单选题You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A14B16C30D32E62F64

单选题
You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()
A

14

B

16

C

30

D

32

E

62

F

64


参考解析

解析: 暂无解析

相关考题:

You are the network administrator for TestKing. The network contains a WindowsServer 2003 computer named testking1, which hosts a critical business applicationnamed Salesapp. Testking1 has one disk that contains a single NTFS volume.Five days ago, the System State of testking1 was backed up, and an AutomatedSystem Recovery (ASR) backup was created. No additional backups wereperformed. Subsequently, many changes were made to the Salesapp data files.You apply an update to the application, which requires you to restart testking1.Windows startup terminates with a Stop error. You restart the computer and bootto a floppy disk. A utility on this disk gives you read-only access to the NTFS filesystem. You discover that one of the .dll files for the Salesapp application iscorrupted. The corrupted file is stored in the C.\Windows\System32 folder.You need to restore the corrupted file. You need to avoid losing any changes madeto the data files on testking1.What should you do onTestKing1?()

You are the network administrator for TestKing. Your network consists of a singleActive Directory domain. You manage a Terminal Server farm that includes fiveterminal servers and a Terminal Services Licensing server named testking9. Allservers run Windows 2000 Server. There are 2,500 users who log on to the terminalservers to access a custom human resource (HR) application.You install Windows Server 2003 on a new server named testking10. Testking10 isconfigured with all default settings enabled. You install Terminal Services and theHR application on testking10. You instruct some users to access the HR applicationon testking10.Four months later, users report that they can no longer establish Terminal Servicessessions to testking10. You verify that users can connect to the other terminalservers in your Terminal Server farm.You need to ensure that users can run the HR application on all terminal servers onthe network.What should you do?()

You are the network administrator for TestKing. All network servers run Windows Server 2003.A server named TestKing18 functions as a domain controller. You back up TestKing18 and generate a detailed backup log.You need to view the full backup log.What should you do?()A. Run the ntbackup command with the /L option.B. Run the ntbackup command with the /F option.C. Open the Backup utility. On the Tools menu, click Report.D. Open Event Viewer. In the application log, view Ntbackup events

You are a network administrator at TestKing, Inc. and you‘re getting complaintsthat users on the TestKing2 Ethernet network can‘t access the TestKing1 site. Totroubleshoot this, you begin by looking at the Testking1 and Testking2 routerconfigurations as shown below:Based on the above output, what is the underlying cause of this problem?()A. Link state routing protocol is missing.B. Incorrectly configured IP addressesC. IGRP is incorrectly configured.D. Frame relay is not configured.E. None of the above

You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?() A. Configuration registerB. NVRAMC. Boot flashD. CMOSE. Flash

You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts.Which network mask should you use?()A.255.255.255.192B.255.255.255.224C.255.255.255.240D.255.255.255.248E.255.255.255.252F.255.255.255.254

You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A.14B.16C.30D.32E.62F.64

You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A、14B、16C、30D、32E、62F、64

You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()A、Configuration registerB、NVRAMC、Boot flashD、CMOSE、Flash

You are the network administrator for TestKing. All servers run Windows 2003. All client computers run Windows XP Professional. You log on to a server named Testking15 by using the local Administrator account. You start the installation of a new server application. After you start the installation, you return to your office, which is located in another building. You need to find out the status of the installation that is in progress on Testking15. What should you do?()A、Select the Remember server connections option in Terminal Service Manager.B、Use Terminal Service Manager to connect to Testking15.C、Use Remote Assistance from a client computer.D、Use the Remote Desktop Client to connect to the console session on Testking15

You are the network administrator for TestKing. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. Half of the client computers run Windows XP Professional, and the other half run Windows NT 4.0 Workstation. You install Terminal Services on three member servers named Testking1, Testking2, and Testking3. Each server has a single Pentium III 600-Mhz CPU with 512 MB of RAM and a single-channel EIDE disk subsystem. You place all three terminal servers in an organizational unit (OU) named Terminal Server. You link a Group Policy Object (GPO) to the Terminal Server OU. Several days after the installation, users report that the performance of all three terminal servers is unacceptably slow. You discover that each server has at least 50 active sessions at once. You need to improve the performance of all three terminal servers. You must achieve this goal by using the minimum amount of administrative effort, without upgrading any hardware. What should you do?()A、Log on to the console of each terminal server. In the RDP-Tcp connection properties, set the Maximum connections option to 35.B、Edit the GPO to set the Limit number of connections policy to 35.C、Modify all domain user accounts to set the When a session limit is reached or broken user property to End session.D、Edit the GPO to enable the Remove Disconnected option from shutdown dialog policy

You are the network administrator for TestKing. All network servers run Windows Server 2003. You administer a server named TestKing76. You need to configure TestKing76 to function as a streaming media server for TestKing.com's content team. The content team wants TestKing76 to provide the fastest performance and the most available space possible. Redundancy is not import. TestKing76 currently has three identical, unpartitioned hard disks available. You need to configure the disks to meet the content team's requirements. What should you do?()A、Create a simple volume on disk and then expand it to the other two disks.B、Create a mirrored volume that uses two of the disks.C、Create a RAID-5 volume that uses all three disks.D、Create a striped volume that uses all three disks.

