单选题You have a class C network, and you need to design it for 5 usable subnets with each subnet handling a minimum of 18 hosts each. Which of the following network masks should you use?()A225.225.224.0.B225.225.240.0.C225.225.255.0.D255.255.255.224E225.225.255.240

单选题
You have a class C network, and you need to design it for 5 usable subnets with each subnet handling a minimum of 18 hosts each. Which of the following network masks should you use?()
A

225.225.224.0.

B

225.225.240.0.

C

225.225.255.0.

D

255.255.255.224

E

225.225.255.240


参考解析

解析: 暂无解析

相关考题:

You have recently created a serializable class named Vehicle.The class is shown below:[Serializable]public class Vehicle{public string VIN;public string Make;public string Model;public string Year;}You are planning to create a custom formatter class to control the formatting of Vehicle objects when they are serialized.You need to ensure that is achieved with as little development effort as possible.What should you do?()A.B.C.D.

You have a class C network, and you need to design it for 5 usable subnets with each subnet handling a minimum of 18 hosts each. Which of the following network masks should you use?A.225.225.224.0.B.225.225.240.0.C.225.225.255.0.D.255.255.255.224E.225.225.255.240

You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()A. OSPFB. RIPC. BGPD. static

You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A./24B./26C./27D./28

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

Ezonexam has a Class C network and you need ten subnets. You wish to have as many addresses available for hosts as possible. Which one of the following subnet masks should you use?A.255.255.255.192B.255.255.255.224C.255.255.255.240D.255.255.255.248E.None of the above

You have a Class C network, and you need ten subnets. You wish to have as many addresses available for hosts as possible. Which one of the following subnet masks should you use?() A. 255.255.255.192B. 255.255.255.224C. 255.255.255.240D. 255.255.255.248E. None of the above

Your network has 1,000 client computers that run Windows XP. You are planning to deploy Windows 7.  You plan to use the Microsoft Deployment Toolkit Lite Touch Installation deployment method to deploy the Windows 7 image.   You have the following requirements:   Migrate 20 computers at a time.  Ensure that you conserve network bandwidth.   You need to design a deployment strategy that meets the requirements.   What should you do?()A、Configure multicast transmission on the deployment point.B、Configure unicast transmission on the deployment point.C、Compress the contents of the distribution folder.D、Distribute the image by using Background Intelligent Transfer Service (BITS).

You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A、/24B、/26C、/27D、/28

You work as an application developer at Certkiller .com. Certkiller .com has been contracted to develop an application for the local bank.You have been given the responsibility of creating this application and need to store each transaction record, which is identified using a complex transaction identifier,in memory. The bank informs you that the total amount of transaction records could reach 200 per day. To achieve this, you decide to utilize one of the existing collection classes in the .NET 2.0 class library. You need to ensure that you the collection class you select is the most efficient one for storing transaction records.What should you do?()A、 Select the ListDictionary collection class.B、 Select the HashTable collection class.C、 Select the Queue collection class.D、 Select the StringCollection collection class.

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Framework (WPF) application. You have a company logo that must appear on multiple forms in the application. The logo design changes frequently. You need to ensure that when the logo image is changed, you only need to update a single location. What should you do?()A、Define the image as a page resource.B、Define the image as an application resource.C、Save the image on a network drive.D、Include the image as an embedded resource.

You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The Hyper-V server role is installed on a server named ABC_SR07.ABC_SR07 has a legacy network card that you use when creating a virtual machine named ABC_VT01.  What is the first thing you should do when assigning bandwidth to ABC_VT01?()A、You need to install a Hyper-V Virtual Switch on ABC_SR07.B、You need to install Integration Services on ABC_VT01.C、You need to remove the legacy network card and replace it with a new one.D、You need to install a second legacy network card on ABC_SR07.E、You need to create an external virtual network.

You work as an application developer at Certkiller .com. You have recently created a custom collection class named ShoppingList for a local supermarket. This custom class will include ShoppinItem objects that have the public properties listed below. * Name * AisleNumber * OnDiscount You are required to enable users of your class to iterate through the ShoppingList collection, and to list each product name and aisle number using the foreach statement.You need to achieve this by declaring the appropriate code.What code should you use?()A、 public class ShoppingList : ICollection {// Class implementation }B、 public class ShoppingList : IEnumerator, IEnumerable {// Class implementation }C、 public class ShoppingList : Ilist {// Class implementation }D、 public class ShoppingList : Enum {// Class implementation }

You are creating a Windows Forms application by using the .Net Framework 3.5.You plan to design a composite control for the application.You need to derive the control from a base class that supports templates.What should you do?()A、Derive from the Control class.B、Derive from the UserControl class.C、Derive from the ScrollableControl class.D、Derive from the ContainerControl class.

