多选题Which two steps below should you perform on the hub router while configuring EIGRP routing over  DMVPN (mGRE tunnel)? ()ASet the NHRP hold time to match the EIGRP hold timeBAdd the enable eigrp stub commandCAdd the disable eigrp as-member split-horizon commandDAdd the disable eigrp as-member next-hop-self command

多选题
Which two steps below should you perform on the hub router while configuring EIGRP routing over  DMVPN (mGRE tunnel)? ()
A

Set the NHRP hold time to match the EIGRP hold time

B

Add the enable eigrp stub command

C

Add the disable eigrp as-member split-horizon command

D

Add the disable eigrp as-member next-hop-self command


参考解析

解析: 暂无解析

相关考题:

You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?() A.Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB.Execute the PURGE BINARY LOGE NOT USED commandC.Remove all of the binary log files that have a modification date earlier than todayD.Edit the .index file to remove the files you want to deleteE.Ensure that none of the attached slaves are using any of the binary logs you want to delete

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()A.AB.BC.CD.D

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E

You need to connect to your computer by using the Remote Desktop Connection client.Which two actions should you perform?() A.AB.BC.CD.DE.E

For which type of connection should a straight-through cable be used?()A、switch to switchB、switch to hubC、switch to routerD、hub to hubE、router to PC

You are designing a strategy to migrate user accounts. Which two actions should you perform? ()A、Change the functional level.B、Create an external trust relationship.C、Run adprep to prepare the research.com forest.D、Run adprep to prepare the research.com domain.

Which of the commands below would you enter if you wanted to see the configuration register of your router?()A、show bootB、show flashC、show registerD、show versionE、show config

Which two steps below should you perform on the hub router while configuring EIGRP routing over  DMVPN (mGRE tunnel)? ()A、Set the NHRP hold time to match the EIGRP hold timeB、Add the enable eigrp stub commandC、Add the disable eigrp as-member split-horizon commandD、Add the disable eigrp as-member next-hop-self command

Router R1 is configured as shown below: router eigrp 100 network 10.0.0.0 eigrp stub Based on the information shown above, which two types of routes will be advertised?()A、Receive - onlyB、StubC、StaticD、SummaryE、ConnectedF、Dynamic

A technician installed a new application on a Windows XP desktop. After the application wasinstalled, the technician rebooted the desktop and received a bluescreen error. Which of thefollowing steps should the technician perform?() (Select TWO).A、Boot into Safe ModeB、Replace the motherboardC、Uninstall the applicationD、Replace the hard driveE、Install more RAM

The database is running in the ARCHIVELOG mode. It has three redo log groups with one member each. Oneof the redo log groups has become corrupted. You have issued the following command during the recovery of a damaged redo log file:ALTER DATABASE CLEAR UNARCHIVED LOGFILE GROUP 3; Which action should you perform immediately after using this command?()A、You should perform a log switchB、You should make a backup of the databaseC、You should switch the database to the NONARCHIVELOG modeD、You should shut down the database instance and perform a complete database recovery

You work as the exchange administrator at Testking.com. The TestKing.com network contains an ActiveDirectory forest. You are planning the deployment of two Edge Transport servers as well as two Hub Transport Servers.You decide to recommend changes to the organization in order to make sure that users are able to sende-mail messages to the Internet in the event of a transport server failing. What should you do?()A、You should recommend that the Edge Transport servers are configured as source servers for a Sendconnector.B、You should recommend that shadow redundancy be configured for the Hub Transport servers.C、You should recommend that one mal exchange (MX) record and one SRV record be created for every Edge Transport server in the internal DNS zone.D、You should recommend that failover clustering be implemented on both Hub Transport servers.

