A computer configured to use DHCP cannot locate a DHCP server. Automatic Private IP Address(APIPA) will assign which of the following addresse?()A、172.16.1.25B、169.254.1.25C、10.16.1.25D、192.168.1.25

A computer configured to use DHCP cannot locate a DHCP server. Automatic Private IP Address(APIPA) will assign which of the following addresse?()

  • A、172.16.1.25
  • B、169.254.1.25
  • C、10.16.1.25
  • D、192.168.1.25

相关考题:

A computer configured to use DHCP cannot locate a DHCP server. Automatic Private IP Address(APIPA) will assign which of the following addresse?() A.172.16.1.25B.169.254.1.25C.10.16.1.25D.192.168.1.25

A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()A、Configuring the Windows Firewall exceptions.B、Using Windows Messenger.C、Configuring My Network Places.D、Using Internet Explorer.

Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN.  What should you do?()A、Use the Mobile PC program.B、Use the Ease of Access program.C、Use the System and Maintenance program.D、Use the Network and Sharing Center program.

You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower.  You need to prevent the application from auto starting without uninstalling the application.  What should you do?()A、Use the Microsoft Windows Task Manager application to end the task for the application.B、Use the Control Panel application to uninstall the application. Reboot the computer.C、Use the Software Explorer application to disable the application. Reboot the computer.D、Use the Services application to disable the Application Experience service, and then launch the application.

Your network has a main office and a branch office. The branch office has five client computers that runWindows 7. All client computers are configured to use BranchCache. At the branch office,  a computer named Computer1 is experiencing performance issues. You need to temporarily prevent all computers fromretrieving cached content from Computer1.  What should you do on Computer1?()A、At the command prompt, run Netsh branchcache flush.B、At the command prompt, run Netsh branchcache dump.C、Modify the Configure BranchCache for network files Group Policy setting.D、Modify the Set percentage of disk space used for client computer cache Group Policy setting.

You had installed Windows Server 2008 on a computer and configured it as a file server, named FileSrv1. The FileSrv1 computer contains four hard disks, which are configured as basic disks. For fault tolerance and performance you want to configure Redundant Array of Independent Disks (RAID) 0 +1 on FileSrv1. Which utility you will use to convert basic disks to dynamic disks on FileSrv1()A、Diskpart.exeB、Chkdsk.exeC、Fsutil.exeD、Fdisk.exeE、None of the above

You are the administrator of your company’s network. The dial-up server on your network is configured to support certificate authentication.   A user named Tom wants to use smart card authentication on his Windows 2000 Professional portable computer. You that Tom’s computer has a PC Card smart card reader and the appropriate drivers installed. You give Tom a smart card to use.   What else should you do to enable smart card authentication on Tom’s computer? ()A、Configure a dial-up connection to use EAP.  Select the smart card device for authentication. B、Configure a dial-up connection to use SPAP.  Select the smart card device for authentication.C、Configure a dial-up connection to use certificate authentication.  Enable the usercredentials for authentication.D、Configure a dial-up connection to connect to a private network through the Internet.  Enable L2TP be create a virtual private network (VPN) tunnel.

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.ABC.com has a server, named ABC-SR15, which is configured as a file server. You have received instructions to make sure that a user, named Mia Hamm, has the ability to generate a complete backup of ABC-SR15 via Windows Server Backup.   Which of the following actions should you take?()A、You should consider making use of Computer Management to configure the local groups.B、You should consider making use of Computer Management to configure the domain local groups.C、You should consider making use of Computer Management to configure the global groups.D、You should consider making use of Computer Management to configure the administrator groups.

