单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment. The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application. You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()A Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.
单选题
You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment. The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application. You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()
A
Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.
B
Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.
C
Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.
D
Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.
参考解析
解析:
暂无解析
相关考题:
You are a network administrator for your company. You manage a computer named Server6 that runs Windows Server 2003 with the default settings.You install Terminal Services on Server6. You attempt to connect to Server6 by using the URLhttp://Server6/Tsweb. You cannot connect to Server6. You need to be able to access Terminal Services on Server6 by using Internet Explorer 6.0.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)A. Create a new Web site named Tsweb.B. Create a new virtual directory named Tsweb.C. Install IIS.D. Install the Remote Administration IIS subcomponent.E. Install the Remote Desktop Web Connection IIS subcomponent.
You install a wireless router and disable the Service Set identifier (SSID) broadcast feature. You need to configure your computer to connect to the wireless network.What should you do?() A.AB.BC.CD.D
You administer your company‘s network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the applicatin.What should you do?()A.AB.BC.CD.D
You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter
You are the network administrator for Company. Your network consists of one Windows NT Server 4.0 domain and 35 Windows 2000 Professional computers. The network consists of five interconnected TCP/IP subnets. All of the computers use TCP/IP as the only network protocol. You are adding 15 Windows 2000 Professional computers to the network. You configure each of the new computers to use DHCP. The computers can communicate with each other but are unable to communicate outside their own subnet. You run the ipconfig command to examine the UP address on one of the new computers. The IP address is 169.254.101.72 You want to enable the Windows 2000 Professional computers to communicate outside their own subnet. What should you do?()A、Install a DHCP server.B、Install a WINS server. Configure each computer to use WINS.C、Create an Lmhost file on each computer.D、Create a Hosts file on each computer.
Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows7 on a new portable computer and join the computer to the domain. You need to ensure that the computercan establish DirectAccess connections. What should you do?()A、Install a computer certificate.B、Create a new network connection.C、Enable the Network Discovery firewall exception.D、Add the computer account to the Network Configuration Operators group.
Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft Online Responder on the internal network. You need to recommend a secure method for Internet users to verify the validity of individual certificates. The solution must minimize network bandwidth. What should you recommend?()A、Deploy a subordinate CA on the perimeter network.B、Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.C、Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication requests to a server on the internal network.D、Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS to redirect requests to the Online Responder on the internal network.
You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1. What should you do?()A、Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B、Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C、Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D、Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
You are a network administrator for your company. You manage a computer named Server6 that runs Windows Server 2003 with the default settings.You install Terminal Services on Server6. You attempt to connect to Server6 by using the URLhttp://Server6/Tsweb. You cannot connect to Server6. You need to be able to access Terminal Services on Server6 by using Internet Explorer 6.0.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)A、Create a new Web site named Tsweb.B、Create a new virtual directory named Tsweb.C、Install IIS.D、Install the Remote Administration IIS subcomponent.E、Install the Remote Desktop Web Connection IIS subcomponent.
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. All servers run Windows Server 2003 and all client computers run Windows XP Professional. You are planning a security update infrastructure. You need to find out which computers are exposed to known vulnerabilities. You need to collect the information on existing vulnerabilities for each computer every night. You want this process to occur automatically. What should you do? ()A、 Schedule the secedit command to run every night.B、 Schedule the mbsacli.exe command to run every night.C、 Install Microsoft Baseline Security Analyzer (MBSA) on one of the servers. Configure Automatic Updates on all other computers to use that server.D、 Install Software Update Services (SUS) on one of the servers. Configure the SUS server to update every night.
You are the network administrator for ExamSheet.net. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install Windows Server Update Services (WSUS) on a network server named Server1. When you attempt to synchronize Server1 with the Windows Update servers, you receive an error message. You open Internet Explorer and verify that you can communicate with an external Web site by using the proxy server. You need to ensure that Server1 can communicate with the Windows Update servers. What should you do on Server1?()A、Restart the IIS administration tool.B、Configure the Internet Explorer settings to bypass the proxy server.C、In the WSUS options, configure authentication to the proxy server.D、Install the ISA Firewall Client.
