now cannot initiate a dial-up connection.Laura needs to dial in to the company network. What should you do?()AApply the Hisecws.inf Security Template to Laura’s computer.BApply the Compatws.inf Security Template to Laura’s computer.CInstruct Laura to configure her dial-up connection to use multi-link.DInstruct Laura to configure her dial-up connection to use MS-CHAP v2.EInstruct Laura to configure her dial-up connections to use L2TP.
单选题You are the administrator of a company with BGP connections to multiple ISP’s. How could youconfigure BGP to make it favor one particular ISP for outbound traffic?()AConfigure weightBEnable route reflectorCCreate a distribute listDEnable the Longer Autonomous System path optionEAll of the above
单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. A vendor company’s application is utilized, and the application is based on a proprietary database. Data is queried from the application database and the data is imported into a SQL Server 2005 database. A new OLE DB driver is offered by the application vendor, and the new OLE DB driver will be utilized when the application database is queried. According the company requirements, the connections between the SQL Server database and the application database is prohibited, except when this data is queried. You should think out a method to have data queried from the application database. Which action should be performed to achieve the goal?()ATo achieve the goal, a Linked Server connection should be configured to the application database.BTo achieve the goal, a query should be written, and an OPENQUERY command is utilized by the query.CTo achieve the goal, a Remote Server connection to the application database should be configured.DTo achieve the goal, a query should be written, and an OPENDATASOURCE command is utilized by the query.
单选题You have an Exchange Server 2010 organization. Company policy states that a copy of a users mailbox must be kept for one year after the user leaves the company. All user accounts are in an organizational unit (OU) named OU1. A compliance administrator plans to export the mailboxes to personal folders. You need to recommend a solution that allows the compliance administrator to meet the requirements ofthe company policy. What should you include in the solution?()Aa new management role assignmentBdelegated permissions to OU1Cmanaged folder mailbox policiesDnew Personal Archives
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now you get an order from your company CIO, you have to identify whether a database integrity check (DBCC CHECKDB) was run for a particular database. Which log file should you examine?()Alog.trc Bdefault.trc CERRORLOG DSQLAGENT
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The company wants to export data from SQL Server to a Microsoft Excel file. The company assigns this task to you. You perform this by using the SQL Server Import and Export Wizard. After this, you save the package definition to a file. Now you have to reexecute the package from the command line. In the options below, which utility should you choose to use?()Abcp.exe Bdta.exe Cdtexec.exe Dsqlmaint.exe
单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons. Which profile must you edit?()AThe SetupUser profileBThe Default User profileCThe Administrator profileDThe System profileEThe All Users profile
单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005.You work as a database administrator for your company. A SQL Server 2005 database is utilized in your company. And a table named Inventory is contained by the database. A column named Price is included by the table. According to the company policy, you cannot reduce more than 10 percent the value in the Price column in any single database operation. Through many kinds of method, the company makes updates to the Price column. For instance, the utilization of ad hoc queries is one of the methods. Since you are the database administrator, you should confirm that this company policy takes its effect. Which action should be performed?()AA stored procedure should be created, and changes are disallowed by the procedure to the Price column that violates company policy.BOn the Price column, a check constraint should be created, and a specified minimum value is required by the check constraint.CA trigger should be created, and changes are rolled back by the trigger to the Price column that violates company policy.DOn the Price column, a foreign key constraint is created to a table that valid prices are included.
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. For some reason, now the company wants to view the number of users who access the SQL Server instance. The company CIO assigns this task to you. You have to use Windows System Monitor to find out the concrete number. Which performance object should you capture?()ASQLServer:Buffer Manager BSQLServer:Access Methods CSQLServer:General Statistics DSQLServer:Exec Statistics
单选题You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for managing a mailbox server named -ex02.all users within the organization make use of microsoft office outlook 2010 to connect to the exchange organization.you receive an instruction to determine the latency of user connections to-ex02. What should you do?()AYou should consider running the Test-OutlookConnectivity cmdlet.BYou should consider running the Exchange Best Practices Analyzer.CYou should consider running the Test-OutlookWebServices cmdlet.DYou should consider running the Message Tracking Performance tool.