单选题You need to configure two Company routers for high availability.  Which protocol enables a group  of routers to form a single virtual router and use the real IP address of a router as the gateway  address? ()A HSRPB IRDPC Proxy ARPD GLBPE VRRPF None of the other alternatives apply

单选题
You need to configure two Company routers for high availability.  Which protocol enables a group  of routers to form a single virtual router and use the real IP address of a router as the gateway  address? ()
A

 HSRP

B

 IRDP

C

 Proxy ARP

D

 GLBP

E

 VRRP

F

 None of the other alternatives apply


参考解析

解析: 暂无解析

相关考题:

You are the administrator of two Microsoft Windows 2000 advanced server computers. On these servers, you are configuring a database that will store accounting information for your company.The data must be available at all times. Interruptions in data connectivity should not last longer than five minutes. Any changes to the database should not require you to reconfigure the client computers.How should you configure the database?A.Configure the database on the two servers as a SQL Server 2000 cluster.B.Configure the database on one server, and then configure a standby database on the second server.C.Configure the database on each server. Use Microsoft Distributed Transaction Coordinator to keep the two servers perfectly synchronized.D.Configure the database as a federated database, and then partition half the data on each server.

You need to configure a new computer to dual-boot to the following operating systems:·Microsoft Windows XP Professional·Microsoft Windows VistaWhich two procedures should you perform?() A.AB.BC.CD.D

You are a database administrator for your company. The company has two SQL Server 2005 computers named SQL1 and SQL2. SQL1 is located on the local network. SQL2 is located at a vendors site and is connected by using a VPN over the Internet. You need to write heterogeneous queries on SQL1 that access data from both SQL1 and SQL2. To ensure that your queries are functional, you must configure access to the vendors site. What should you do?()A、Configure an HTTP endpoint for SQL2 on SQL1.B、Configure SQL2 as a linked server on SQL1.C、Configure an HTTP endpoint for SQL1 on SQL2.D、Configure SQL1 as a linked server on SQL2.

Which two statements are true about the relationship between static NAT and proxy ARP? ()(Choose two.)A、It is necessary to forward ARP requests to remote hosts.B、It is necessary when translated traffic belongs to the same subnet as the ingress interface.C、It is not automatic and you must configure it.D、It is enabled by default and you do not need to configure it.

You are the systems engineer for your company. The network consists of three physical networks connected by hardware-based routers. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.   Each physical network contains at least one domain controller and at least one DNS server. One physical network contains a Microsoft Internet Security and Acceleration (ISA) Server array that provides Internet access for the entire company. The network also contains a certificate server.   Company management wants to ensure that all data is encrypted on the network and that all computers transmitting data on the network are authenticated.   You decide to implement IPSec on all computers on the network. You edit the Default Domain Policy Group Policy object (GPO) to apply the Secure Server (Require Security) IPSec policy.   Users immediately report that they cannot access resources located in remote networks. You investigate and discover that all packets are being dropped by the routers. You also discover that Active Directory replication is not functioning between domain controllers in different networks.   You need to revise your design and implementation to allow computers to communicate across the entire network. You also need to ensure that the authentication keys are stored encrypted.   Which two actions should you take?()A、 Configure the routers to use IPSec and a preshared key for authentication.B、 Configure the routers to use IPSec and a certificate for authentication.C、 Configure the routers to use IPSec and Kerberos for authenticationD、 Reconfigure the GPOs to require a preshared key for IPSec authentication.E、 Reconfigure the GPOs to require a certificate for IPSec authentication.

You need to configure two Company routers for high availability.  Which protocol enables a group  of routers to form a single virtual router and use the real IP address of a router as the gateway  address? ()A、 HSRPB、 IRDPC、 Proxy ARPD、 GLBPE、 VRRPF、 None of the other alternatives apply

As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()A、An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.B、The counters were deleted.C、The ARP cache was removed.D、The IP EIGRP neighbor relationship was cleared manually.

Which option must you choose to configure Node Manager on a machine (server or zone)?()A、Configure one Node Manager per domain (for example, if there are two domains on one  machine, then you will need to configure two Node Managers).B、Configure one Node Manager per machine with any number of WebLogic instances running on it.C、Configure one Node Manager per machine for all WebLogic, OHS, and OEM running on the  same machine.D、Configure one Node Manager for every WebLogic instance.E、Configure two or more Node Managers for every WebLogic instance.

