You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.What should you do?A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.C.Create a Windows 2000 Group Policy that denies user access to My Network Places.D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.
You are the network administrator for Test King. All network servers run Windows Server 2003. A server named TestKingSrv hosts applications for network users.TestKingSrv contains a motherboard that can support two CPUs. One CPU is currently installed. TestKingSrv has 512 MB of RAM and a single 36 - GB integrated device electronics (IDE) hard disk. It has a 10 MB Ethernet card connected to a 10/100 Mb switch.After TestKingSrv is in use for five months, network users report unacceptable response times on their applications.You open System Monitor on TestKingSrv and see the information shown in the following table.You need to improve the performance of Server 1.What should you do?()A. Add an additional CPU.B. Add an additional 512 MB of RAM.C. Replace the existing hard disk with a faster one.D. Replace the 10-Mb Ethernet card with a 100-Mb Ethernet card.
When you create a network implementation VLAN solution, what is one procedure that you should include in your plan?()A、Perform an incremental implementation of components.B、Following the PPDIOO model, implement the entire solution and then test end-to-end to make sure that it is performing as designed.C、Implement trunking of all VLANs to ensure that traffic is crossing the network as needed before performing any pruning of VLANs.D、Test the solution on a segmented portion of a lab network prior to rolling out across the entire network.
You are the network administrator for Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional. TK1 is your global catalog server. TK2 runs Software Update Services (SUS). The Set Options console on TK2 uses all default settings. You configure the client computers to access the service on TK1 and TK2. Three months later, Microsoft releases a critical security update for Windows XP Professional. From a test client computer, you use Windows Update to download the update. You test the update and receive no error messages. Now you need to deploy the update to all client computers as quickly as possible. You must ensure that the update is not deployed to any servers. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)A、On TK1, configure the Default Domain Group Policy object (GPO) to distribute the security update.B、On TK1, initiate replication.C、On TK2, initiate synchronization.D、On TK2, approve the security update.
You are planning a new VLAN-based network solution. What is one item you should consider when creating your implementation plan as it concerns VLANs?()A、generic router and switch configuration parametersB、end-to-end test plan after all components have been installed and configuredC、administrator assignmentsD、rollback plan
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()A、You should assign the network 172.16.0.0/16.B、You should assign the network 172.16.0.0/17.C、You should assign the network 172.16.0.0/18.D、You should assign the network 172.16.0.0/19.E、You should assign the network 172.16.0.0/20.F、You should assign the network 172.16.0.0/22.
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter
You are a network administrator for your company. All domain controllers run Windows Server 2003. The network contains 50 Windows 98 client computers, 300 Windows 2000 Professional computers, and 150 Windows XP Professional computers. According to the network design specification, the Kerberos version 5 authentication protocol must be used for all client computers on the internal network. You need to ensure that Kerberos version 5 authentication is used for all client computers on the internal network. What should you do? ()A、 On each domain controller, disable Server Message Block (SMB) signing and encryption of the secure channel traffic.B、 Replace all Windows 98 computers with new Windows XP Professional computers.C、 Install the Active Directory Client Extensions software on the Windows 98 computers.D、 Upgrade all Windows 98 computers to Windows NT Workstation 4.0.
You are the administrator of ExamSheet.net's network. ExamSheet upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings so that IP and DNS addresses are obtained automatically. When you restart the computer you cannot access the network. When you attempt toPINGaddress 127.0.0.1 you receive the following error message: "Request timed out." You want this computer to communicate on the network. What should you do?()A、Configure IP address settings manually.B、Replace the network adapter.C、Disable TCP/IP filtering for all network adapters.D、Configure DNS server address settings manually.E、Enable IEEE 802.1x authentication.
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster. The nodes have a single network adapter and are connected to the same switching hub device. Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers. You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device. You do not want to move the cluster to another switching hub device. What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed and all client computers have Windows 8 installed.You install the DHCP server services on a server named ABC_SR02 and configure a DHCP scope for the ABC.com network. You want ABC_SR02 to automatically assign IP configurations to all client computers on the network. How would you accomplish this task?()A、You should activate the DHCP scope on ABC_SR02.B、You should authorize ABC_SR02 in Active Directory.C、You should configure the client computers to Obtain an IP address automatically.D、You should configure the client computers to with an alternative IP address.
You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()A、Enable Internet Connection SharingB、Enable on-demand dialingC、Enable sharing a modem on one computer on the networkD、Configure a DHCP ServerE、Disable Internet Connection SharingF、Configure all the other computers to be DHCP enabled.
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TK1 contains a large number of files that are frequently accessed by network users. Users report unacceptable response times on TK1. You compare the current performance of TK1 to a system performance baseline that you created several weeks ago. You decide that TK1 needs a higher-performance network adapter. After you add the appropriate network adapter, users report satisfactory performance. You need to gather new server performance data so you can establish a new performance baseline for TK1. You open the Performance console. What should you do next?()A、Add all counters for the Network Interface object to the System Monitor object.B、Create a new trace log object. Under Events logged by system provider in the new object, select the Network TCP/IP setting. Start the trace log.C、Create a new counter log object. Add all counters for the Network Interface object to the new object. Start the counter.D、Create a new alert object.
