单选题You administer Company's network that consists of 20 Windows 2000 Professional computers configured with default networking settings. Company can not for the moment afford a permanent Internet connection for the network so you do have a single dial-up account to a local Internet Service Provider (ISP). A client computer named Company1 has a 56-Kbps modem installed. You configure a dial-up connection to the ISP on Company1. You want all of the computers to be able to access the Internet when Web resources are requested. What should you do? ()AConfigure the dial-up connection to enable Internet Connection Sharing and on-demand dialing.BConfigure the dial-up connection to enable Internet Connection Sharing and disable on-demand dialingCConfigure the dial-up connection to disable Internet Connection Sharing and enable on-demand dialing.DConfigure the dial-up connection to disable Internet Connection Sharing and on-demand dialing
单选题
You administer Company's network that consists of 20 Windows 2000 Professional computers configured with default networking settings. Company can not for the moment afford a permanent Internet connection for the network so you do have a single dial-up account to a local Internet Service Provider (ISP). A client computer named Company1 has a 56-Kbps modem installed. You configure a dial-up connection to the ISP on Company1. You want all of the computers to be able to access the Internet when Web resources are requested. What should you do? ()
A
Configure the dial-up connection to enable Internet Connection Sharing and on-demand dialing.
B
Configure the dial-up connection to enable Internet Connection Sharing and disable on-demand dialing
C
Configure the dial-up connection to disable Internet Connection Sharing and enable on-demand dialing.
D
Configure the dial-up connection to disable Internet Connection Sharing and on-demand dialing
参考解析
解析:
暂无解析
相关考题:
You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.What should you do?A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.C.Create a Windows 2000 Group Policy that denies user access to My Network Places.D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.
You administer your company‘s network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the applicatin.What should you do?()A.AB.BC.CD.D
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()A、You should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.B、You should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.C、You should consider having the new server joined to an Active Directory domain.D、You should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.
You are the network administrator for Company. Company’s network consists of 200 Windows 2000 Professional computers. CompanyW1 is a Windows 2000 Server computer that hosts Company’s intranet site. CompanyP1 is a computer running Microsoft Proxy Server that is used by all computers on the network to access the Internet. You discover that CompanyP1 is experiencing performance degradation due to large number of requests to authenticate with the proxy server. You want to minimize the number of authentication requests to the proxy server. What should you do on each computer?()A、Configure the proxy server settings to have a Secure proxy address of CompanyP1.B、Configure the proxy server settings to bypass the proxy server for local addresses.C、Add CompanyW1 to the Local intranet zone.D、Add the CompanyW1 to the list of trusted sites.
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()A、The Connection should be set to Host for the network interface card.B、The Connection should be set to None for the network interface card.C、You should choose the Not connected option for each virtual machine.D、The Enable virtual LAN identification option should be enabled for each virtual machine.
You administer Company's network that consists of 20 Windows 2000 Professional computers configured with default networking settings. Company can not for the moment afford a permanent Internet connection for the network so you do have a single dial-up account to a local Internet Service Provider (ISP). A client computer named Company1 has a 56-Kbps modem installed. You configure a dial-up connection to the ISP on Company1. You want all of the computers to be able to access the Internet when Web resources are requested. What should you do? ()A、Configure the dial-up connection to enable Internet Connection Sharing and on-demand dialing.B、Configure the dial-up connection to enable Internet Connection Sharing and disable on-demand dialingC、Configure the dial-up connection to disable Internet Connection Sharing and enable on-demand dialing.D、Configure the dial-up connection to disable Internet Connection Sharing and on-demand dialing
ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU. You need to verify that users are connecting to the two servers by using encrypted connections. What should you do?()A、Run the net view command.B、Run the gpresult command.C、Use the IP Security Monitor console.D、Use the IPSec Policy Management console.
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster. What should you do? ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.During the course of the business week you receive instruction from Company.com to install Microsoft Exchange Server 2010 using the installation media. What should you do?()A、You should consider having the adprep.exe //forestprep command run from the Microsoft Windows Server 2008 installation media.B、You should consider having the adprep.exe /domainprep command run from the Microsoft Windows Server 2008 installation media.C、You should consider having the setup /ps command run from the Microsoft Exchange Server 2010 installation media.D、You should consider having the setup /NewProvisionedServer command from the Microsoft Exchange Server 2010 installation media.
