单选题When you create a network implementation VLAN solution, what is one procedure that you should include in your plan?()APerform an incremental implementation of components.BFollowing the PPDIOO model, implement the entire solution and then test end-to-end to make sure that it is performing as designed.CImplement trunking of all VLANs to ensure that traffic is crossing the network as needed before performing any pruning of VLANs.DTest the solution on a segmented portion of a lab network prior to rolling out across the entire network.

单选题
When you create a network implementation VLAN solution, what is one procedure that you should include in your plan?()
A

Perform an incremental implementation of components.

B

Following the PPDIOO model, implement the entire solution and then test end-to-end to make sure that it is performing as designed.

C

Implement trunking of all VLANs to ensure that traffic is crossing the network as needed before performing any pruning of VLANs.

D

Test the solution on a segmented portion of a lab network prior to rolling out across the entire network.


参考解析

解析: 暂无解析

相关考题:

Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()A.Create an Ipsec enforcement network policy.B.Create an 802.1xenforcemen tnetwork policy.C.Createa wired network(IEEE802.3)Group policy.D.Create an extensible authentication protocol(EAP)enforcement network policy.

In OOD what is the reason when you create a Sequence diagram?__

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

Your network consists of a single Active Directory domain. All network servers run Windows Server 2003Service Pack 2 (SP2).A server hard disk drive fails. You replace and configure the hard disk drive and use Windows Backup to start a data restore.When you start the restore, you receive the following error message.You need to restore the data on the server. The solution must create the same directory structure that existed beforethe disk failure.What should you do? ()A. Catalog the backup file.B. Restore the backup to a single folder.C. Restore the files to the original location.D. Restore the backup to an alternate location.

What is an important step to take when verifying a newly proposed network security solution? ()A、Test the design on a pilot network for expected results prior to implementing on the production network.B、Run a network audit to determine types of traffic in use on the network.C、Launch campus updates into the production network and monitor impact to see if configuration changes are needed.D、Create an interruption of data flow to determine test "back-door" access methods.

What is a critical piece of information that you should have when creating a VLAN-based implementation plan?()A、approval from senior managementB、end-user requirementsC、IEEE 802.1X authentication parametersD、a summary implementation plan

You have just created a new VLAN on your network.  What is one step that you should include in your VLAN-based implementation and verification plan? ()A、Verify that trunked links are configured to allow the VLAN traffic.B、Verify that the switch is configured to allow for trunking on the switch ports.C、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.D、Verify that different native VLANs exist between two switches for security purposes.

What network information do you need when you plan to implement a VLAN-based solution?()A、default VLAN information for all unused switch portsB、802.1x configuration parameters C、number of IP subnets neededD、IP routing protocol information

Which three of the following are organizational objectives that should be addressed when developing a new VLAN implementation plan? ()A、network managementB、improving QoSC、determining budgetD、reducing costsE、increasing competitivenessF、improving customer support

Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

Your network contains an Exchange Server 2010 server.You need to prevent a user named User1 from downloading attachments larger than 50 KB when using Exchange ActiveSync.Your solution must not affect other users.  What should you do first?()A、Modify User1 Mailbox propertiesB、Create a New ActiveSync Mailbox PolicyC、Create a New Exchange ActiveSync Mailbox policyD、Modify properties of Default Exchange ActiveSync Mailbox policy

You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

You want to create a shortcut to a folder named Project on a network share. You want this shortcut to be available when you are not connected to the network. You attempt to configure the shortcut to be available offline. However, you do not see any option, which will let you do so. What should you do?()A、Use Windows Explorer to enable caching for the Project folder.B、Use Windows Explorer to configure the Project folder on the network share with the full  control permission for your user account.C、Connect to the network before trying to make the shortcut available offlineD、Create shortcuts to each file in the Project folder and make the shortcuts to the files available  offline.

Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

You are using a Windows 2000 Professional computer. You create a shortcut for the folder named PROJECTS on the network share. You want to make shortcuts to the projects folder available, when you are not connected to the network. You attempt to configure the shortcut to be available offline. However you do not see an option to make the folder available offline. What should you do?()A、Use Windows Explorer to enable the cache for the project folder.B、Use Windows Explorer to configure the projects folder on the network share to be available for offline access.C、Connect to the network before trying to make the shortcut available online.D、Create shortcuts to each file in the projects folder and then make the shortcut files available offline.

You deploy a Hyper-V host and you convert the Web servers to VMs. You discover that when users transfer large data files from the Web servers, the CPU utilization of the host exceeds acceptable limits. You need to recommend a solution to reduce the CPU utilization associated to network traffic. The solution must meet the company’s business requirements. What should you recommend implementing?()A、Two network cards that support network adapter teamingB、A network card that supports Virtual Machine ChimneyC、An additional Hyper-V host and Network Load Balancing (NLB)D、An additional Hyper-V host and Failover Clustering

Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network contains a Mailbox server named XXX-EX10.What action must you take to have mailboxes retained for 8 weeks after deletion?()A、You must create a legal hold.B、You must change the mailbox database properties.C、You must create Transport Protection Rules.D、You must create Personal archives.

单选题You are planning a new VLAN-based network solution.  What is one item you should consider when creating your implementation plan as it concerns VLANs?()Ageneric router and switch configuration parametersBend-to-end test plan after all components have been installed and  configuredCadministrator assignmentsDrollback plan

单选题What action should you be prepared to take when verifying a security solution?()Ahaving alternative addressing and VLAN schemesBhaving a rollback plan in case of unwanted or unexpected resultsCrunning a test script against all possible security threats to insure that the solution will mitigate all potential threatsDisolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system

多选题Your network contains a Hyper-V host named Host1 that runs Windows Server 2008 R2. The host is connected to VLAN ID 10. For testing purposes, you plan to deploy several virtual machines (VMs) on the Host1. You need to recommend which virtual networks must be created for the VMs. The solution must ensure that the VMs can only connect to other VMs. Which network configuration or configurations should you recommend?()Aan external network on VLAN ID 10Ban internal network on VLAN ID 11Can external network on VLAN ID 11Da private network on VLAN ID 10Ean internal network on VLAN ID 10

单选题You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()AVerify that different native VLANs exist between two switches for security purposes.BVerify that the switch is configured to allow for trunking on the switch ports.CVerify that each switch port has the proper IP address space assigned to it for the new VLAN. DVerify that the VLAN virtual interface has been correctly created and enabled.

单选题You have just created a new VLAN on your network.  What is one step that  you should include in your VLAN based implementation and verification plan? ()AVerify that different native VLANs exist between two switches for security purposes.BVerify that the VLAN was added on all switches with the use of the show vlan command. CVerify that the switch is configured to allow for trunking on the switch ports.DVerify that each switch port has the correct IP address space assigned to it for the new VLAN.

单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A Create an IPsec Enforcement Network policyB Create an 802.1X enforcement network policyC Create a wired network (IEEE 802.3) Group PolicyD Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy

单选题What network information do you need when you plan to implement a VLAN-based solution?()Adefault VLAN information for all unused switch portsB802.1x configuration parameters Cnumber of IP subnets neededDIP routing protocol information

单选题What is a critical piece of information that you should have when creating a VLAN-based implementation plan?()Aapproval from senior managementBend-user requirementsCIEEE 802.1X authentication parametersDa summary implementation plan