单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()AThe wireless access point is using MAC address filteringBThe user has connected to a nearby wireless access point from another officeCThe user has configured the wireless settings with the wrong encryption typeDThe wireless access point has SSID broadcast disabled
单选题
All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()
A
The wireless access point is using MAC address filtering
B
The user has connected to a nearby wireless access point from another office
C
The user has configured the wireless settings with the wrong encryption type
D
The wireless access point has SSID broadcast disabled
参考解析
解析:
暂无解析
相关考题:
Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()
You executed the following command in the lsnrctl utility to stop the listener: lsnrctl STOP L1 What is the effect of this command if L1 is the only listener configured for your database?()A、It terminates all user sessions.B、It prevents users from logging in to the database remotely.C、It halts the server until all user transactions are completed.D、The server hangs, so users will receive an error asking them to login again.E、Connected users would get an error with the message "End of communication channel".
All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled
When setting security permissions on a folder, which of the following properties apply?()A、Guest users are allowed changed permissions.B、All sub-folders inherit the most restrictive permissions within the folder.C、All sub-folders within that folder are given a password.D、By default, read permissions are denied on all files within the folder.
You are designing an Active Directory site infrastructure to meet the bussiness and technical requirements. What should you do?()A、Create one site for each office and each local bank.B、Create one site for all offices. Create one site for all local banks.C、Create one site for Amsterdam. Create one site for all branch office and all local banks.D、Create one site for Amsterdam. Create one site for the Utercht brach office. Create one site for that Hague branch office. Place half the local banks in the utercht site and half the local banks in the Hague site.E、Create one site for Amsterdam. Create one site for the Utercht brach office. Create one site for each local bank that has more than 50 users. Place all the other local banks in the Amsterdam Site.
Your company is main office and a branch office are connected by a slow WAN link. All servers are located in the main office run Windows Server 2008 R2. All client computers run Windows 7. You install an application on a Remote Desktop Session Host (RD Session Host) server. Users in the branch office experience slow performance when accessing the application through Remote Desktop. You need to minimize the bandwidth utilization to the RD Session Host server. What should you do?()A、Configure BranchCache in Hosted Cache mode.B、On the RD Session Host server, configure the RDP-TCP properties to allow only Network Level Authentication.C、On each client computer, configure the Connect Experience settings in the Remote Desktop Connection client.D、On each client computer, configure the Connect From Anywhere settings in the Remote Desktop Connection client.
You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003. Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only. All user accounts are located in the default Users container. You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment. What should you do?()A、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B、 Create a toplevel OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.
Your company has an Active Directory Domain Services (AD DS) domain. You have a main office and a branc h office that are connected by a slow WAN link. A file server that runs Windows Server 2008 R2 is located in the branch office. All other servers are located in the main office. You virtualize an application by using Microsoft Application Virtualization (A pp - V) 4.5. The available bandwidth is not sufficient for branch office users to run the virtualized application. You need to ensure that branch office users can run the virtualized application by using the Microsoft Application Virtualization Desktop Clien t. What should you do?()A、On each App - V server in the main office, upgrade the App - V desktop clients to 4.6.B、On each client computer in the branch office, upgrade the App - V desktop clients to 4.6.C、On the file server in the branch office, install the Rem ote Differential Compression feature.D、In the Microsoft System Center Application Virtualization Management Server, configure an Application Virtualization file server for the branch office.
Your company has a main office and one branch office. All servers run Windows Server 2003 Service Pack 2 (SP2). In the main office, a server named DNS1 hosts the primary DNS zone for contoso.com. You configure a primary zone for west.contoso.com on a DNS server named DNS2 in the branch office. All servers in the branch office are configured to have the west.contoso.com DNS suffix. You need to ensure that users in the main office can resolve server names in the branch office. The solution must meet the following requirements: Minimize the amount of DNS zone transfer traffic between the offices.Maintain the current name resolution process for users in the main office. What should you configure on DNS1?()A、aHostrecordforDNS2.B、aslubzone for the west.contoso.com zone.C、a stub zone for the west.contoso.com zone.D、DNS2 as a forwarder.
