Your network uses IPv4.You install a server that runs Windows Server 2008 at a branch office.The server is configured with two network interfaces. You need to configure routing on the server at the branch office.Which two actions should you perform? (Each correct answer presents part of the solution.()A、Install the Routing and Remote Access Services role service.B、Run the netsh ras ip set access ALL command.C、Run the netsh interface ipv4 enable command.D、Enable the IPv4 Router Routing and Remote Access option.

Your network uses IPv4.You install a server that runs Windows Server 2008 at a branch office.The server is configured with two network interfaces. You need to configure routing on the server at the branch office.Which two actions should you perform? (Each correct answer presents part of the solution.()

  • A、Install the Routing and Remote Access Services role service.
  • B、Run the netsh ras ip set access ALL command.
  • C、Run the netsh interface ipv4 enable command.
  • D、Enable the IPv4 Router Routing and Remote Access option.

相关考题:

Your network uses the172.12.0.0 class B address. You need to support 459 hosts per subnet, while accommodating the maximum number of subnets. Which mask would you use?A.255.255.0.0.B.255.255.128.0.C.255.255.224.0.D.255.255.254.0.E.None of the above

Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()A.AB.BC.CD.D

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E

The EIGRP configuration in the Glencoe router uses a single network statement.From the output shown in the graph would advertise these networks in EIGRP?() A.network 172.26.168.0 area 478B.network 172.26.0.0C.network 172.26.168.128 0.0.0.127D.network 172.26.168.128 area 478

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

The EIGRP configuration in the Glencoe router uses a single network statement.From the output shown in the graph would advertise these networks in EIGRP?()A、network 172.26.168.0 area 478B、network 172.26.0.0C、network 172.26.168.128 0.0.0.127D、network 172.26.168.128 area 478

Your network uses the172.12.0.0 class B address. You need to support 459 hosts per subnet, while accommodating the maximum number of subnets. Which mask wouldyou use?()A、255.255.0.0.B、255.255.128.0.C、255.255.224.0.D、255.255.254.0.

You work as a network technician at Company. Your boss, Mrs.   , is interested in   GLBP. In particular, she wants to know the multicast address that this protocol uses.  What should  you tell her? ()A、 224.0.0.100B、 224.0.0.1C、 224.0.0.102D、 224.0.0.10E、 224.0.0.101F、 None of the other alternatives apply

A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use NetBIOS names to connect to all shared resources as the network. You configure a TCP/IP address and a subnet mask on each new computer. Which 2 additional TCP/IP properties should you configure on each new computer?()A、The bindings.B、A DNS address.C、A Gateway address.D、A WINS server address.E、A DHCP server address.

Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.

Your network consists of a single Active Directory domain. The network contains a file server that runs Windows Server 2008 R2. All servers use internal storage only. You plan to deploy a client/server application.   You need to deploy the application so that it is available if a single server fails. You must achieve this goal  while minimizing costs. What should you do?()A、Deploy RemoteApp.B、Deploy a failover cluster that uses No Majority: Disk Only.C、Deploy a failover cluster that uses Node and File Share Disk Majority.D、Deploy Distributed File System (DFS) and configure replication.

Your computer uses both wired and wireless network connections. The networks are not connected to each other.  You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder.  You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.  What should you do?()A、Turn off the Windows Firewall feature.B、Disable the Block all incoming connections option.C、Turn off the Spyware and other malware protection option.D、Enable the File and Printer Sharing exception in the firewall settings of the wireless network adapter.

Your network contains a single Active Directory domain. All domain controllers run Windows Server   2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches.   You need to recommend a strategy for network access that meets the following requirements:   èUsers are unable to bypass network access restrictions.   èOnly client computers that have up-to-date service packs installed can access the network.   èOnly client computers that have up-to-date anti-malware software installed can access the network.   What should you recommend?()A、Implement Network Access Protection (NAP) that uses DHCP enforcement.B、Implement Network Access Protection (NAP) that uses 802.1x enforcement.C、Implement a Network Policy Server (NPS), and enable IPsec on the domain controllers.D、Implement a Network Policy Server (NPS), and enable Remote Authentication Dial-In User Service  (RADIUS) authentication on the managed switches.