You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()A、virtual machine queue (VMQ)B、Virtual Machine ChimneyC、a synthetic network adapterD、an emulated network adapter

You are developing a class library that will open the network socket connections to computers on the network. You will deploy the class library to the global assembly cache and grant it full trust. You write the following code to ensure usage of the socket connections.  SocketPermission permission =   new SocketPermission(PermissionState.Unrestricted);  permission.Assert(); Some of the applications that use the class library might not have the necessary permissions to open the network socket connections.You need to cancel the assertion. Which code segment should you use?()A、CodeAccessPermission.RevertAssert();B、CodeAccessPermission.RevertDeny();C、permission.Deny();D、permission.PermitOnly();

单选题You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()AOSPFBRIPCBGPDstatic

单选题You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A/24B/26C/27D/28

单选题You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()Avirtual machine queue (VMQ)BVirtual Machine ChimneyCa synthetic network adapterDan emulated network adapter

单选题You are developing a class library that will open the network socket connections to computers on the network. You will deploy the class library to the global assembly cache and grant it full trust. You write the following code to ensure usage of the socket connections.  SocketPermission permission =   new SocketPermission(PermissionState.Unrestricted);  permission.Assert(); Some of the applications that use the class library might not have the necessary permissions to open the network socket connections.You need to cancel the assertion. Which code segment should you use?()ACodeAccessPermission.RevertAssert();BCodeAccessPermission.RevertDeny();Cpermission.Deny();Dpermission.PermitOnly();

单选题You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()ARemote Desktop GatewayBRemote Desktop Connection BrokerCWindows Deployment ServicesDWindows Virtual PC and Windows XP Mode

单选题You have a Class C network, and you need ten subnets. You wish to have as many addresses available for hosts as possible. Which one of the following subnet masks should you use?()A255.255.255.192B255.255.255.224C255.255.255.240D255.255.255.248ENone of the above

单选题You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Framework (WPF) application. You have a company logo that must appear on multiple forms in the application. The logo design changes frequently. You need to ensure that when the logo image is changed, you only need to update a single location. What should you do?()ADefine the image as a page resource.BDefine the image as an application resource.CSave the image on a network drive.DInclude the image as an embedded resource.

单选题Your network has 1,000 client computers that run Windows XP. You are planning to deploy Windows 7.  You plan to use the Microsoft Deployment Toolkit Lite Touch Installation deployment method to deploy the Windows 7 image.   You have the following requirements:   Migrate 20 computers at a time.  Ensure that you conserve network bandwidth.   You need to design a deployment strategy that meets the requirements.   What should you do?()AConfigure multicast transmission on the deployment point.BConfigure unicast transmission on the deployment point.CCompress the contents of the distribution folder.DDistribute the image by using Background Intelligent Transfer Service (BITS).

单选题You are creating a Windows Forms application by using the .Net Framework 3.5.You plan to design a composite control for the application.You need to derive the control from a base class that supports templates.What should you do?()ADerive from the Control class.BDerive from the UserControl class.CDerive from the ScrollableControl class.DDerive from the ContainerControl class.

单选题You work as an application developer at Certkiller .com. You have recently created a custom collection class named ShoppingList for a local supermarket. This custom class will include ShoppinItem objects that have the public properties listed below. * Name * AisleNumber * OnDiscount You are required to enable users of your class to iterate through the ShoppingList collection, and to list each product name and aisle number using the foreach statement.You need to achieve this by declaring the appropriate code.What code should you use?()A public class ShoppingList : ICollection {// Class implementation }B public class ShoppingList : IEnumerator, IEnumerable {// Class implementation }C public class ShoppingList : Ilist {// Class implementation }D public class ShoppingList : Enum {// Class implementation }

单选题You are the network administrator for Tailspin Toys. The company has a main office and two branch offices. The network in the main office contains 10 servers and 100 client computers. Each branch office contains 5 servers and 50 client computers. Each branch office is connected to the main office by a direct T1 line. The network design requires that company IP addresses must be assigned from a single classful private IP address range. The network is assigned a class C private IP address range to allocate IP addresses for servers and client computers. Tailspin Toys acquires a company named Wingtip Toys. The acquisition will increase the number of servers to 20 and the number of client computers to 200 in the main office. The acquisition is expected to increase the number of servers to 20 and the number of client computers to 200 in the branch offices. The acquisition will also add 10 more branch offices. After the acquisition, all branch offices will be the same size. Each branch office will be connected to the main office by a direct T1 line. The new company will follow the Tailspin Toys network design requirements. You need to plan the IP addressing for the new company. You need to comply with the network design requirement.  What should you do?()A Assign the main office and each branch office a new class A private IP address range. B Assign the main office and each branch office a new class B private IP address range.C Assign the main office and each branch office a subnet from a new class B private IP address range.D Assign the main office and each branch office a subnet from the current class C private IP address range.