You are the administrator of a small server based network. While installing Windows 2000 Professional on your computer, you configure the network adapter card for each computer to use TCP/IP and assign static IP setting information. During installation the setup detects and installs the 10/100 MBPS UTP only network adepter card on computers 6 8 and 10 MBPS/UTP combination adapter card on the other 7 computers. You accept the default settings for the network adapter card and finish installing the network adapter card. All computers are connected to 10/100 switch that has category 5 UTP cabling. After installation you find that computer 6 and 8 can communicate with each other. You want all 9 computers on your network to be able to communicate with each other. What should you do?()A、Configure the 10/100 switch to transfer only at the 100 MBPS rate.B、Configure 10/100 MBPS network adapter card to switch all the computers at 10 MBPS rate.C、Change the combination network adapter card to use the BNC transceiver setting.D、Change the combination network adapter card to use the UTP transceiver setting.
You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.
多选题You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All client computers run Windows XP Professional. The company has offices in Berlin, Dortmund, and Frankfurt. Each office is configured as a separate IP subnet. DNS is the only method of name resolution on the network. You need to implement a software update infrastructure on the network. You install Software Update Services (SUS) on a computer named TestKing3 in the Berlin office. You install on TestKing3 with all default settings. You have no plans to install additional SUS servers. You configure all client computers appropriately. You must ensure that client computers can successfully connect to the SUS server. What should you do?()AConfigure the Internet browser home page on all client computers to point to http://windowsupdate.microsoft.com.BIn the SUS Administrator, configure the Server Name property to be the server's fully qualified domain name (FQDN).COpen IIS Manager and enable HTTP over SSL.DEnable communication over port 135 between all client computers and the SUS server.
单选题You are the network administrator for The network consists of a single Active Directory domain named All 40 network servers run Windows Server 2003, and all 1,500 client computers run Windows XP Professional. The servers are located in seven different buildings. All are configured to allow Remote Desktop connections. A new administrator named Tess King is hired to help you configure applications and perform disk defragmentation on all 40 servers. You need to enable Tess King to manage the servers remotely by using Remote Desktop for Administration. What should you do?()AAdd Tess King to the Administrators group.BAdd Tess King to the Power Users group.CAdd Tess King to the Remote Desktop Users group.DDelegate control of the Domain Controllers organizational unit (OU) to Tess King.EDelegate control of the Computers organizational unit (OU) to Tess King.
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1. What should you do?()AInstall the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.BOpen Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.CInstall Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.DOpen Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()AEnable the Require domain controller to unlock policy.BSet the Number of previous logons to cache policy to 0. CRemove all user and group accounts from the Log on locally user right. DRemove all user and group accounts from the Access this computer from the network user right.
单选题You are an enterprise administrator for Cer-tech .com. All the servers on the network run Windows Server2008. The network consists of a server called Server01 that runs Microsoft Hyper-V and hosts three virtualmachines. To fulfill a network requirement, you need to configure all of the virtual machines to connect toeach other. However, the company policy states that the virtual machines must not connect to the companynetwork. Which of the following options would you choose to ensure that all the virtual machines connect to eachother and you meet the company policy also?()AEnable the Enable virtual LAN identification option for each virtual machineBEnable the Enable virtual LAN identification option for each virtual machine and then set the connection to Host for the network interface cardCSet the Connection to None for the network interface cardDSelect the Not connected option for each virtual machine.
单选题You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain. Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network. How should you configure Server1?()A Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B Configure the network adapter on the test network to disable IEEE 802.1x authentication.C Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
单选题When you create a network implementation VLAN solution, what is one procedure that you should include in your plan?()APerform an incremental implementation of components.BFollowing the PPDIOO model, implement the entire solution and then test end-to-end to make sure that it is performing as designed.CImplement trunking of all VLANs to ensure that traffic is crossing the network as needed before performing any pruning of VLANs.DTest the solution on a segmented portion of a lab network prior to rolling out across the entire network.
单选题A Cisco Catalyst switch is part of the CIS network. As an experienced network administrator, you are thinking of filtering the traffic within VLANI00 with the use of a VACL named "test" on that switch. Which of the following command will enable that?()Ainterface vlan 100 ip access-group test inBinterface vlan 100 ip access-group testCvlan access-map test 100Dvlan filter test vlan-list 100
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address. What should you do?()ACreate an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.BCreate a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.CCreate an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.DCreate a Pattern Match capture trigger for the 131.107.0.1 IP address.
单选题You are the network administrator for . The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. TestKing acquires a subsidiary. You receive a comma delimited file that contains the names of all user accounts at the subsidiary. You need to import these accounts into your domain. Which command should you use?()AldifdeBcsvdeCntdsutil with the authoritative restore optionDdsadd user
多选题You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()AEnable Internet Connection SharingBEnable on-demand dialingCEnable sharing a modem on one computer on the networkDConfigure a DHCP ServerEDisable Internet Connection SharingFConfigure all the other computers to be DHCP enabled.
单选题You need to design a method to automate the deployment of critical updates and security patches that are supplied by Microsoft as these updates and security patches are released. Your solution must meet technical requirements. What should you do?()ADeploy a Windows Server 2003 computer running SUS in the test network. Deploy SUS servers in each child domain to download administrator-approved updates from the test network SUS serverBDeploy a Windows Server 2003 computer running SUS in the test network Use autoupdate policies in each child domain to download and deploy updates from the test network SUS serverCInstall MBSA on a Windows Server 2003 computer in the network network. Deploy MBSA as a Windows Installer package to all computers in the child domains, and configure MBSA to scan for updates from the server in the test networkDInstall IIS on a Windows Server 2003 computer in the test network. Create a Web site named Updates on this server. Configure an autoupdate policy in each child domain to download and deploy updates from the Updates Web site
单选题You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()AEnable Internet Connection SharingBEnable on-demand dialingCEnable sharing a modem on one computer on the networkDConfigure a DHCP ServerEDisable Internet Connection Sharing