Your network is configured as shown in the following diagram.     Each office contains a server that has the File Services server role installed. The servers have a shared folder named Resources.   You need to plan the data availability of the Resources folder. Your plan must meet the following  requirements:   èIf a WAN link fails,the files in the Resources folder must be available in all of the offices.   èIf a single server fails, the files in the Resources folder must be available in each of the branch offices,and the users must be able to use existing drive mappings.   èYour plan must minimize network traffic over the WAN links. What should you include in your plan?()A、a stand-alone DFS namespace that uses DFS Replication in a full mesh topologyB、a domain-based DFS namespace that uses DFS Replication in a full mesh topologyC、a stand-alone DFS namespace that uses DFS Replication in a hub and spoke topologyD、a domain-based DFS namespace that uses DFS Replication in a hub and spoke topology

Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible.  What should you do()?  A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connectionsC、Configure VPN connections to use MS-CHAP v2 authenticationD、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP

单选题Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()AConfigure the NWLink frame type of the network adapters to be ethernet 802.3.BConfigure the NWLink frame type of the network adapters to be ethernet II.CReplace the network adapters with 10/100 BNC adapters.DReplace the network adapters with 10/100 UTP network adapters.

多选题Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use NetBIOS names to connect to all shared resources as the network. You configure a TCP/IP address and a subnet mask on each new computer. Which 2 additional TCP/IP properties should you configure on each new computer?()AThe bindings.BA DNS address.CA Gateway address.DA WINS server address.EA DHCP server address.

单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()AThe network uses MAC filteringBThe network uses WEPCThe network uses SSID broadcastDThe network uses WPA

单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP

单选题Your network has a main office and a branch office. The branch office has five client computers that runWindows 7 and a server that runs Windows Server 2008 R2. The branch office server is enabled for branchCache. You need to configure Windows Firewall on each client computer so that cached content canbe retrieved from the branch office server.  Which firewall rule should you enable on the client computers?()ABranchCache - Content Retrieval (Uses HTTP)BBranchCache - Hosted Cache Server (Uses HTTPS)CBranchCache - Peer Discovery (Uses WSD)DFile and Printer Sharing

多选题Which two are uses of NAT?()Aenabling network migrationsBconserving public IP addressesCallowing stateful packet inspectionDpreventing unauthorized connections from outside the network

单选题Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()AConfigure a Windows Connect Now Group Policy.BConfigure a Wireless Network (IEEE 802.11) Policy.CDelete the rogue network from the Network and Sharing Center on each computer.DCreate a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

单选题You use a Windows 2000 Professional portable computer both at the office and at home. In the office you connect the portable computer to a docking station and use Internet Explorer to access the Internet through your LAN connection.  At home, you configure a new dial-up connection to the Internet. Now when you attempt to access the Internet from the office you are prompted to connect via your dial-up connection. When you cancel this message, you can only work offline and cannot access the Internet.  You want to maintain your dial-up connection for home use and your ability to access the Internet when connected to the company LAN. What should you do?()AReconfigure the dial-up connection to dial-up to a private network.BCreate another connection that uses a virtual private network (VPN) to connect a private network though the Internet.CConfigure Internet Explorer to automatically detect proxy settings.DConfigure Internet Explorer to dial whenever a network connection is not present.

多选题You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a HOSTS file.BConfigure a LMHOSTS file.CConfigure a WINS server database.DConfigure a DHCP server address.EConfigure at least one DNS address.

单选题Your network contains an Active Directory forest. The functional level of the forest is Windows Server 2008 R2.You plan to deploy DirectAccess.You need to configure the DNS servers on your network to support DirectAccess.What should you do?()AModify the GlobalQueryBlockList registry key and restart the DNS Server service.BModify the EnableGlobalNamesSupport registry key and restart the DNS Server service.CCreate a trust anchor that uses a certificate issued by an internal certification authority (CA).DCreate a trust anchor that uses a certificate issued by a publicly trusted certification authority (CA).

单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()AConfigure the network category of your wireless network connection to Private.BConfigure the network category of your wireless network connection to Public.CConfigure the TCP/IP packet filtering on the wireless network connection.DConfigure the wireless network connection with the appropriate authentication to the router.

单选题Your company’s network has client computers that run Windows 7.   A software vendor releases version 2 of an application that your company uses.  Your company currently uses version 1.  Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application.   You have the following requirements:Users must be able to run both versions of the application on their computers.   Version 2 must be available when a client computer is not connected to the network.  You need to plan a software deployment process that meets the requirements.   What should you do?()A Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B Deploy version 2 of the application as a Remote Desktop Services RemoteApp.C Deploy version 2 of the application by using a Group Policy Software Installation policy.D Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.