You have an Exchange Server 2010 organization. All users connect to their mailboxes by using Microsoft Office Outlook 2007 Service Pack 2 (SP2) andWindows 7. Your companys security administrators deploy Outlook Protection Rules. You need to recommend a client connection solution for the organization to ensure that Outlook ProtectionRules can be used. What should you recommend?()A、Upgrade all client computers to Outlook 2010.B、Instruct all users to connect to Outlook Web App (OWA).C、Instruct all users to install the Rights Management Service (RMS) client.D、Instruct all users to install the Secure/Multipurpose Internet Mail Extensions (S/MIME) control.
You are the network administrator for . Your network consists of asingle Active Directory domain. All network servers run Windows Server 2003. TestKing has offices in Chicago, New York and Los Angeles. Each office has one domain controller. Each office also has its own organization unit (OU), which contains all user accounts and computer accounts in that office. The Chicago OU is accidentally deleted from Active Directory. You perform an authoritative restoration of that OU. Some users in Chicago now report that they receive the following error message when they try to log on to the domain. "The session setup from the computer DOMAINMEMBER failed to authenticate. The name of the account referenced is the security database in DOMAINMEMBER$. The following error occurred: Access is denied". How should you solve this problem?()A、Reset the computer accounts of the computers that receive the error message. Instruct the affected users to restart their computers.B、Perform a nonauthoritative restoration of Active Directory. Force directory replication on all domain controllers.C、Restart the Kerberos Key Distribution Center service on each domain controller.D、Run Nltest.exe on the computers that receive the error message. Restart the Net Logon service on the domain controller on Chicago.
You are a systems engineer for your company. Your company has 20,000 users in a large campus environment located in Los Angeles. Each department in the company is located in its own building. Each department has its own IT staff, which is responsible for all network administration within the building. The company’s network is divided into several IP subnets that are connected to one another by using dedicated routers. Each building on the company’s main campus contains at least one subnet, and possibly up to five subnets. Each building has at least one router. All routers use RIP version 2 (RIPv2) broadcasts. The company acquires a new business unit located in Denver. The Denver office has 25 users. The network in the Denver office is connected to the network at the main campus by using a leased frame relay connection. The network administrator at the Denver office installs a Windows Server 2003 computer and configures Routing and Remote Access on this server. The network administrator at the Denver office configures this server as a router and implements RIPv2 in Routing and Remote Access. Later, the Denver administrator reports that his router is not receiving routing table updates from the routers on the main campus network. He must manually add routing entries to the routing table to enable connectivity between the locations. You investigate and discover that the RIPv2 broadcasts are not being received at the Denver office. You also discover that no routing table announcements from the Denver office are being received on the main campus network. You need to ensure that the network in the Denver office can communicate with the main campus network and can send and receive automatic routing table updates as network conditions change. What should you do on the router in the Denver office?()A、 Configure the router to use RIPv1 broadcasts.B、 Configure the router to use auto-static update mode.C、 Add the IP address ranges of the main campus network to the router’s Accept list and Announce list.D、 Add the IP addresses of the main campus routers to the router’s Neighbors list.
多选题Your company has a single active directory domain. The company has a main office and three branch offices. The domain controller in the main office runs windows 2008 server and provides DNS for the main office and all of the branch offices.Each branch office runs windows server 2008. Users in the branch offices report that it takes a long time to access network resources. You confirm that there are no problems with WAN connectivity or bandwidth. You need to ensure that users in the branch offices are able to access network resources as quickly as possible. Which two actions should you perform? ()AConfigure a standard primary zone in each of the branch offices.BConfigure a forwarders that point to the DNS server in the main office.CConfigure a secondary zone in each of the branch offices that users the main office DNS server as a master.DInstall DNS servers in each of the branch offices.
单选题You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003. Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only. All user accounts are located in the default Users container. You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment. What should you do?()A Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B Create a toplevel OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.
单选题Your company is main office and a branch office are connected by a slow WAN link. All servers are located in the main office run Windows Server 2008 R2. All client computers run Windows 7. You install an application on a Remote Desktop Session Host (RD Session Host) server. Users in the branch office experience slow performance when accessing the application through Remote Desktop. You need to minimize the bandwidth utilization to the RD Session Host server. What should you do?()AConfigure BranchCache in Hosted Cache mode.BOn the RD Session Host server, configure the RDP-TCP properties to allow only Network Level Authentication.COn each client computer, configure the Connect Experience settings in the Remote Desktop Connection client.DOn each client computer, configure the Connect From Anywhere settings in the Remote Desktop Connection client.
