单选题A company has recently switched ISPs and is being assigned a new block of public addresses.  The public web and FTP servers must be re-addressed to support this change.  After changing IP addresses and updating the DNS records many customers have reported that they are not able to access the web or FTP servers.  Which of the following could have been done prior to making these changes to make it more transparent to users?()AReduce the TTL on the DHCP records.BConfigure a primary DNS server for the PTR records.CReduce the TTL on the DNS records.DConfigure a caching only DNS server.

单选题
A company has recently switched ISPs and is being assigned a new block of public addresses.  The public web and FTP servers must be re-addressed to support this change.  After changing IP addresses and updating the DNS records many customers have reported that they are not able to access the web or FTP servers.  Which of the following could have been done prior to making these changes to make it more transparent to users?()
A

Reduce the TTL on the DHCP records.

B

Configure a primary DNS server for the PTR records.

C

Reduce the TTL on the DNS records.

D

Configure a caching only DNS server.


参考解析

解析: 暂无解析

相关考题:

Mrs. Brown, who has recently been _______ general manager of our company,is one of the most capable women I have ever worked with. A. namedB. appointedC. assignedD. allocated

A company that makes Computer Assisted Design (CAD) software has, within its application, some utility classes that are used to perform 3D rendering tasks. The company‘s chief scientist has just improved the performance of one of the utility classes‘ key rendering algorithms, and has assigned a programmer to replace the old algorithm with the new algorithm. When the programmer begins researching the utility classes, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class‘s API, and replaces the old algorithm with the new algorithm, being careful that her changes adhere strictly to the class‘s API. Once testing has begun, the programmer discovers that other classes that use the class she changed are no longer working properly.What design flaw is most likely the cause of these new bugs?()A.InheritanceB.Tight couplingC.Low cohesionD.High cohesionE.Loose couplingF.Object immutability

A company has recently received a new ADSL backup Internet connection. Which of the followingwill MOST likely be used between the modem and the ISP?() A.PPPoEB.RASC.IPSecD.MSCHAP

An ISP has assigned prefix 3000:1234:5678::/48 to Company1. Which of the following terms would typically be used to describe this type of public IPv6 prefix?() A. Subnet prefixB. ISP prefixC. Global routing prefixD. Registry prefix

A programmed computer begins to show on its screen the figures you needA.to be switched onB.when switched onC.switching onD.being switche don

I don’t think it advisable that Tim( )to the job since he has no experience. A.is assigned B.will be assigned C.be assigned D.has been assigned

A company has recently switched ISPs and is being assigned a new block of public addresses.  The public web and FTP servers must be re-addressed to support this change.  After changing IP addresses and updating the DNS records many customers have reported that they are not able to access the web or FTP servers.  Which of the following could have been done prior to making these changes to make it more transparent to users?()A、Reduce the TTL on the DHCP records.B、Configure a primary DNS server for the PTR records.C、Reduce the TTL on the DNS records.D、Configure a caching only DNS server.

What is the STP root guard feature designed to prevent?()A、a root port being transitioned to the blocking stateB、a port being assigned as a root portC、a port being assigned as an alternate portD、a root port being transitioned to the forwarding state

Class C network 200.1.1.0/24 was allocated to an ISP that operated primarily in AsiA.That ISP then assigned this entire Class C network to one of its Asian customers. Network 200.1.2.0/24 has yet to be assigned to any ISP. Which of the following is most likely to be true?()A、200.1.2.0/24 could be assigned to any registrar or ISP in the worlDB、200.1.2.0/24 will be assigned in the same g eography (Asia) as 200.1.1.0/24C、200.1.2.0/24 cannot be assigned as public address spacED、Routers inside North American ISPs increase their routing table size by 1 as a result of the customer with 200.1.1.0/24 connecting to the Internet

An ISP has assigned prefix 3000:1234:5678::/48 to Company1. Which of the following terms would typically be used to describe this type of public IPv6 prefix?()A、Subnet prefixB、ISP prefixC、Global routing prefixD、Registry prefix

A company has recently received a new ADSL backup Internet connection. Which of the followingwill MOST likely be used between the modem and the ISP?()A、PPPoEB、RASC、IPSecD、MSCHAP

Company.com has ordered an 8-way p5-570 and plans to deploy four AIX 5L v5.3 LPARs. The pre-installation system design has all eight processors being placed in the shared processor pool, and four Micro-Partitions being assigned resources from the pool. Prior to the implementation of the system, the customer informs the technical specialist that one of the applications is only supported on AIX 5L 5.2. Which of the following changes to the system design should the technical specialist make to accommodate this change?()A、Create all the partitions as AIX 5.2, each having two dedicated processors.B、Purchase a system with two additional processors that can be assigned to the AIX 5.2 Partition.C、Specify an AIX 5.2 partition using dedicated processors, reducing the number of processors in the shared pool.D、Use the virtual I/O server to manage the disks and network connections removing the need for different levels of device drivers.