You are the desktop administrator for one of your company's branch offices. The network in the branch office consists of a single network segment, which contains a domain controller, a DHCP server, 10 Windows 2000 Server computers, and 50 Windows 2000 Professional computers. All servers and client computers are members of the company's Active Directory domain. You purchase 50 new client computers for the branch office. Each new client computer contains a built-in PXE-compliant network adapter. You install and configure RIS on one of the Windows 2000 Server computers that is on the network in the branch office. You create a Windows XP Professional RIS image on the Windows 2000 Server computer. You connect the new client computers to the network in the office, and you turn on each computer. Each computer displays a message stating that it cannot contact a PXE boot server. You verify that the RIS server is connected to the network. You need to ensure that the new client computers can connect to the RIS server and can begin installing Windows XP Professional. What should you do?()A、Ask a domain administrator to authorize the RIS server. B、Grant the Everyone group Allow - Read NTFS permission on the RIS image.C、Install RIS on the domain controller. Copy the RIS image to the domain controller.D、Add a reservation for the RIS server to the DHCP server.
You are the administrator of WXYZ.com Incorporation. Your company’s network consists of Windows 2000 Professional clients and Windows 2000 Servers. Users have started reporting that the network performance has degraded in recent times. Most of the Windows 2000 Professional clients on your network use the TCP/IP protocol to communicate with the Server. You want to increase network performance. Where do you change the binding order?()A、Windows 2000 Server Network Binding Server TCP/IP on the top.B、Windows 2000 Server Network Binding Workstation TCP/IP on the top.C、Windows 2000 Professional Network Binding Server TCP/IP on the top.D、Windows 2000 Professional Network Binding Server TCP/IP on the bottom.E、Windows 2000 Professional Network Binding Workstation TCP/IP on the top.F、Windows 2000 Professional Network Binding Workstation TCP/IP on thebottom.
You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer. Which command should you run from the command prompt on the user’s computer?()A、netshB、netdiagC、ktpassD、ksetup
The network at Company Ltd. consists of one Windows NT Server 4.0 domain and 35 Windows 2000Professional computers. The Company network consists of five interconnected TCP/IP subnets. All of thecomputers use TCP/IP as the only network protocol.You are adding 15 Windows 2000 Professional computers to the network. You want to enable theWindows 2000 Professional computers to resolve NetBIOS names to TCP/IP addresses.What should you do? ()A、Install a DHCP server. Configure each computer to use DHCP. B、Install a WINS server. Configure each computer to use WINS. C、Create a Lmhosts.sam file on each computer. Add an entry containing the TCP/IP address and NetBIOS name for each computer on the network. D、Create a Hosts.sam file on each computer. Add an entry containing the TCP/IP address and NetBIOS name for each computer on the network.
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are four Terminal Servers that run Windows Server 2008. The TerminalServers are respectively named S01, S02, S03, and S04. You have the Terminal Server Session Brokerrole service installed on S01. You have to configure load balancing for the four Terminal Servers. Now youreceive an order from the company management. According to the company requirement, you must makesure that S02 is the preferred server for Terminal Services sessions. Which tool should you choose to use?()A、You should choose to use TS Gateway ManagerB、You should choose to use Terminal Services ManagerC、You should choose to use Group Policy ManagementD、You should choose to use Terminal Services Configuration
You administer Company's network that consists of 100 Windows 2000 Professional computers and nine Windows 2000 Server computers. All users at Company save their work files in home folders on a network server. The network server is configured with two NTFS volumes. One of the NTFS volumes contains the home folders for the users at Company and the other NTFS volume contains a shared folder named PROGRESS, which is used for users to save temporary work files in. Disk quotas and Encrypting File System (EFS) is enabled on the NTFS volume with the home folders. All users have a default limit of 100 MB and the option to deny space to users who exceed their limit has been enabled. A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder. The user currently has no data stored in the PROGRESS folder. When he attempts to save files to his home folder, he receives the following error message: "Insufficient disk space." Other users are not experiencing this problem with their home folders. You want to allow the user to save files on the network server. What should you do?()A、 Use Windows Backup to archive and remove old files on the server.B、 Compress the files in the user’s home folder to allow additional files to be saved.C、 Move some of the files from the user’s home folder to the PROGRESS share folder.D、 Log on the network as a Recovery Agent. Decrypt all of the user’s files in his home folder. E、 Lon on to the network by using the domain Administrator account. Grant the user Full Control permission to his home folder.
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.