You need to recommend a strategy for the file servers that meets the company’s technical requirements.   What should you recommend?()A、Implement active file screens.B、Implement passive file screens.C、Configure classification rules.D、Configure File Server Resource Manager (FSRM) quotas.

Your company has a single Active Directory forest that has six domains.All DNS servers in the forest run Windows Server 2008 R2.You need to ensure that all public DNS queries are channeled through a single-caching-only DNS server.Which two actions should you perform?()A、Disable the root hints.B、Enable BIND secondaries.C、Configure a forwarder to the caching DNS server.D、Configure a GlobalNames host (A) record for the hostname of the caching DNS server.

You are a database administrator for your company. The company runs a popular database-driven Web site against a SQL Server 2005 computer named SQL2. You need to ensure a quick response time and appropriate audit trail in the event that SQL2 experiences excessive traffic due to denial-of-service (DoS) attacks. Which two actions should you perform?()A、Create a new performance alert to monitor the Current Bandwidth counter.B、Create a new performance alert to monitor the Bytes Total/sec counter.C、Configure the new performance alert to start a SQL Server Profiler trace.D、Configure the new performance alert to start a Network Monitor capture.

You have two servers that run Windows Server 2008 named Server1 and Server2. You install WSUS on both servers. You need to configure WSUS on Server1 to receive updates from Server2. What should you do on Server1? ()A、 Configure a proxy serverB、 Configure a upstream serverC、 Create a new replica groupD、 Create a new computer group

You have an Exchange Server 2010 organization for a company named Contoso, Ltd. Contoso has the following security policy:  .Messages that contain the word budget cannot be sent to external recipients .Messages that contain the name Northwind Traders must be sent to the legal department automaticallyYou need to recommend a solution to meet the security policy.  What should you recommend?()A、Create two transport rules.B、Create two message classifications.C、Create one transport rule and configure a legal hold.D、Create one message classification and configure a legal hold.

You need to configure the power settings of your portable computer so that the display turns off when it is inactive and running on battery power. You also need to ensure that the power settings of the hard disk remain unaffected.  What should you do?()A、Change the advanced power settings of the Balanced power plan.B、Configure the portable computer to use the Power saver power plan.C、Configure the portable computer to use the High performance power plan.D、Restore the Power Saver power plan to the default settings.

Your company has an organizational unit named Production. The Production organizational unit has achild organizational unit named RD. You create a GPO named Software Deployment and link it to the  Production organizational unit. You create a shadow group for the RD organizational unit.   You need to deploy an application to users in the Production organizational unit.  You also need to ensure  that the application is not deployed to users in the RD organizational unit.    What are two possible ways to achieve this goal()A、Configure the Enforce setting on the software deployment GPO.B、Configure the Block Inheritance setting on the RD organizational unit.C、Configure the Block Inheritance setting on the Production organizational unit.D、Configure security filtering on the Software Deployment GPO to Deny Apply group policy for the RD  security group.

You need to recommend the server configurations for the new failover cluster. The configurations must support the company's planned changes    Which two actions should you recommend?()A、From Hyper-V Manager on each node, configure one virtual network.B、From Hyper-V Manager on one node, configure two virtual networks.C、Install one network adapter on each node. Configure the network adapters to use multiple IP ddresses.D、Install two network adapters on each node. Configure the network adapters to communicate on  separate subnets.

You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()A、Configure a Client Access server array.B、Deploy a second ISA server and create an ISA server array.C、Implement Windows Network Load Balancing for the Client Access servers.D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

Your company has a single Active Directory forest that has six domains. All DNS servers in the forest run Windows Server 2008. You need to ensure that all public DNS quieries are channeled through a singlecahing- only DNS server. Which two actions should you perform?() A、Disable the root hintsB、Enable BIND secondariesC、Configure a forwarder to the caching DNS serverD、Configure a GlobalNames host (A) record for the hostname of the caching DNS server