You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)A、The security update in the synchronization log.B、The security update in the approval log.C、The status of Internet Explorer 5.5x in the Monitor Server window.D、The status of Internet Explorer 6.x in the Monitor Server window.

You are the network administrator for . The network consists of asingle Active Directory domain named. All network servers run Windows Server 2003. Terminal Services is installed on your network. You currently use a terminal server farm. Testking1, the first server in the farm, acts as the session directory server. All terminal servers are operating at maximum capacity. An increasing number of users report slow response times when they use these servers. You need to improve the performance of the terminal server farm. You plan to use a server named Testking4, which has hardware identical to that of the other terminal servers in the farm. First, you add Tesking4 to the Session Directory Computers group on Testking1. What should you do next?()A、Add Testking4 to the Session Directory Computers group on the PDC emulator.B、On Testking4, select the Terminal Services configuration option to join the existing session directory.C、On Testking4, install the Session Directory service.D、On Testking4, create a new session directory server.

You are a network administrator for All servers run Windows Server 2003. A server named Testking6 runs an application named App1. Testking6 has one network adapter installed. App1 uses a large amount of network bandwidth per client connection. You suspect the network connection on Testking6 is running out of available network capacity. You need to view how much total network bandwidth is being used on Testking6. What are two possible ways to achieve this goal?() (Each correct answer presents a complete solution. Choose two)A、Use System Monitor to configure the Network Interface object.B、Run the netstat command.C、In Task Manager, monitor the Networking tab.D、Use Network Monitor to configure a capture filter for the local area connection.

You are the network administrator for TestKing. The network consists of a single Active Directory domain. All network servers run Windows Server 2003 and all client computers run Windows XP Professional. Terminal Services is installed on a member server named Testking1. Currently, 30 active terminal server sessions are connected to Testking1. An unforeseen hardware upgrade will require shutting down the server. You need to provide a two-minute warning about the shutdown to all active terminal sessions. First, you log on to Testking1 as an administrator. What should you do next?()A、From a command prompt, run the tsdisconn command.B、From a command prompt, run the net send /users command to send a warning message. After two minutes, manually shut down Testking1.C、From a command prompt, run the tsshutdn 120 /server:Testking1 command.D、Run Tsadmin.exe to disconnect all active sessions. After two minutes, manually shut down Testking1.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you arelocated. The TestKing.com network contains a Hub Transport server that has anti-spam agents installed. Youreceive instruction from management to assign the administration of the Exchange 201 organization to agroup named KingSecruity. To ensure productivity you need to make sure that users belonging to thisgroup are able to manage anti-spam setting in the organization. You should thus ensure that your solutionreduces the number of permissions that are assigned to KingSecurity. What should you do?()A、You should consider assigning the Organization Management role group.B、You should consider assigning the Server Management role group.C、You should consider assigning the Hygiene Management role group.D、You should consider assigning the Records Management role group.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()A、You should recommend that management make use of DAG network encryption.B、You should recommend that management make use of Encrypted File System (EFS)C、You should recommend that management make use of Windows BitLocker Drive Encryption.D、You should recommend that management make use of Rights Management Service RMS.

多选题You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()AConfiguration registerBNVRAMCBoot flashDCMOSEFlash

单选题You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Testking32 contains a folder that is shared as ManagerData$. A global group named AllManagers has permission to access the shared folder. A user reports that he needs access to the ManagerData$ shared folder. You add his user account to the All Managers global group. When the user attempts to connect to the shared folder by typing //Testking32/ManagerData$/ , he receives the following error message: "//Testking32/ManagerData$/ is not accessible. You might not have permissions to use the network resource. Contact the administrator of this server to find out if you have access permissions. Access is denied. You need to ensure that the user can access the ManagerData$ shared folder on Testking32. What should you do?()AInstruct the user to type //Testking32/ManagerData/ when he attempts to access the folder.BAdd the Anonymous Logon group to the ACL for the ManagerData$ shared folder.CSelect the Replace permission entries on all child object with entries shown here that apply to child objects check box.DInstruct the user to log off and log on again before he accesses the folder.

