Your network includes Windows Server 2008 R2 Hyper-V servers. You are configuring the servers in a failover cluster that will host highly available virtual machines (HAVMs). You plan to manage the servers in the cluster by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to design a storage solution for the cluster that allows you to migrate virtual machines (VMs) into and out of the cluster by using SAN migration. Which two actions should you include in your design?()A、Install a Virtual Disk Service (VDS) hardware provider on each node in the clusterB、Enable the auto mount feature on each node in the clusterC、Place all VMs on a dedicated logical unit number (LUN)D、Place all VMs on a single Cluster Shared Volume (CSV)
Your network includes Windows Server 2008 R2 Hyper-V servers. You are configuring the servers in a failover cluster that will host highly available virtual machines (HAVMs). You plan to manage the servers in the cluster by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to design a storage solution for the cluster that allows you to migrate virtual machines (VMs) into and out of the cluster by using SAN migration. Which two actions should you include in your design?()
- A、Install a Virtual Disk Service (VDS) hardware provider on each node in the cluster
- B、Enable the auto mount feature on each node in the cluster
- C、Place all VMs on a dedicated logical unit number (LUN)
- D、Place all VMs on a single Cluster Shared Volume (CSV)
相关考题:
You are the network administrator for Ezonexam. The network consists of a single Active Directory domain Ezonexam.com. All network servers run Windows Server 2000.Your network includes a shared folder named EzonexamDocs. This folder must not be visible in a browse list.However, users report that they can see EzonexamDocs when they browse for shared folders.How should you solve this problem?A.Modify the share permissions to remove the All - Read permission on EzonexamDocs from the Users group.B.Modify the NTFS permissions to remove the Allow - Read permissions on EzonexamDocs from the Users group.C.Change the share name to EzonexamDocs #.D.Change the share name to EzonexamDocs $.
You are the administrator of a Windows 2000 Network for Ezonexam Inc. The network includes four Web servers named WWW1, WWW2, WWW3, and WWW4. Your network also includes a Windows 2000 Server computer that uses DNS.Each Web server contains exactly the same content, and users accessing www.Ezonexam.com can be directed to any one of them.You add records to your DNS server, as shown in the following table.Record type Name IP addressCNAME www 192.168.10.5CNAME www 192.168.10.6CNAME www 192.168.10.7CNAME www 192.168.10.8When you examine the logs for the Web servers, you discover that all incoming traffic is being directed to 192.168.10.5, which is the IP address for WWW1.You want the incoming traffic to be balanced across the four Web servers. What should you do?A.Select the Disable recursion check box in the properties of the DNS server.B.Enable round-robin in the properties of the DNS server.C.Enable W3C logging in the properties of the Web servers.D.Install and configure Network Load Balancing on WWW1.
Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP
Your virtual environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to configure the live migration network priorities for all virtual machines (VMs). What should you do?()A、Enable Cluster Shared Volumes (CSVs).B、In Failover Cluster Manager, edit the properties of a single VM.C、In Virtual Network Manager, edit the properties of the virtual network.D、In Hyper-V Manager, take each VM offline and edit the settings of each VM.
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、 core layerB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunking
In what way does Cisco SMARTnet help customers protect their network investments?()A、allows them to acquire replacement hardware as needed instead of carrying it in inventoryB、includes upgrade insuranceC、includes Cisco Learning Credits for staff trainingD、provides them with trade-in incentives for their end-of-life products
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.
Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You plan to deploy Microsoft Virtual Desktop Infrastructure. You plan to scale both static and dynamic deployments across several servers. You need to design a plan that supports static and dynamic deployments and that allows for capacity growth without outages. What should you include in your plan?()A、Use the Remote Desktop Connection Broker and failover clusteringB、Use the Remote Desktop Gateway and network load balancingC、Use network load balancing and failover clusteringD、Use DNS round-robin and network load balancing
All servers in your environment run Windows Server 2003. Your companys network includes multiple network segments and multiple routers. A member server that has the Routing and Remote Access service (RRAS) installed provides Internet connectivity for all client computers. The RRAS server is located in a perimeter network (also known as DMZ). A client computer named Client1 is unable to connect to the Internet. The RRAS server is able to connect to the Internet. You need to pinpoint the location of the network issue. What should you do?()A、 Use the nbtstat command-line tool on Client1.B、 Use the pathping command-line tool on Client1.C、 Run the nbtstat -r command on the RRAS server.D、 Run the ping -a Client1 command on the RRAS server.
