单选题On a Company switch named R1 you configure the following: iparp inspection vlan 10-12, 15 What is the purpose of this global configuration command made on R1?()A Discards ARP packets with invalid IP-to-MAC address bindings on trusted portsB Validates outgoing ARP requests for interfaces configured on VLAN 10, 11, 12, or 15C Intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindingsD Intercepts all ARP requests and responses on trusted portsE None of the other alternatives apply
单选题
On a Company switch named R1 you configure the following: iparp inspection vlan 10-12, 15 What is the purpose of this global configuration command made on R1?()
A
Discards ARP packets with invalid IP-to-MAC address bindings on trusted ports
B
Validates outgoing ARP requests for interfaces configured on VLAN 10, 11, 12, or 15
C
Intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings
D
Intercepts all ARP requests and responses on trusted ports
E
None of the other alternatives apply
参考解析
解析:
暂无解析
相关考题:
Assuming the default switch configuration,which approach should you use to configure the extended vlan range(1006 through 4094) on a cisco catalyst 3750 series switch?() A. Configure the switch to be in VTP client mode.B. Configure the switch to be in VTP domaint mode.C. Configure the switch to be in VTP transparent mode.D. Configure the switch to be in VTPv2.
Assuming the default switch configuration,which approach should you use to configure the extended vlan range(1006 through 4094) on a cisco catalyst 3750 series switch?()A、Configure the switch to be in VTP client mode.B、Configure the switch to be in VTP domaint mode.C、Configure the switch to be in VTP transparent mode.D、Configure the switch to be in VTPv2.
You are configuring a Cisco multilayer switch for the Company network. Which command would you use to configure a port to act as a routed interface?()A、 ip routingB、 switchport mode trunkC、 no switchportD、 switchport trunk native vlan 1E、 None of the other alternatives apply
As the network technician at Company, you need to configure DHCP snooping on a new switch. Which three steps are required? ()A、 Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded DHCP request messages.B、 Configure DHCP snooping globally.C、 Configure the switch as a DHCP server.D、 Configure DHCP snooping on an interface.E、 Configure all interfaces as DHCP snooping trusted interfaces.F、 Configure DHCP snooping on a VLAN or range of VLANs.
You want to configure switch R1 to propagate VLAN information across the Company network using VTP. What must be configured on a Cisco switch in order to advertise VLAN information?()A、VTP modeB、VTP passwordC、VTP revision numberD、VTP pruningE、VTP domain nameF、None of the other alternatives apply
You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network. What should you do?()A、Configure a DNS suffix.B、Configure a subnet mask.C、Configure an LMHOSTS file.D、Configure an Interface metric.E、Configure at least one DNS address.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to company growth Company.com, has acquired an accepted domain named courseware.com.The employees of both domains are configured with internal and external Out Of Office messages.You have received instructions to make sure that the internal Out Of Office messages are sent to senders from the courseware.com. What should you do?()A、You should create and configure a new accepted domain.B、You should create and configure a new remote domain.C、You should create and configure a new Receive connector.D、You should create and configure a new Send connector.
On a Company switch named R1 you configure the following: iparp inspection vlan 10-12, 15 What is the purpose of this global configuration command made on R1?()A、 Discards ARP packets with invalid IP-to-MAC address bindings on trusted portsB、 Validates outgoing ARP requests for interfaces configured on VLAN 10, 11, 12, or 15C、 Intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindingsD、 Intercepts all ARP requests and responses on trusted portsE、 None of the other alternatives apply
You need to configure a new Company switch to support DTP. Which DTP switchport mode parameter sets the switch port to actively send and respond to DTP negotiation frames? ()A、 AccessB、 No negotiateC、 TrunkD、 Dynamic desirableE、 Dynamic autoF、 None of the other alternatives apply
Your company has a domain controller named Server1 that runs Windows Server 2008 and the DNS server role. A server named Server2 runs a custom application. You need to configure DNS to include the following parameters for the custom application: Service Priority Weight Protocol Port Number Host offering this service Which record should you create?()A、 Host Info (HINFO)B、 Service Locator (SRV)C、 Canonical Name (CNAME)D、 Well-Known Service (WKS)
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. Now you get a report from users saying that DB1 meets deadlock problems. As the technical support, you have to capture the deadlock information to the SQL Server error log. What should you do?() A、For the AdventureWorks database, enable Server Auditing B、First you should set the appropriate trace flags as a startup parameter, and then restart the SQL Server instance C、You should configure the data collector and make it capture the deadlock graphsD、You should configure a SQL Profiler trace, and make it capture the deadlock graphs
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()A、You should configure SSL SettingsB、You should configure AuthenticationC、You should configure Authorization RulesD、You should configure IIS Manager Permissions
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You intend to configure FILESTREAM data, enabling FILESTREAM for file I/O streaming access and allowing remote client computers to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. In the options below, which service should you configure? () A、You should configure Distributed File SystemB、You should configure SQL ServerC、You should configure SQL Server Full TextD、You should configure SQL Server VSS Writer
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.