You are preparing to install Windows 2000 Professional on 100 MPS-compliant computers. Each computer has two 550-MHz processors. The Computers are configured identically. You want to use one of the computers as a reference computer for deploying Windows 2000 Professional to the remaining Computers.   You install Windows 2000 Professional on the reference computer. You view Device Manager and notice that the drivers for the second processor are not installed. You want to add support for the second processor on the remaining 99 computers. You want to accomplish this with the least amount of administrative effort.  What should you do? ()A、 Use Setup Manager to configure the reference computer, and then create a disk image. B、 Use the System Preparation Tool with the -pnp parameter to set up the reference disk, and  then create a disk image. C、 Use Device Manager to add the appropriate hardware abstraction layer (HAL) to the  reference computer to support the second processor, and then Create a disk image. D、 After imaging the reference computer, restart the reference computer in safe mode and add  the driver for the second processor.

You install Windows 2000 Professional on a new APM-compliant portable computer. You notice that whenever you attempt to shut down the computer, the Windows 2000 shutdown screen remains on the screen as the power remains on. You attempt to shut off the computer by using Power Button, but you want the computer to shut off when Windows 2000 Professional shuts down. What should you do? ()A、Restart the computer, disable APM in the system BIOS, and then restart the computer. B、Restart the computer, use power options in control panel to enable APM, and restart the  computer. C、Restart the computer, use power options in control panel to enable hibernate support, and  then restart the computer. D、Restart the computer, use power options in control panel to create a different power scheme,  and then restart the computer.

You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()A、Configure each computer to join a workgroup.      Create a user account and a local profile for each user. B、Configure each computer to join a workgroup.      Create a domain user account that uses roaming user profiles. C、Configure each computer to join the domain.      Create a user account for each user on a domain controller. D、Configure each computer to join the domain.      Create domain user accounts that use roaming user profiles.

You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

Your network consists of an Active Directory domain named contoso.com. You have a computer namedcomputer1.contoso.com. Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com.  Which type of record should you request ?()A、AB、AAAAC、HINFOD、NAPTR

You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()A、 Use Computer Management to configure separate memory space for each financial application on Helene’s computer.B、 Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.C、 Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial  applications to run on Helene’s computer.D、 Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.

You are a network administrator for ExamSheet.net's Windows 2000 network.  A user named Sandra has a Windows 2000 Professional computer with a single hard disk with two partitions configured as drive C and D. A pagefile has been configured on Drive C:. Sandra reports that applications on her Windows 2000 Professional computer are running slowly. You notice that Sandra's computer has 64 MB of RAM. Her hard drive contains 70 MB of free disk space on drive C and 160 MB of free disk space on drive D.You want to improve the performance of Sandra's computer.  What should you do?()A、Move the paging file to drive DB、Use Disk Cleanup to delete temporary files and unnecessary program filesC、Perform a disk analysis, and use the disk defragmenter if recommendedD、Ensure that the Performance Options window is optimized for applicationsE、Ensure that the Performance Options services.

You are the administrator of your company's network. A use named Michael has limited dexterity, which prevents him from using a standard keyboard to complete his daily computing tasks. You want to configure his Windows 2000 Professional computer to use the appropriate accessibility options. You logon to Michael’s computer by using Michael’s user account, which is a member of local users group. You configure the stickykeys, filterkeys and togglekeys options. You then log off. Michael logs on to the computer by using this user account. Michael is able to use the accessibility option that you have configured. However, when he returns from lunch, the accessibility options are automatically turned off. What should you do? ()A、Use Accessibility Options in Control Panel to reconfigure accessibility idle time settingsB、Use Accessibility Options in Control Panel to enable the FilterKeys option to reconfigure the time settingC、Use Utility Manager to configure the accessibility options to start automatically when Windows 2000 Professional loadsD、Use Utility Manager to increase accessibility idle time setting for Michael’s accessibility options, and save the settings.

单选题“Can I use your computer?”“Of course. You are _____ liberty to use my computer at any time.”AofBonCinDat

单选题Your network contains a server named Server1. Server1 has DirectAccess deployed. A group named Group1 is enabled for DirectAccess. Users report that when they log on to their computers, the computers are not configured to use DirectAccess. You need to ensure that the users computers are configured to use DirectAccess. What should you do first?()AOn each client computer, add Group1 to the Distributed COM Users group.BOn each client computer, add Group1 to the Network Configuration Operators group.CFrom Active Directory Users and Computers, add the users user accounts to Group1.DFrom Active Directory Users and Computers, add the users computer accounts to Group1.