You are a network administrator for your company. The network consists of a single Active Directory domain. All domain controllers and member servers run Windows Server 2003, Enterprise Edition. All client computers run Windows XP Professional.   The company has one main office and one branch office. The two offices are connected by a T1 WAN connection. There is a hardware router at each end of the connection. The main office contains 10,000 client computers, and the branch office contains 5,000 client computers.   You need to use DHCP to provide IP addresses to the Windows XP Professional computers in both offices. You need to minimize network configuration traffic on the WAN connection. Your solution needs to prevent any component involved in the DHCP architecture from becoming a single point of failure.   What should you do?  ()A、 At the main office, configure two Windows Server 2003 computers as a DHCP server cluster. Configure the branch office router as a DHCP relay agent.B、 At the main office, configure two Windows Server 2003 computers as a DHCP server cluster. At the branch office, configure a Windows Server 2003 computer as a DHCP relay agent.C、 At the main office, configure two Windows Server 2003 computers as a DHCP server cluster. At the branch office, configure two Windows Server 2003 computers as a DHCP server cluster.D、 At the main office, configure two Windows Server 2003 computers as DHCP servers. Configure one DHCP server to handle 80 percent of the IP address scope and the other DHCP server to handle 20 percent. Configure the branch office router as a DHCP relay agent.

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? () A、You should configure SQL Server VSS Writer B、You should configure Distributed File System C、You should configure SQL Server D、You should configure SQL Server Full Text

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The company has an office in San Diego, which is configured as a single Active Directory site. The company has 500 users. The company opens a new office in Los Angeles, which employs 50 users. A T1 line connects both offices. You configure the Los Angeles office as a single site. You create a subnet object for the Los Angeles office.  In the Los Angeles office, you install and configure a server named DC1 as a domain controller and global catalog server. You configure the Los Angeles site to use DC1 and the Los Angeles subnet object. You configure a site link that connects the site in San Diego and the site in Los Angeles.  You need to ensure that client computers in Los Angeles connect to DC1 for authentication. You also need to ensure that changes to the domain are replicated as soon as possible.  What should you do?()A Configure the interval for the site link to its minimum value.B Remove the Los Angeles site and move DC1 and the Los Angeles subnet object to the San Diego site.C Create an RPC­based connection object at each of the two sites.D Create a site link bridge between the two sites.

单选题You need to configure two Company routers for high availability.  Which protocol enables a group  of routers to form a single virtual router and use the real IP address of a router as the gateway  address? ()A HSRPB IRDPC Proxy ARPD GLBPE VRRPF None of the other alternatives apply

多选题Your company has a server named Server1 that runs Windows Server 2008 and Microsoft Hyper-V. Server1 hosts three virtual machines.  Company policy states that the virtual machines must not connect to the company network.  You need to configure all of the virtual machines to connect to each other. You must meet the company policy.  Which two actions should you perform?()ASelect the Not connected option for each virtual machine.BEnable the Enable virtual LAN identification option for each virtual machine.CSet the Connection to Host for the network interface card.DSet the Connection to None for the network interface card.

多选题As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()AAn update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.BThe counters were deleted.CThe ARP cache was removed.DThe IP EIGRP neighbor relationship was cleared manually.

单选题You are the network administrator for your company. The network contains an application server running Windows Server 2003.   Users report that the application server intermittently responds slowly. When the application server is responding slowly, requests that normally take 1 second to complete take more than 30 seconds to complete. You suspect that the slow server response is because of high broadcast traffic on the network.   You need to plan how to monitor the application server and to have a message generated when broadcast traffic is high. You also want to minimize the creation of false alarms when nonbroadcast traffic is high.   What should you do?  ()A Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the UDPv4 object is high.B Use System Monitor and configure it to monitor the Segments/sec counter in the TCPv4 object.  C Use System Monitor and configure it to monitor the Datagrams/sec counter in the UDPv4 object.D Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the TCPv4 object is high.

多选题You need to configure connectors between each routing group. What are two possible ways to achieve this goal?()ACreate and configure SMTP connectors between the routing groups. Do not create additional connectors between the routing groupsBCreate and configure routing group connectors between the routing groups. Do not create additional connectors between routing groupsCCreate and configure low-cost group connectors and high-cost SMTP connectors between the routing groupsDCreate and configure high-cost routing group connectors and low-cost SMTP connectors between the routing groups

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? ()AYou should configure SQL Server VSS Writer BYou should configure Distributed File System CYou should configure SQL Server DYou should configure SQL Server Full Text