单选题You are planning a new VLAN-based network solution.  What is one item you should consider when creating your implementation plan as it concerns VLANs?()Ageneric router and switch configuration parametersBend-to-end test plan after all components have been installed and  configuredCadministrator assignmentsDrollback plan

单选题
You are planning a new VLAN-based network solution.  What is one item you should consider when creating your implementation plan as it concerns VLANs?()
A

generic router and switch configuration parameters

B

end-to-end test plan after all components have been installed and  configured

C

administrator assignments

D

rollback plan


参考解析

解析: 暂无解析

相关考题:

- We are planning to register the trademark of “Red Dragon” for your new product. What’s your opinion about this brand name -() A、I suggest that you should give it up.B、You can’t adopt it.C、You mustn’t use it.

You want to install Windows 2000 Professional on 20 new PXE compliant computers, which do not have operating systems installed. You create a RIS image and load the image onto the RIS server and then start the new computers. You find that the new computers cannot connect to the RIS server. You verify that existing client computers on the network can connect to network servers.What should you do? (SELECT AND PLACE)

You are the administrator for your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 20 new PXE-compliant computers on the marketing segment of your network. The new computers do not have operating systems installed.You create a RIS image. You load the image onto the RIS server. You then start the new computers.You find that the new computers cannot connect to the RIS server. You verify that the new computers cannot connect to the RIS server. You verify that the existing client computers in the network can connect to the network servers, including the RIS server. You want to enable the new computers to connect to the RIS server.What should you do?A.Add a Windows 2000 Server computer running WINS to the network.B.Add a Windows 2000 Server computer running DHCP to the network.C.Add the domain Everyone group to the RIS OS image security settings.D.Place the new computers on the same segment as the RIS server.

You connect your computer to a wireless network. You discover that this new connection fails to show in the Connect to a network window.You need to view this connection in the Connect to a network window.What should you do?()A.AB.BC.CD.D

You have just created a new VLAN on your network.  What is one step that you should include in your VLAN-based implementation and verification plan? ()A、Verify that trunked links are configured to allow the VLAN traffic.B、Verify that the switch is configured to allow for trunking on the switch ports.C、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.D、Verify that different native VLANs exist between two switches for security purposes.

What network information do you need when you plan to implement a VLAN-based solution?()A、default VLAN information for all unused switch portsB、802.1x configuration parameters C、number of IP subnets neededD、IP routing protocol information

Company.com with an EtherChannel implementation is considering an HACMP solution. What considerations must be addressed in planning this configuration?()  A、 Hardware address takeover must be configured.B、 IPAT via IP aliasing is required for EtherChannel.C、 EtherChannel must be defined as a separate network.D、 HACMP does not support the fallover of EtherChannel.

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange 2010 environment. A new TestKing.com security policyrequires that only approved mobile devices can connect via the Exchange ActiveSync.  You have receivedinstructions from the CIO to stop specified mobile devices to connect to the Exchange servers. What should you do?()A、The best option is to create a new Exchange ActiveSync device access role.B、The best option is to create a new Exchange ActiveSync policy.C、The best option is to create a new client throttling policy.D、The best option is to create a new Microsoft Server ActiveSync virtual directory.

Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows7 on a new portable computer and join the computer to the domain. You need to ensure that the computercan establish DirectAccess connections.  What should you do?()A、Install a computer certificate.B、Create a new network connection.C、Enable the Network Discovery firewall exception.D、Add the computer account to the Network Configuration Operators group.

You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?()A、From Network and Sharing Center, click Connect to a network.B、From Network and Sharing Center, click Set up a new connection or network.C、From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.D、From Windows Firewall with Advanced Security, click Connection Security Rules and then click NewRule.

You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). You need to monitor the performance of the VPN server for one day. What should you do? ()A、From the Performance console, create a trace log.B、From the Performance console, create a counter log.C、Install Network Monitor Tools. From Network Monitor create a new capture.D、Install Network Monitor Tools. From Network Monitor create a new parser file.

You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()A、Enable DHCP in the TCP/IP properties.B、Replace the Token Ring network adapter with an Ethernet network adapter.C、Configure a different TCP/IP address on the same subnet.D、Configure a valid DNS Server in the TCP/IP properties.

You need to create a VPN connection. What should you do?()A、From Windows Explorer, right-click Computer and then click Map network drive.B、From Windows Explorer, right-click Computer and then click Add a network location.C、From Network and Sharing Center, click Set up a new connection or network and then click Set up anew network.D、From Network and Sharing Center, click Set up a new connection or network and then click Connect to aworkplace.