You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest containing a single domain named Company.com.theCompany.com organization makes use of microsoft exchange server 2010 as their messaging  solution.Company.com currently has an exchange server named -ex01 which runs microsoft windows server 2008 r2 with the exchange 2010 management tools and office outlook 2010 installed.  Company.com recently hired a new support technician named rory allen to perform management tasks on -ex01.rory allen has recently run the export-mailbox -identity deanaustin@Company.com -pstfolderpath e:/pstfiles/user2.pst command from the exchange management console and received the error message shown below:  (1)"The term ’Export-Mailbox’ is not recognized as the name of a cmdlet, function, script, or operable program.  (2)Check the spelling of the name, or if a path was included, verify that the path is correct and try again."  (3)Company.com requested that you ensure that Rory Allen is able to successfully run the command and perform his duties. What should you do?()A、You should consider having Rory Allen added to the Recipient Management security group.B、You should consider having Rory Allen added to the View-Only Organization Management security group.C、You should consider having the Mailbox Import Export role assigned to Rory Allen.D、You should consider having the Full Access permission for the mailbox of Dean Austin assigned to Rory Allen.

You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest containing a single domain named Company.com.the Company.com organization makes use of microsoft exchange server 2010 as their messaging  solution.Company.com has recently configured an exchange server named ex01 with a single mailbox database.Company.com is aware that the network users user microsoft office outlook and outlook web app.During your routine maintenance you discover that the network users are unable to restore e-mail messages from the Recover Deleted Items folder. During the course of the business week you receive instruction from Company.com to ensure that the network users are able to restore e-mail messages from the Recover Deleted Items folder. What should you do?()A、You should consider having a management role created and assigned to all users from the Exchange Management Shell.B、You should consider having a retention policy created and assigned to all users from the Exchange Management Shell.C、You should consider having the properties of the mailbox database modified from the Exchange Management Console (EMC).D、You should consider having the properties of the Mailbox server object modified from the Exchange Management Console (EMC).

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently added a distribution group named KingDistribute.During the course of the business week you receive instruction from Company.com to ensure that a user named Rory Allen is able to view and approve the messages sent to KingDistribute whilst ensuring you prevent Rory Allen from modifying the membership of KingDistribute.What should you do?()AYou should consider having the Message Tracking management role assigned to Rory Allen.BYou should consider having Rory Allen added to KingDistribute and create a new journal rule.CYou should consider having Rory Allen added to KingDistribute’s Managed by list.DYou should consider having Rory Allen assigned as a group moderator for KingDistribute.

单选题Class C network 200.1.1.0/24 was allocated to an ISP that operated primarily in AsiA.That ISP then assigned this entire Class C network to one of its Asian customers. Network 200.1.2.0/24 has yet to be assigned to any ISP. Which of the following is most likely to be true?()A200.1.2.0/24 could be assigned to any registrar or ISP in the worlDB200.1.2.0/24 will be assigned in the same g eography (Asia) as 200.1.1.0/24C200.1.2.0/24 cannot be assigned as public address spacEDRouters inside North American ISPs increase their routing table size by 1 as a result of the customer with 200.1.1.0/24 connecting to the Internet

单选题You work as a network exchange administrator at company.com.the company.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.company.com has recently added a distribution group named king distribute.during the course of the business week you receive instruction from company.com to ensure that a user named rory allen is able to view and approve the messages sent to king distribute whilst also making sure that rory allen cannot make any changes to the membership of king distribute.what should you do?()Ayou should consider having the message tracking management role assigned to rory allen.Byou should consider having rory allen added to the king distribute distribution list and create a new journal rule.Cyou should consider having rory allen added to the king distribute distribution group’s managed by list.Dyou should consider having rory allen assigned as a group moderator for the king distribute distribution group.

单选题Why has Ms. Washington only placed a small order?AHer company recently went out of business.BShe wants to judge the quality of the product.CHer warehouse does not have any more space.DShe wants to terminate the transaction with the company.