You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()A、Enable DHCP in the TCP/IP properties.B、Replace the Token Ring network adapter with an Ethernet network adapter.C、Configure a different TCP/IP address on the same subnet.D、Configure a valid DNS Server in the TCP/IP properties.
You are the network administrator for your company. All network servers run Windows Server 2003. A member server named Server1 hosts several hundred folders, which are located on multiple volumes on the server. A backup job on Server1 is configured to run a normal backup of the folders every Saturday at 1:00 A.M. On Wednesday morning, you discover that you need to install a new application on Server1 before the close of business that day. You need to back up all folders on Server1 as quickly as possible so you can install the new application. What should you do? ()A、Create a new backup job that specifies the folders and runs once only.B、Run the existing backup job.C、Enable Volume Shadow Copy for the volumes that contain the folders.D、Create an Automated System Recovery (ASR) set.
Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()A、Join the new server to an Active Directory domain.B、Install Active? Directory Lightweight Directory Services on the new server.C、Run ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.D、Open TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.
You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment. The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application. You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.
You want to implement IP address to Computer Name resolving on your Windows 2000 network. How do you configure this in a NETBIOS environment?()A、Install a DHCP ServerB、Install a DNS ServerC、Install a WINS ServerD、Install an LMHOST Converter
You are the network administrator for your company. Your network consists of a single Active Directory domain. All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional. You install Windows Server 2003 with default settings on a new computer named Server1. You install and share several printers on Server1. You instruct all users to connect to these printers by using the address http://Server1/Printers. However, users report that they cannot connect to this address. You need to ensure that all users can connect to the printers by using HTTP. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two.)A、Publish all shared printers that are installed on Server1.B、Create a virtual directory named Printers on Server1.C、Install IIS with default settings on Server1.D、Reshare all printers on Server1.E、Install the Internet Printing component of IIS.F、Type Net Start W3SVC at a command prompt.
单选题Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()AJoin the new server to an Active Directory domain.BInstall Active? Directory Lightweight Directory Services on the new server.CRun ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.DOpen TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.
单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()ASet the driver signing option to block.BSet the driver signing option to ignore.CIn the computer’s BIOS, reserve an unused IRQ for ISA devices.DIn the Device Manager, configure the second ISA network adapter to use an unused IRQ.
单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP
单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()AmsiBmstCzapDzip
单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment. The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application. You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()A Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.
多选题You are the network administrator for ExamSheet.net. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()ARestart the computer in the docking station.BRun the Add/Remove Hardware wizard.CUse Device Manager to scan for hardware changes.DCopy the network adapter driver to the Winnt/Driver Cache/i386 folder.EInstall the new network adapter driver.
单选题Your Company upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart eh computer, however, you cannot access the network. You try to ping your network adapter’s TCP/IP address locally. You receive the following error message. “Request timed out.” Next, you try to ping 127.0.0.1 and receive the same error message. What must you do?()AConfigure a different TCP/IP addressBEnable DHCP in the TCP/IP propertiesCEnable DNS in the TCP/IP propertiesDConfigure the network adapter to run at 100 Mbps onlyEReplace the network adapter.
单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network. You need to configure the wireless connection to allow your computer to discover other computers. What should you do?()AConfigure the network category of your wireless network connection to Private.BConfigure the network category of your wireless network connection to Public.CConfigure the TCP/IP packet filtering on the wireless network connection.DConfigure the wireless network connection with the appropriate authentication to the router.
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install Windows Server Update Services (WSUS) on a network server named Server1. When you attempt to synchronize Server1 with the Windows Update servers, you receive an error message. You open Internet Explorer and verify that you can communicate with an external Web site by using the proxy server. You need to ensure that Server1 can communicate with the Windows Update servers. What should you do on Server1?()ARestart the IIS administration tool.BConfigure the Internet Explorer settings to bypass the proxy server.CIn the WSUS options, configure authentication to the proxy server.DInstall the ISA Firewall Client.