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TK1 contains a large number of files that are frequently accessed by network users. Users report unacceptable response times on TK1. You compare the current performance of TK1 to a system performance baseline that you created several weeks ago. You decide that TK1 needs a higher-performance network adapter. After you add the appropriate network adapter, users report satisfactory performance. You need to gather new server performance data so you can establish a new performance baseline for TK1. You open the Performance console. What should you do next?()A、Add all counters for the Network Interface object to the System Monitor object.B、Create a new trace log object. Under Events logged by system provider in the new object, select the Network TCP/IP setting. Start the trace log.C、Create a new counter log object. Add all counters for the Network Interface object to the new object. Start the counter.D、Create a new alert object.

Your network contains a server named Server1 that runs Windows Server 2003 Service Pack (SP2). You install a new network adapter on Server1. You need to view the media access control (MAC) address for the new network adapter. What should you do? ()A、At the command prompt, run Ipconfig /all.B、At the command prompt, run Net view //server1.C、From the Device Manager snap-in, view the properties of the network adapter.D、From the Services snap-in, view the properties on the Network Connections service.

Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()A、Join the new server to an Active Directory domain.B、Install Active? Directory Lightweight Directory Services on the new server.C、Run ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.D、Open TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.

You need to recommend an IP addressing strategy for the client computers in the new sales office. What should you recommend implementing in the new sales office?()A、DHCP server rolesB、the DirectAccess featureC、the Network Policy Server (NPS) role serviceD、the Remote Access Service role service

You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()A、virtual machine queue (VMQ)B、Virtual Machine ChimneyC、a synthetic network adapterD、an emulated network adapter

单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory forest with one domain. The internal network of TestKing.com contains a perimeter network. You have received instructions fromthe CIO to install 15 Edge Transport servers on the perimeter network with the following criteria: * The Edge Transport servers should have a security policy, applied by the administrators. * The minimization of the administrative overhead towards the servers. * The minimization the attack surface of the perimeter network. What should you do?()AThe best option is to set up a new Active Directory domain in the internal forest and then join all EdgeTransport servers to the new domain.BThe best option is to make use of Active Directory Federation Services (AD FS).CThe best option is to make use of Network Policy and Access Services (NPAS).DThe best option is to set up a new Active Directory domain in the perimeter network and then join all Edge Transport Servers to the new domain.

单选题You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()Avirtual machine queue (VMQ)BVirtual Machine ChimneyCa synthetic network adapterDan emulated network adapter

单选题You have a server that runs Windows Server 2008 and has the Windows Server Virtualization (WSv) server role installed. You create a new virtual machine.  You need to configure the virtual machine to meet the following requirements: Allow network communications between the virtual machine and the host system. Prevent communications with other network servers. What should you do first?()AInstall the Microsoft Loopback Adapter.BCreate a new Virtual Network Switch.CEnable Internet Connection Sharing (ICS).DSet the Connection to None for the network interface card.

单选题Your company has 1,000 client computers.  You are planning to deploy Windows 7 and a new line-of-business application.   You have the following requirements:   Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment.  The application must be available for use on client computers that are not connected to the network.   You need to ensure that the application is installed on all new client computers.   What should you do?()APublish the application by using Group Policy Software Installation.BDeploy the application by using Windows Server Update Services (WSUS).CService an online image of Windows 7 to add the new application.DService an offline image of Windows 7 to add the new application.

单选题You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()AVerify that different native VLANs exist between two switches for security purposes.BVerify that the switch is configured to allow for trunking on the switch ports.CVerify that each switch port has the proper IP address space assigned to it for the new VLAN. DVerify that the VLAN virtual interface has been correctly created and enabled.

单选题You connect your computer to a wireless network. You discover that this new connection fails to show in the Connect to a network window.  You need to view this connection in the Connect to a network window.  What should you do?()AClick the Diagnose and repair link.BEnable the Turn on notification of new networks option.CConfigure the Connect to a network window to show all networks.DDisable the Connect automatically when this network is in range option, and then enable the Connect even if the network is not broadcasting option.

单选题What network information do you need when you plan to implement a VLAN-based solution?()Adefault VLAN information for all unused switch portsB802.1x configuration parameters Cnumber of IP subnets neededDIP routing protocol information

单选题You need to recommend an IP addressing strategy for the client computers in the new sales office. What should you recommend implementing in the new sales office?()ADHCP server rolesBthe DirectAccess featureCthe Network Policy Server (NPS) role serviceDthe Remote Access Service role service

单选题You need to upgrade the IOS of an existing router on your network. The new IOS image is located on a TFTP server that you have set up within the network. What command should you issue in order to download the new IOS version?()ARouter# copy tftp flashBRouter# copy flash runCRouter(config)# restore flashDRouter(config)# repair flashERouter#copy flash tftpFRouter# copy start flash