Network topology exhibit: You are the administrator at ExamSheet.net. You use TCP/IP as the only protocol on your network. The network is configured as in the network topology exhibit. All existing computers and devices use 255.255.240.0 as the subnet mask. You install Windows 2000 Professional on a computer named ExamSheet2. You configure ExamSheet2 to have a TCP/IP address of 10.10.20.234, a default gateway of 10.10.20.1, a subnet mask of 255.255.0.0 and a WINS server address of 10.10.13.10. You cannot connect to shared resources on ExamSheetB by using its UNC name. You want ExamSheet2 to be able to connect to ExamSheetB. What should you do? ()A、Install a WINS server on the same segment as Company2B、Install and configure a DNS server and configure Company2 to use the DNS Server service.C、Configure Company2 with a default gateway address 10.10.13.1.D、Configure Company2 with a default gateway address of 10.10.30.1.E、Configure Company2 with a TCP/IP address of 10.10.20.234.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2002 instance. You upgrade this instance to SQL Server 2008. You configure the Agent service to use the LocalSystem account. There is a file named Orderdata on a remote network share. A job accesses this Orderdata file by using a CMDExec step. The job step fails to complete execution after the upgrade. You must make sure that the job can complete execution, so you have to configure the job step. What action should you perform? () A、You should configure a certificate B、You should configure the SQL Server Agent service to use the NetworkService account.C、You should configure the job step to use a proxy account D、You should configure the SQL Server Agent service to use a local Windows account
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? () A、You should configure SQL Server VSS Writer B、You should configure Distributed File System C、You should configure SQL Server D、You should configure SQL Server Full Text
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to company growth Company.com, has acquired an accepted domain named courseware.com.The employees of both domains are configured with internal and external Out Of Office messages.You have received instructions to make sure that the internal Out Of Office messages are sent to senders from the courseware.com. What should you do?()AYou should create and configure a new accepted domain.BYou should create and configure a new remote domain.CYou should create and configure a new Receive connector.DYou should create and configure a new Send connector.
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You intend to configure FILESTREAM data, enabling FILESTREAM for file I/O streaming access and allowing remote client computers to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. In the options below, which service should you configure? ()AYou should configure Distributed File SystemBYou should configure SQL ServerCYou should configure SQL Server Full TextDYou should configure SQL Server VSS Writer
单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()AYou should configure SSL SettingsBYou should configure AuthenticationCYou should configure Authorization RulesDYou should configure IIS Manager Permissions
单选题You need to configure a new Company switch to support DTP. Which DTP switchport mode parameter sets the switch port to actively send and respond to DTP negotiation frames? ()A AccessB No negotiateC TrunkD Dynamic desirableE Dynamic autoF None of the other alternatives apply
单选题Your company has an Active Directory forest. The company has three locations. Each location has an organizational unit and a child organizational unit named Sales. The Sales organizational unit contains all users and computers of the sales department. The company plans to deploy a Microsoft Office 2007 application on all computers within the three Sales organizational units. You need to ensure that the Office 2007 application is installed only on the computers in the Sales organizational units. What should you do()ACreate a Group Policy Object (GPO) named SalesAPP GPO. Configure the GPO to assign the application to the cBCreate a Group Policy Object (GPO) named SalesAPP GPO. Configure the GPO to assign the application to the usCCreate a Group Policy Object (GPO) named SalesAPP GPO. Configure the GPO to publish the application to the uDCreate a Group Policy Object (GPO) named SalesAPP GPO. Configure the GPO to assign the application to the co
单选题On a Company switch named R1 you configure the following: iparp inspection vlan 10-12, 15 What is the purpose of this global configuration command made on R1?()A Discards ARP packets with invalid IP-to-MAC address bindings on trusted portsB Validates outgoing ARP requests for interfaces configured on VLAN 10, 11, 12, or 15C Intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindingsD Intercepts all ARP requests and responses on trusted portsE None of the other alternatives apply
单选题You want to configure switch R1 to propagate VLAN information across the Company network using VTP. What must be configured on a Cisco switch in order to advertise VLAN information?()AVTP modeBVTP passwordCVTP revision numberDVTP pruningEVTP domain nameFNone of the other alternatives apply
单选题Your company has a main office and a branch office. In the main office, you have a server named Server1 that runs Windows Server Update Services (WSUS) 3.0. Server1 is the only WSUS server in the company. You plan to deploy WSUS 3.0 on a server named Server2 in the branch office. You need to configure WSUS on Server2 to meet the following requirements: ·Receive update approvals from Server1. ·Prevent the modification of update approvals on Server2. ·Allow administrators to monitor updates, monitor computer status, and configure a synchronization schedule on Server2. How should you configure Server2? ()Ato use a proxy serverBas a replica of Server1Cas a stand-alone WSUS 3.0 serverDas an autonomous downstream server
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. Now you get a report from users saying that DB1 meets deadlock problems. As the technical support, you have to capture the deadlock information to the SQL Server error log. What should you do?()AFor the AdventureWorks database, enable Server Auditing BFirst you should set the appropriate trace flags as a startup parameter, and then restart the SQL Server instance CYou should configure the data collector and make it capture the deadlock graphsDYou should configure a SQL Profiler trace, and make it capture the deadlock graphs
单选题Your company has a domain controller named Server1 that runs Windows Server 2008 R2 and the DNS Server server role. A server named Server2 runs a custom application. You need to configure DNS to include the following parameters for the custom application: ?¤Servic ?¤Priorit ?¤Weigh ?¤Protoco ?¤Port numbe ?¤Host offering this servic Which record should you create?()AHost Info (HINFO)BService Location (SRV)CCanonical Name (CNAME)DWell-Known Service (WKS)
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? ()AYou should configure SQL Server VSS Writer BYou should configure Distributed File System CYou should configure SQL Server DYou should configure SQL Server Full Text