单选题You need to configure a new Company switch for trunking.  Which switch command enables a  trunking protocol that appends a four byte CRC to the packet?()A CompanySwitch(config-if)#switchport trunk encapsulation dot1qB CompanySwitch(config-if)#switchport trunk encapsulation itefC CompanySwitch(config-if)#switchport trunk encapsulation fddiD CompanySwitch(config-if)#switchport trunk encapsulation islE None of the other alternatives apply

单选题
You need to configure a new Company switch for trunking.  Which switch command enables a  trunking protocol that appends a four byte CRC to the packet?()
A

 CompanySwitch(config-if)#switchport trunk encapsulation dot1q

B

 CompanySwitch(config-if)#switchport trunk encapsulation itef

C

 CompanySwitch(config-if)#switchport trunk encapsulation fddi

D

 CompanySwitch(config-if)#switchport trunk encapsulation isl

E

 None of the other alternatives apply


参考解析

解析: 暂无解析

相关考题:

As the network technician at Company, you need to configure DHCP snooping on a new switch.   Which three steps are required? ()A、 Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.B、 Configure DHCP snooping globally.C、 Configure the switch as a DHCP server.D、 Configure DHCP snooping on an interface.E、 Configure all interfaces as DHCP snooping trusted interfaces.F、 Configure DHCP snooping on a VLAN or range of VLANs.

You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()A、Configure a DNS suffix.B、Configure a subnet mask.C、Configure an LMHOSTS file.D、Configure an Interface metric.E、Configure at least one DNS address.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to company growth Company.com, has acquired an accepted domain named courseware.com.The employees of both domains are configured with internal and external Out Of Office messages.You have received instructions to make sure that the internal Out Of Office messages are sent to senders from the courseware.com. What should you do?()A、You should create and configure a new accepted domain.B、You should create and configure a new remote domain.C、You should create and configure a new Receive connector.D、You should create and configure a new Send connector.

You have just purchased a new Cisco 3560 switch running the enhanced IOS and need configure  it to be installed in a high availability network. On a 3560 EMI switch,  which three types of  interfaces can be used to configure HSRP?()A、 SVI interfaceB、 Access portC、 EtherChannel port channelD、 Loopback interfaceE、 Routed portF、 BVI interface

You need to configure a new Company switch for trunking.  Which switch command enables a  trunking protocol that appends a four byte CRC to the packet?()A、 CompanySwitch(config-if)#switchport trunk encapsulation dot1qB、 CompanySwitch(config-if)#switchport trunk encapsulation itefC、 CompanySwitch(config-if)#switchport trunk encapsulation fddiD、 CompanySwitch(config-if)#switchport trunk encapsulation islE、 None of the other alternatives apply

You need to configure a new Company switch to support DTP.  Which DTP switchport mode  parameter sets the switch port to actively send and respond to DTP negotiation frames? ()A、 AccessB、 No negotiateC、 TrunkD、 Dynamic desirableE、 Dynamic autoF、 None of the other alternatives apply

You need to configure a new Cisco router to be installed in the Company VOIP network.  Which  three interface commands will configure the switch port to support a connected Cisco phone and  to trust the CoS values received on the port if CDP discovers that a Cisco phone is attached? ()A、switchport voice vlan vlan-idB、mls qos trust device cisco-phoneC、switchport priority extend cos_valueD、mls qos trust cosE、mls qos trust override cos

You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.

You have an Exchange Server 2010 organization named contoso.com.All users configure internal and external Out Of Office messages.You need to ensure that internal Out Of Office messages are sent to senders from the fabrikam.com domain. What should you create and configure?()A、a new accepted domainB、a new Receive connectorC、a new remote domainD、a new Send connector

You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()A、Configure a HOSTS file.B、Configure a LMHOSTS file.C、Configure a WINS server database.D、Configure a DHCP server address.E、Configure at least one DNS address.

You are a database administrator for your company. The company runs a popular database-driven Web site against a SQL Server 2005 computer named SQL2. You need to ensure a quick response time and appropriate audit trail in the event that SQL2 experiences excessive traffic due to denial-of-service (DoS) attacks. Which two actions should you perform?()A、Create a new performance alert to monitor the Current Bandwidth counter.B、Create a new performance alert to monitor the Bytes Total/sec counter.C、Configure the new performance alert to start a SQL Server Profiler trace.D、Configure the new performance alert to start a Network Monitor capture.

Your company has four DNS servers that run Windows Server 2008. Each server has a static IP address. You need to prevent DHCP from assigning the addresses of the DNS servers to DHCP clients. What should you do? ()A、 Create a new scope for the DNS servers.B、 Create a reservation for the DHCP serverC、 Configure the 005 Name Servers scope optionD、 Configure an exclusion that contains the IP addresses of the four DNS servers

You have two servers that run Windows Server 2008 named Server1 and Server2. You install WSUS on both servers. You need to configure WSUS on Server1 to receive updates from Server2. What should you do on Server1? ()A、 Configure a proxy serverB、 Configure a upstream serverC、 Create a new replica groupD、 Create a new computer group

You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()A、Create a child OU within the existing domainB、Create a child domain of the existing domainC、Create a new domain in a new forest. Configure the new domain to trust the existing domainD、Create a new tree in the existing forest. Configure the new domain to trust the existing domain

You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()A、Use the Security Configuration and Analysis tool on one of the new servers to import the template file.B、Use the default Domain Security Policy console on one of the new servers to import the template file.C、Use the Group Policy Editor console to open NYServersGPO and import the template file.D、Use the default Local Security Policy console on one of the new servers to import the template file.

