单选题You are employed as a network administrator at Certkiller.com. You are in the process of creatingan Asp.Net application using Microsoft .NET Framework v3.5.  The application is hosted on a server named CERTKILLER-SR01. CERTKILLER-SR01 isconfigured to run Microsoft IIS 6.0. You receive several requests from management to set upCERTKILLER-SR01 for remote debugging. You need to make use of CERTKILLER-WS01 inorder to debug the application remotely.  What should you do?()AThis can be accomplished by attaching Microsoft Visual Studio.NET to the inetinfo.exe process.BThis can be accomplished by attaching Microsoft Visual Studio.NET to the Msvsmon.exeprocess.CThis can be accomplished by attaching Microsoft Visual Studio.NET to theWebDev.WebServer.exe process.DThis can be accomplished by attaching Microsoft Visual Studio.NET to the w3wp.exe process.

单选题
You are employed as a network administrator at Certkiller.com. You are in the process of creatingan Asp.Net application using Microsoft .NET Framework v3.5.  The application is hosted on a server named CERTKILLER-SR01. CERTKILLER-SR01 isconfigured to run Microsoft IIS 6.0. You receive several requests from management to set upCERTKILLER-SR01 for remote debugging. You need to make use of CERTKILLER-WS01 inorder to debug the application remotely.  What should you do?()
A

This can be accomplished by attaching Microsoft Visual Studio.NET to the inetinfo.exe process.

B

This can be accomplished by attaching Microsoft Visual Studio.NET to the Msvsmon.exeprocess.

C

This can be accomplished by attaching Microsoft Visual Studio.NET to theWebDev.WebServer.exe process.

D

This can be accomplished by attaching Microsoft Visual Studio.NET to the w3wp.exe process.


参考解析

解析: 暂无解析

相关考题:

You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?A. STPB. GVRPC. SNMPD. VTPE. DHCPF. None of the above

You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.

You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A./24B./26C./27D./28

You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A.14B.16C.30D.32E.62F.64

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()A、Configuration registerB、NVRAMC、Boot flashD、CMOSE、Flash

You are a network administrator and you need to implement a routing protocol on your network that provides: * Scalability * VLSM support * Minimal overhead * Support for connecting networks using routers of multiple vendors Which of the following routing protocol would best serve your needs?()A、VTPB、RIP version 1C、EIGRPD、OSPFE、IGRPF、CDP

You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()A、 Chief information officerB、 IT support staff in BostonC、 IT support staff in New YorkD、 Network administrator in ChicagoE、 Network administrator in New York

You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()A、You should assign the network 172.16.0.0/16.B、You should assign the network 172.16.0.0/17.C、You should assign the network 172.16.0.0/18.D、You should assign the network 172.16.0.0/19.E、You should assign the network 172.16.0.0/20.F、You should assign the network 172.16.0.0/22.

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A、/24B、/26C、/27D、/28

You are the administrator of ExamSheet.net's network.  ExamSheet upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings so that IP and DNS addresses are obtained automatically. When you restart the computer you cannot access the network. When you attempt toPINGaddress 127.0.0.1 you receive the following error message: "Request timed out."  You want this computer to communicate on the network. What should you do?()A、Configure IP address settings manually.B、Replace the network adapter.C、Disable TCP/IP filtering for all network adapters.D、Configure DNS server address settings manually.E、Enable IEEE 802.1x authentication.

You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B、Start the RunAs service and configure the service to start automatically.C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D、Use Scheduled Tasks to configure the task to run under the security context of your account.

Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.

You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.

You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for managing a mailbox server named -ex02.all users within the organization make use of microsoft office outlook 2010 to connect to the exchange organization.you receive an instruction to determine the latency of user connections to-ex02. What should you do?()A、You should consider running the Test-OutlookConnectivity cmdlet.B、You should consider running the Exchange Best Practices Analyzer.C、You should consider running the Test-OutlookWebServices cmdlet.D、You should consider running the Message Tracking Performance tool.

You are employed as the enterprise exchange administrator at Company.com..com makes use of Microsoft exchange server 2010 messaging solution.you are responsible for managing the exchange network for Company.com.you are experiencing various problems in the exchange environment.you decide to determine whether one of the other administrators executed any configuration changes in the organization.What should you do?()A、You should consider running Exchange Best Practices Analyzer.B、You should consider running Microsoft Baseline Security Analyzer (MBSA).C、You should consider running the Get-ExchangeServer cmdlet.D、You should consider running the Get-EventLogLevel cmdlet.

多选题You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()AConfiguration registerBNVRAMCBoot flashDCMOSEFlash

单选题You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A/24B/26C/27D/28

单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP

单选题You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()A Chief information officerB IT support staff in BostonC IT support staff in New YorkD Network administrator in ChicagoE Network administrator in New York

单选题You are employed as the enterprise exchange administrator at Company.com..com makes use of Microsoft exchange server 2010 messaging solution.you are responsible for managing the exchange network for Company.com.you are experiencing various problems in the exchange environment.you decide to determine whether one of the other administrators executed any configuration changes in the organization.What should you do?()AYou should consider running Exchange Best Practices Analyzer.BYou should consider running Microsoft Baseline Security Analyzer (MBSA).CYou should consider running the Get-ExchangeServer cmdlet.DYou should consider running the Get-EventLogLevel cmdlet.

单选题You are the network administrator for . You are the administrator of a Windows Server 2003 computer named TestKing8. You log on to TestKing8 and attempt to access the network. You discover that the server is not communicationg on the network. You discover that a service pack and an updated network adapter driver were installed on TestKing8 the previous night. A complete backup, including the System State data, was performed before the service pack and the driver were installed. You need to restore network communications. What should you do first?()AUse Roll Back Driver to reinstall the previous driver for the network adapter.BUse the Backp or Restore Wizard to restore the backup from the previous night.CRestart TestKing8 by using Last Known Good Configuration option.DUse the Registry Editor to delete the registry settings for the network adapter driver.

单选题You are a network administrator and you need to implement a routing protocol on your network that provides: * Scalability * VLSM support * Minimal overhead * Support for connecting networks using routers of multiple vendors Which of the following routing protocol would best serve your needs?()AVTPBRIP version 1CEIGRPDOSPFEIGRPFCDP

单选题Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()AYou should consider configuring the sender reputation.BYou should consider configuring the sender filtering.CYou should consider configuring the content filtering.DYou should consider configuring the recipient filtering.

单选题You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()AEnable Internet Connection SharingBEnable on-demand dialingCEnable sharing a modem on one computer on the networkDConfigure a DHCP ServerEDisable Internet Connection Sharing

单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.