单选题When setting security permissions on a folder, which of the following properties apply?()AGuest users are allowed changed permissions.BAll sub-folders inherit the most restrictive permissions within the folder.CAll sub-folders within that folder are given a password.DBy default, read permissions are denied on all files within the folder.
单选题Your company has an Active Directory Domain Services (AD DS) domain. You have a main office and a branch office that are connected by a slow WAN link. All servers are located in the main office. You virtualize an application by using Microsoft Application Virtualization (App - V) 4.5. The available bandwidth is not sufficient for branch office users to run the virtualized application. You need to ensure that branch office users can run the virtualized application by using the Microsoft Application Virtualization Desktop Client. What should you do?()AOn each App - V server in the main office, upgrade the App - V desktop clients to 4.6.BOn each client computer in the branch office, upgrade the App - V desktop clients to 4.6.COn each client computer in the branch office, install the application by using Windows Installer (.msi) files created by the App - V Sequencer.DIn the Micr osoft System Center Application Virtualization Management Server, configure an Application Virtualization file server for the main office.
单选题Jill, a technician, is tasked with installing BitLocker on all the machines in an office. Which of the following may the users experience?()AFrequent rebootsBDelayed processor timesCDisabled Internet connectionDDenied access to share drives
单选题Your company has an Active Directory Domain Services (AD DS) domain. You have a main office and a branc h office that are connected by a slow WAN link. A file server that runs Windows Server 2008 R2 is located in the branch office. All other servers are located in the main office. You virtualize an application by using Microsoft Application Virtualization (A pp - V) 4.5. The available bandwidth is not sufficient for branch office users to run the virtualized application. You need to ensure that branch office users can run the virtualized application by using the Microsoft Application Virtualization Desktop Clien t. What should you do?()AOn each App - V server in the main office, upgrade the App - V desktop clients to 4.6.BOn each client computer in the branch office, upgrade the App - V desktop clients to 4.6.COn the file server in the branch office, install the Rem ote Differential Compression feature.DIn the Microsoft System Center Application Virtualization Management Server, configure an Application Virtualization file server for the branch office.
单选题You are an administrator in a company that has a Main Office and 5 branch offices.In every branch office exist a Hub Transport server, and only in Main Office exists an Edge server.You add a disclaimer to all internal and external e-mail messages sent by users in the company. You discover that e-mail messages sent from one of Branch Offices do not include the disclaimer.You need to ensure that all e-mail messages include disclaimer.What should you do?()ARestart Microsoft Exchange System AttendantBModify cache settings of Branch Offices Hub Transport ServerCForce Active Directory replication on the Branch Office Domain ControllerDExport all transport rules from the Hub Transport Server in Main Office import the transport rules in the branch office Hub Transport Server
单选题Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()ABranchCacheBDirectAccessCDistributed File System Replication (DFSR)DUniversal Group Membership Caching
单选题Which statement best describes clustering in a small-business wireless network?()A allows multiple access points to be connected wirelessly, without the need for a wired Ethernet networkB replicates configuration parameters across access points in the cluster, while optimizing network performanceC automatically configures wireless client devices via Wi-Fi Protected SetupD can get real-time traffic or bandwidth statistics from an access point within a cluster
单选题You need to design a storage strategy that meets all business and technical requirements. What should you do?()ACreate a storage group for each office. Within each storage group, create a single databaseBCreate a storage group for each region. Within each storage group, create a single databaseCCreate a storage group for each region. Within each storage group, create separate databases for each office in that regionDCreate a single storage group. Within that storage group, create a separate database for each office
单选题Your company has an Active Directory Domain Services (AD DS) domain. You have a main office and a branch office that are connected by a slow WAN link. All servers are located in the main office. You virtualize an application by using Microsoft Application Virtualization (App-V) 4.5. The available bandwidth is not sufficient for branch office users to run the virtualized application. You need to ensure that branch office users can run the virtualized application by using the Microsoft Application Virtualization Desktop Client. What should you do?()AOn each App-V server in the main office, upgrade the App-V desktop clients to 4.6.BOn each client computer in the branch office, upgrade the App-V desktop clients to 4.6.COn each client computer in the branch office, install the application by using Windows Installer (.msi) files created by the App-V Sequencer.DIn the Microsoft System Center Application Virtualization Management Server, configure an Application Virtualization file server for the main office.