You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest containing a single domain named Company.com.the Company.com organization makes use of microsoft exchange server 2010 as their messaging solution.Company.com has recently deployed a computer named -ex01 which has the client access, hub transport and mailbox server roles installed.during the course of the business week you receive instruction from Company.com to ensure that the network users are able to send and receive e-mail using windows live mail or microsoft office outlook express. What should you do?()A、You should consider having the properties of the MSExchangePOP3 (TCP-in) Windows Firewall rule modified.B、You should consider having the properties of the MSExchangeMailSubmission -RPC (TCP-in) Windows Firewall rule modified.C、You should consider having the SMTP server feature installed and configured.D、You should consider having the Microsoft Exchange POP3 service started.You should then have the startup type set to Automatic.
You are the administrator of Etechsol.com Enterprises. Your company consists of a small 20-user network. Management has decided to upgrade all computers to Windows 2000. After having a closer examination of your company’s network, you realize that only half of the network interface cards are Net PC compliant. You decide to create Windows 2000 remote boot floppies. What executable is used for creating RIS boot disks for non-PXE compliant clients?()A、RBFG*EXEB、RIPREP*EXEC、RIS*EXED、RISPXE*EXEE、RISBOO*EXE
多选题You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network. What should you do?()AConfigure a DNS suffix.BConfigure a subnet mask.CConfigure an LMHOSTS file.DConfigure an Interface metric.EConfigure at least one DNS address.
单选题You are the network administrator for Company. Your network consists of one Windows NT Server 4.0 domain and 35 Windows 2000 Professional computers. The network consists of five interconnected TCP/IP subnets. All of the computers use TCP/IP as the only network protocol. You are adding 15 Windows 2000 Professional computers to the network. You configure each of the new computers to use DHCP. The computers can communicate with each other but are unable to communicate outside their own subnet. You run the ipconfig command to examine the UP address on one of the new computers. The IP address is 169.254.101.72 You want to enable the Windows 2000 Professional computers to communicate outside their own subnet. What should you do?()AInstall a DHCP server.BInstall a WINS server. Configure each computer to use WINS.CCreate an Lmhost file on each computer.DCreate a Hosts file on each computer.
单选题You are the administrator of WXYZ.com Incorporation. Your company’s network consists of Windows 2000 Professional clients and Windows 2000 Servers. Users have started reporting that the network performance has degraded in recent times. Most of the Windows 2000 Professional clients on your network use the TCP/IP protocol to communicate with the Server. You want to increase network performance. Where do you change the binding order?()AWindows 2000 Server Network Binding Server TCP/IP on the top.BWindows 2000 Server Network Binding Workstation TCP/IP on the top.CWindows 2000 Professional Network Binding Server TCP/IP on the top.DWindows 2000 Professional Network Binding Server TCP/IP on the bottom.EWindows 2000 Professional Network Binding Workstation TCP/IP on the top.FWindows 2000 Professional Network Binding Workstation TCP/IP on thebottom.
单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()AmsiBmstCzapDzip
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address. What should you do?()ACreate an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.BCreate a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.CCreate an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.DCreate a Pattern Match capture trigger for the 131.107.0.1 IP address.
多选题You are the administrator of your company’s network. Your network consists of 20 Windows 2000 Professional computers. You want to configure all of the computers to allow access to the Internet. Your Budget does not allow for installing a permanent Internet connection for the network. You do have a single dial-up account at a local Internet service provider (ISP) and a 56-Kbps modem. You want the computer to be able to access the Internet when web resources are requested. What should you do?()AConfigure the shared modem to use software handshakingBConfigure the dial-up connection to enable on-demand dialing.CConfigure the dial-up connection to enable the Internet connection sharing.DConfigure all the other computers to have a dial-up connection that uses the shared modem.EAttach the modem to one of the Windows 2000 Professional computer, and create a dial-up connection to the ISP.FAttach the modem to one of the Windows 2000 Professional computers, and share the modem on the network.
单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network shareDUse the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()AThe Connection should be set to Host for the network interface card.BThe Connection should be set to None for the network interface card.CYou should choose the Not connected option for each virtual machine.DThe Enable virtual LAN identification option should be enabled for each virtual machine.
多选题You are the administrator of Company.com’s Windows 2000 Network. Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer. You want to complete the configuration to allow the computers to communicate on the network. What should you do?()AConfigure a HOSTS file.BConfigure a LMHOSTS file.CConfigure a WINS server database.DConfigure a DHCP server address.EConfigure at least one DNS address.