多选题You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)AThe security update in the synchronization log.BThe security update in the approval log.CThe status of Internet Explorer 5.5x in the Monitor Server window.DThe status of Internet Explorer 6.x in the Monitor Server window.

单选题You are the network administrator for . You are the administrator of a Windows Server 2003 computer named TestKing8. You log on to TestKing8 and attempt to access the network. You discover that the server is not communicationg on the network. You discover that a service pack and an updated network adapter driver were installed on TestKing8 the previous night. A complete backup, including the System State data, was performed before the service pack and the driver were installed. You need to restore network communications. What should you do first?()AUse Roll Back Driver to reinstall the previous driver for the network adapter.BUse the Backp or Restore Wizard to restore the backup from the previous night.CRestart TestKing8 by using Last Known Good Configuration option.DUse the Registry Editor to delete the registry settings for the network adapter driver.

单选题You are employed as the exchange administrator at TestKing.com. The TestKing.com network containsan Exchange Server 2010 Organization. TestKing.com has its headquarters in Chicago and a branchoffice in Dallas. TestKing.com has a global security group named TestFinance. TestFinance contains all the users in theFinance department. A new TestKing.com policy state that TestFinance have the nesessary permissons tosearch the mailboxes for e-mail messages containing certain words. The CIO wants you to recommend asolution that will comply with the new policy. What should you do?()AYour solution should include a finance hold.BYour solution should include mailbox journaling.CYour solution should include a Discovery Management role group.DYour solution should include administrator audit logging.

单选题You are the network administrator for TestKing. Your network consists of a single Active Directory domain. You manage a Terminal Server farm that includes five terminal servers and a Terminal Services Licensing server named testking9. All servers run Windows 2000 Server. There are 2,500 users who log on to the terminal servers to access a custom human resource (HR) application. You install Windows Server 2003 on a new server named testking10. Testking10 is configured with all default settings enabled. You install Terminal Services and the HR application on testking10. You instruct some users to access the HR application on testking10. Four months later, users report that they can no longer establish Terminal Services sessions to testking10. You verify that users can connect to the other terminal servers in your Terminal Server farm. You need to ensure that users can run the HR application on all terminal servers on the network. What should you do?()AOn testking10, set the License Logging service to Automatic, and the start the service.BOn testking10, install Terminal Service Licensing. Activate the Terminal Services Licensing server.CInstall Windows Server 2003 on all domain controllers on the network.DDeactivate and activate Terminal Service Licensing on Testking9.

单选题You are the network administrator for TestKing. The network contains a Windows Server 2003 computer named testking1, which hosts a critical business application named Salesapp. Testking1 has one disk that contains a single NTFS volume. Five days ago, the System State of testking1 was backed up, and an Automated System Recovery (ASR) backup was created. No additional backups were performed. Subsequently, many changes were made to the Salesapp data files. You apply an update to the application, which requires you to restart testking1. Windows startup terminates with a Stop error. You restart the computer and boot to a floppy disk. A utility on this disk gives you read-only access to the NTFS file system. You discover that one of the .dll files for the Salesapp application is corrupted. The corrupted file is stored in the C./Windows/System32 folder. You need to restore the corrupted file. You need to avoid losing any changes made to the data files on testking1. What should you do onTestKing1?()APerform the ASR restore procedure.BRestart Windows by using the Last Known Good configuration option.CStart the Recovery Console and replace the corrupted .dll file with a copy from the Salesapp CD-ROM.DReinstall Windows Server 2003. Do not format any volumes.

单选题You are the network administrator for TestKing. All servers run Windows Server 2003. Twenty TestKing employees connect to a terminal server named Testking2 to run applications and to gain access to the Internet. The 20 employees report that they receive security messages while browsing Internet Web sites. The employees report that they cannot modify the Internet Explorer security settings on their client computers while connected to Testking2. You need to allow these 20 employees to modify the Internet Explorer security settings in their client computers while connected to Testking2. What should you do?()ALog on to Testking2 as Administrator and add http:// to the list of trusted sites in Internet Explorer.BInstruct the 20 employees to add http:// to the list of trusted sites in Internet Explorer on their client computers.CInstruct the 20 employees to change the Internet Explorer privacy settings on their client computers to Low.DUninstall Internet Explorer Enhanced Security Configuration on Testking2.

单选题You are the network administrator at TestKing. TestKing has been provided withthe network address 165.100.27.0/24. The TestKing CEO wants to know how many subnetworks this address provides, and how many hosts can be supported on each subnet. What would your reply be?()AOne network with 254 hosts.B254 networks with 254 hosts per network.C65,534 networks with 255 hosts per network.D30 networks with 64 hosts per network.E254 networks with 65,534 per network.