Your company has an Active Directory domain. You have a server named KMS1 that runs Windows Server 2008. You install and configure Key Management Service (KMS) on KMS1.  You plan to deploy Windows Server 2008 on 10 new servers. You install the first two servers. The servers fail to activate by using KMS1.  You need to activate the new servers by using the KMS server. What should you do?()A、Complete the installation of the remaining eight servers.B、Configure Windows Management Instrumentation (WMI) exceptions in Windows Firewall on the new servers.C、Install Volume Activation Management Tool (VAMT) on the KMS server and configure Multiple Activation Key (MAK) Proxy Activation.D、Install Volume Activation Management Tool (VAMT) on the KMS server and configure Multiple Activation Key (MAK) Independent Activation.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to company growth Company.com, has acquired an accepted domain named courseware.com.The employees of both domains are configured with internal and external Out Of Office messages.You have received instructions to make sure that the internal Out Of Office messages are sent to senders from the courseware.com. What should you do?()AYou should create and configure a new accepted domain.BYou should create and configure a new remote domain.CYou should create and configure a new Receive connector.DYou should create and configure a new Send connector.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The company has an office in San Diego, which is configured as a single Active Directory site. The company has 500 users. The company opens a new office in Los Angeles, which employs 50 users. A T1 line connects both offices. You configure the Los Angeles office as a single site. You create a subnet object for the Los Angeles office.  In the Los Angeles office, you install and configure a server named DC1 as a domain controller and global catalog server. You configure the Los Angeles site to use DC1 and the Los Angeles subnet object. You configure a site link that connects the site in San Diego and the site in Los Angeles.  You need to ensure that client computers in Los Angeles connect to DC1 for authentication. You also need to ensure that changes to the domain are replicated as soon as possible.  What should you do?()A Configure the interval for the site link to its minimum value.B Remove the Los Angeles site and move DC1 and the Los Angeles subnet object to the San Diego site.C Create an RPC­based connection object at each of the two sites.D Create a site link bridge between the two sites.

单选题You need to configure a new Company switch to support DTP.  Which DTP switchport mode  parameter sets the switch port to actively send and respond to DTP negotiation frames? ()A AccessB No negotiateC TrunkD Dynamic desirableE Dynamic autoF None of the other alternatives apply

多选题As the network technician at Company, you need to configure DHCP snooping on a new switch.   Which three steps are required? ()AConfigure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.BConfigure DHCP snooping globally.CConfigure the switch as a DHCP server.DConfigure DHCP snooping on an interface.EConfigure all interfaces as DHCP snooping trusted interfaces.FConfigure DHCP snooping on a VLAN or range of VLANs.

单选题Your company has a main office and plans to open a new branch office. All servers run Windows Server 2003 Service Pack 2 (SP2).You assign the network address of 192.168.1.64/26 to the new branch office. You need to configure the network settings for a server in the branch office. Which IP address should you use?()A192.168.1.10B192.168.1.63C192.168.1.125D192.168.1.200

单选题You have an Exchange Server 2010 organization named contoso.com.All users configure internal and external Out Of Office messages.You need to ensure that internal Out Of Office messages are sent to senders from the fabrikam.com domain. What should you create and configure?()Aa new accepted domainBa new Receive connectorCa new remote domainDa new Send connector

单选题Your company has an Active Directory forest that contains a single domain. The domain member   server has an Active Directory Federation Services (AD FS) server role installed.   You need to configure AD FS to ensure that AD FS tokens contain information from the Active Directory  domain.   What should you do()AAdd and configure a new account store.BAdd and configure a new account partner.CAdd and configure a new resource partner.DAdd and configure a Claims-aware application.

多选题You need to configure a new Cisco router to be installed in the Company VOIP network.  Which  three interface commands will configure the switch port to support a connected Cisco phone and  to trust the CoS values received on the port if CDP discovers that a Cisco phone is attached? ()Aswitchport voice vlan vlan-idBmls qos trust device cisco-phoneCswitchport priority extend cos_valueDmls qos trust cosEmls qos trust override cos

单选题You need to ensure the Client dimension is able to support new orders and new client records. Which setting should you configure?()AROLAP storageBLazy aggregationsCWrite Enabled propertyDUnknown Member functionality

多选题You have just purchased a new Cisco 3560 switch running the enhanced IOS and need configure  it to be installed in a high availability network. On a 3560 EMI switch,  which three types of  interfaces can be used to configure HSRP?()ASVI interfaceBAccess portCEtherChannel port channelDLoopback interfaceERouted portFBVI interface

单选题You have two servers that run Windows Server 2008 named Server1 and Server2. You install WSUS on both servers. You need to configure WSUS on Server1 to receive updates from Server2. What should you do on Server1? ()A Configure a proxy serverB Configure a upstream serverC Create a new replica groupD Create a new computer group