单选题A company that makes Computer Assisted Design (CAD) software has, within its application, some utilityclasses that are used to perform 3D rendering tasks. The company’s chief scientist has just improved theperformance of one of the utility classes’ key rendering algorithms, and has assigned a programmer toreplace the old algorithm with the new algorithm. When the programmer begins researching the utilityclasses, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class’s API, and replaces the old algorithm with the new algorithm, being carefulthat her changes adhere strictly to the class’s API. Once testing has begun, the programmer discovers thatother classes that use the class she changed are no longer working properly. What design flaw is mostlikely the cause of these new bugs?()AInheritanceBTight couplingCLow cohesionDHigh cohesionELoose coupling

单选题What is the STP root guard feature designed to prevent?()Aa root port being transitioned to the blocking stateBa port being assigned as a root portCa port being assigned as an alternate portDa root port being transitioned to the forwarding state

单选题Your company has 250 client computers connected to the office LAN. The company has a pool of five public IP addresses. All client computers have dynamically assigned IP addresses. You need to provide all client computers with Internet access.  What should you use?()A DHCP Relay AgentB Routing Information Protocol (RIP)C Internet Group Management Protocol (IGMP)D Network Address Translation (NAT)/Basic Firewall

多选题A company has a business application that provides its users with many different reports: receivables reports, payables reports, revenue projects, and so on.The company has just purchased some new, state-of-the-art,wireless printers, and a programmer has been assigned the task of enhancing all of the reports to use not only the company’s old printers, but the new wireless printers as well.When the programmer starts looking into the application, the programmer discovers that because of the design of the application, it is necessary to make changes to each report to support the new printers.  Which two design concepts most likely explain the situation?()AInheritanceBLow cohesionCTight couplingDHigh cohesionELoose couplingFObject immutablility

多选题A company has a business application that provides its users with many different reports: receivables reports, payables reports, revenue projects, and so on. The company has just purchased somenew, state-of-the-art, wireless printers, and a programmer has been assigned the task of enhancing all ofthe reports to use not only the company’s old printers, but the new wireless printers as well. When the programmer starts looking into the application, the programmer discovers that because of the design of theapplication, it is necessary to make changes to each report to support the new printers. Which two designconcepts most likely explain this situation? ()AInheritanceBLow cohesionCTight couplingDHigh cohesionELoose couplingFObject immutability

单选题Under the terms of ISPS Code, shipping companies are required to designate a Company Security Officer for the Company and a()for each of its ships.AShip Security OfficerBDesignated Person AshoreCInternal AuditorDPatrol Team

单选题You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently added a distribution group named KingDistribute.During the course of the business week you receive instruction from Company.com to ensure that a user named Dean Austin is able to add and remove members from KingDistribute whilst ensuring you prevent Dean Austin from modifying all other groups. What should you do?()AYou should consider having Dean Austin assigned the Distributions Groups management role.BYou should consider having Dean Austin assigned the MyDistributionsGroups management role.CYou should consider having Dean Austin added ti KingDistribute’s Managed by list.DYou should consider having Dean Austin assigned as a group moderator for KingDistribute.

单选题Static VLANs are being used on the Company network. What is true about static VLANs?()ADevices use DHCP to request their VLAN.BAttached devices are unaware of any VLANs.CDevices are assigned to VLANs based on their MAC addresses.DDevices are in the same VLAN regardless of which port they attach to.

单选题A company that makes Computer Assisted Design (CAD) software has, within its application, some utility classes that are used to perform 3D rendering tasks. The company's chief scientist has just improved the performance of one of the utility classes' key rendering algorithms, and has assigned a programmer to replace the old algorithm with the new algorithm. When the programmer begins researching the utility classes, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class's API, and replaces the old algorithm with the new algorithm, being careful that her changes adhere strictly to the class's API. Once testing has begun, the programmer discovers that other classes that use the class she changed are no longer working properly. What design flaw is most likely the cause of these new bugs?()AInheritanceBTight couplingCLow cohesionDHigh cohesionELoose couplingFObject immutability

问答题Practice 2  ● Recently your company is planning to bid for hosting an exhibition and now the manager of your company has asked you to write a letter to the organizing committee to introduce your company to them.  ● Write a letter to introduce the details about your company.  ● introducing the department structure and service,  ● introducing previous exhibitions you have hosted,  ● expressing your confidence in the success if you are permitted to host it.