You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. Your network includes a shared folder named TestKingDocs. This folder must not be visible in a browse list. However, users report that they can see TestKingDocs when they browse for shared folders. How should you solve this problem?()A、Modify the share permissions to remove the All - Read permission on TestKingDocs from the Users group.B、Modify the NTFS permissions to remove the Allow - Read permissions on TestKingDocs from the Users group.C、Change the share name to TestKingDocs#.D、Change the share name to TestKingDocs$.
单选题Your virtual environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to configure the live migration network priorities for all virtual machines (VMs). What should you do?()AEnable Cluster Shared Volumes (CSVs).BIn Failover Cluster Manager, edit the properties of a single VM.CIn Virtual Network Manager, edit the properties of the virtual network.DIn Hyper-V Manager, take each VM offline and edit the settings of each VM.
单选题You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()ADisable the Connect even if the network is not broadcasting option.BIn the Network and Sharing Center window, click the Diagnose and repair option.CSet the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.DSet the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.
单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()ASet the driver signing option to block.BSet the driver signing option to ignore.CIn the computer’s BIOS, reserve an unused IRQ for ISA devices.DIn the Device Manager, configure the second ISA network adapter to use an unused IRQ.
单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()AEnable the Require domain controller to unlock policy.BSet the Number of previous logons to cache policy to 0. CRemove all user and group accounts from the Log on locally user right. DRemove all user and group accounts from the Access this computer from the network user right.
单选题Your fireman’s outfit includes a(n)().Achemical protection face shieldBapproved work vestCself-contained breathing apparatusDmarlinspike
单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP
单选题As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()AEnable the highest level of Syslogging available to ensure you log all possible event messagesBUse SSH to access your Syslog informationCLog all messages to the system buffer so that they can be displayed when accessing the routerDSyncronize clocks on the network with a protocol such as Network Time Protocol
单选题Which phase includes conducting Cisco Unified Communications network traffic analysis and capacity planning in order to ensure high availability()ADesignBPrepareCMaintainDOptimize
单选题Your network includes 40 servers that run Windows Server 2008 R2. You plan to virtualize the servers by using Hyper-V in a failover cluster. Your plan must allow for up to two offline host servers while still maintaining highly available virtual machines. You need to recommend the minimum number of Hyper-V host servers for the cluster. How many servers should you recommend?()AFiveBThreeCFourDSix
单选题Your network includes several virtual machines (VMs) that are distributed across a Windows Server 2008 R2 Hyper-V failover cluster. You need to be able to configure the VMs in a Network Load Balancing (NLB) cluster. What should you do on each VMs network adapter?()AEnable MAC address spoofing.BDisable MAC address spoofing.CEnable TCP Offload Engine(TOE).DDisable TCP Offload Engine(TOE).
多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()Acore layerBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunking
单选题Which includes an activity to host a workshop that focuses on the identification and configuration of the actual network components (routers, servers, local-area network or LAN, and so on) that will be incorporated to run and support the Cisco Unified Communications system()AImplementBDesignCPlanDPrepare
多选题Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network. Which two actions should you perform?()ARight-click and click the Diagnose option in the Connect to a network window.BSet the security type value to No authentication in the wireless network properties dialog box.CClick the Manually connect to a wireless network option in the Set up a connection or network window.DIn the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.EConfigure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.
单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network. You need to configure the wireless connection to allow your computer to discover other computers. What should you do?()AConfigure the network category of your wireless network connection to Private.BConfigure the network category of your wireless network connection to Public.CConfigure the TCP/IP packet filtering on the wireless network connection.DConfigure the wireless network connection with the appropriate authentication to the router.
单选题You use a Windows 2000 Professional computer at home. You need to access shared files on a server named server1. This server is on your company’s network and is not accessible from the internet. Your company’s network also includes a third party VPN server that is accessible from the internet. You dial in to your internet service provider and then create a VPN connection to your company’s VPN server. After the connection is successfully established, you run the net view//server1 command and receive the following error ‘the server is inaccessible or could not be found’. You need to access the shared files on server 1. What should you do? ()AStop and then start the TCP/IP NetBIOS helper service on your computer.BStop and then start the DNS client service on your computer.CAdd a HOSTS entry for server1 to your computer.DAdd a LMHOSTS entry for server1 to your computer.