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. On two cluster-ready nodes, you intend to perform an installation of a SQL Server 2008 mission-critical cluster. Constant availability is needed by the mission-critical cluster. You have to configure the SQL Server cluster to failover and reduce the service disruption to the least. Which failover option should you use?()  A、You should allow failback only during non-business hours B、You should immediately allow failbackC、You should prevent automatic failback D、You should allow failback only during business hours

Your network uses IPv4. You install a server that runs Windows Server 008 at a brach office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office. Which two actions should you perform?() A、 Install the Routing and Remote Access role.B、 Run the netsh ras ip set access ALL commandC、 Run the netsh interface ipv4 enable commandD、 Enable the IPv4 Router Routing and Remote Access option

Your network uses IPv4.You install a server that runs Windows Server 2008 R2 at a branch office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office.Which two actions should you perform?()A、Install the Routing and Remote Access Services role service.B、Run the netsh ras ip set access ALL command.C、Run the netsh interface ipv4 enable command.D、Enable the IPv4 Router Routing and Remote Access option.

You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. A SQL Server Agent job is failing. You find that the job history information is incomplete and seems to be truncated after you review it. All information produced by a job must be available for viewing.  So what action should you perform to achieve this goal? () A、You should enable notifications to the Windows application event log when the job completes. B、You should enable write OEM file C、You should enable all job steps, making them send the output to a file D、You should include execution trace messages in the SQL Agent Error log

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()A、ServiceGreatUser should be added to the appropriate fixed database roles. B、You should assign the appropriate object-level permissions to ServiceGreatUser C、You should assign the appropriate server-level permissions to ServiceGreatLogin D、You should assign the appropriate database-level permissions to ServiceGreatUser

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? () A、You should configure SQL Server VSS Writer B、You should configure Distributed File System C、You should configure SQL Server D、You should configure SQL Server Full Text

多选题A technician installed a new application on a Windows XP desktop. After the application wasinstalled, the technician rebooted the desktop and received a bluescreen error. Which of thefollowing steps should the technician perform?() (Select TWO).ABoot into Safe ModeBReplace the motherboardCUninstall the applicationDReplace the hard driveEInstall more RAM

多选题You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()AUse the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesBExecute the PURGE BINARY LOGE NOT USED commandCRemove all of the binary log files that have a modification date earlier than todayDEdit the .index file to remove the files you want to deleteEEnsure that none of the attached slaves are using any of the binary logs you want to delete

多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password

多选题Your network uses IPv4.You install a server that runs Windows Server 2008 at a branch office.The server is configured with two network interfaces. You need to configure routing on the server at the branch office.Which two actions should you perform? (Each correct answer presents part of the solution.()AInstall the Routing and Remote Access Services role service.BRun the netsh ras ip set access ALL command.CRun the netsh interface ipv4 enable command.DEnable the IPv4 Router Routing and Remote Access option.

多选题You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()ADelegate the password management controls to the help desk staff.BDelegate the password management controls to the Domain Users group.CConfigure the Default Domain Policy to enforce password expiration settings.DConfigure the Default Domain Controller Policy to enforce password expiration settings.

多选题Router R1 is configured as shown below: router eigrp 100 network 10.0.0.0 eigrp stub Based on the information shown above, which two types of routes will be advertised?()AReceive - onlyBStubCStaticDSummaryEConnectedFDynamic

多选题You have been asked to establish reachability between Router 1's and Router 2's loopback addresses as shown in the exhibit.Which two steps will accomplish this task?()ACreate a static route on Router 1 to 172.17.28 1 with a next hop of 10.10.10.2BCreate a static route on Router 1 to 172.17.28 1 with a next hop of 10.10.10.1CCreate a static route on Router 2 to 172.17.25.1 with a next hop of 10.10.10.1DCreate a static route on Router 1 to 172.17.25.1 with a next hop of 10.10.10.2

单选题Which of the commands below would you enter if you wanted to see the configuration register of your router?()Ashow bootBshow flashCshow registerDshow versionEshow config

多选题Your network uses ipv4. You install a server that runs windows server 008 at a brach office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office. Which two actions should you perform? ()AInstall the routing and remote access role.BRun the netsh ras ip set access ALL command.CRun the netsh interface ipv4 enable command.DEnable the IPV4 router routing and remote access option.