单选题You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. Apre-shared key is not configured on the wireless access point. You need to connect a computer that runsWindows 7 to the wireless access point.  Which security setting should you select for the wirelessconnection?()A802.1xBWPA-PersonalCWPA2-EnterpriseDWPA2-Personal

单选题You have a computer that runs Windows 7. The computer is configured to use an intranet Microsoft updateservice location. You need to view the name of the intranet service location.  What should you do?()AAt a command prompt, run Wusa.exe.BOpen Event Viewer and examine the Application log.COpen Windows Update and click View update history.DR.eview the contents of the C:///windows/windowsupdate.log file.

单选题Your network contains a client computer named Computer1 that runs Windows 7. Computer1 is configured to use DirectAccess. You need to identify the URL of the network location server that Computer1 is configured to use. What should you do?()AFrom a command prompt, run ipconfig.exe /displaydns.BFrom a command prompt, run netsh.exe namespace show policy.CFrom Control Panel, run the network adapter troubleshooter.DFrom the Network Connection Status window, view the Network Connection Details.

单选题You had installed Windows Server 2008 on a computer and configured it as a file server, named FileSrv1. The FileSrv1 computer contains four hard disks, which are configured as basic disks. For fault tolerance and performance you want to configure Redundant Array of Independent Disks (RAID) 0 +1 on FileSrv1. Which utility you will use to convert basic disks to dynamic disks on FileSrv1()ADiskpart.exeBChkdsk.exeCFsutil.exeDFdisk.exeENone of the above

多选题You are a network administrator for ExamSheet.net's Windows 2000 network.  A user named Sandra has a Windows 2000 Professional computer with a single hard disk with two partitions configured as drive C and D. A pagefile has been configured on Drive C:. Sandra reports that applications on her Windows 2000 Professional computer are running slowly. You notice that Sandra's computer has 64 MB of RAM. Her hard drive contains 70 MB of free disk space on drive C and 160 MB of free disk space on drive D.You want to improve the performance of Sandra's computer.  What should you do?()AMove the paging file to drive DBUse Disk Cleanup to delete temporary files and unnecessary program filesCPerform a disk analysis, and use the disk defragmenter if recommendedDEnsure that the Performance Options window is optimized for applicationsEEnsure that the Performance Options services.

单选题A computer configured to use DHCP cannot locate a DHCP server. Automatic Private IP Address(APIPA) will assign which of the following addresse?()A172.16.1.25B169.254.1.25C10.16.1.25D192.168.1.25

单选题Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()A Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.

单选题You are the administrator of Company’s network.  A user named Sven has a Windows 2000 Professional portable computer. He has configured the portable computer with options that provide him with the maximum battery life. Sven reports that when the laptop resumes from standby mode he does not receive a prompt for the password.  You want to configure Sven’s portable computer to ensure that a password is required when the computer resumes from standby mode.   What should you do?()AReset Sven’s user account.BAdd Sven to the Power Users group.CConfigure the Advanced power options properties.DConfigure the power options to use the Home/Office Desk power scheme by default.EConfigure the power options to use the Portable/Laptop power scheme by default.

单选题You are the desktop administrator for your company. You install Windows XP Professional on your portable computer. The computer is configured to use an IEEE 1394 PC card. You use the computer to download pictures from a digital camera while you are at the office. You attend a meeting every Monday. During the meeting you use a battery to supply power to your portable computer. Occasionally, the battery runs out of power during these meetings. You need to configure the computer to conserve battery power while you attend your weekly meeting without affecting your power options when you use the computer at your office. How should you configure your computer?()AUse Device Manager to disable the IEEE 1394 PC card power device. BIn Control Panel, select the Minimal Power Management power scheme in the Power Options Properties. CCreate an additional hardware profile, and disable the IEEE 1394 PC card for this profile. DUse Device Manager to configure the IEEE 1394 PC card Host Controller power management scheme. Select the Allow this device to bring the computer out of standby check box.