Your company uses DHCP to lease IPv4 addresses to computers at the main office. A WAN link connects the main office to a branch office. All computers in the branch office are configured with static IP addresses. The branch office does not use DHCP and uses a different subnet. You need to ensure that the portable computers can connect to network resources at the main office and the branch office.How should you configure each portable computer()?A、Use a static IPv4 address in the range used at the branch office.B、Use an alternate configuration that contains a static IP address in the range used at the main office.C、Use the address that was assigned by the DHCP server as a static IP address.D、Use an alternate configuration that contains a static IP address in the range used at the branch office.

Your company uses DHCP to lease IPv4 addresses to computers at the main office. A WAN link connects the main office to a branch office. All computers in the branch office are configured with static IP addresses. The branch office does not use DHCP and uses a different subnet.  You need to ensure that the portable computers can connect to network resources at the main office and the branch office.How should you configure each portable computer()?

  • A、Use a static IPv4 address in the range used at the branch office.
  • B、Use an alternate configuration that contains a static IP address in the range used at the main office.
  • C、Use the address that was assigned by the DHCP server as a static IP address.
  • D、Use an alternate configuration that contains a static IP address in the range used at the branch office.

相关考题:

– () – We are headquartered in Shanghai. A、How about the departmental structure in the headquartersB、What is your company profileC、Where are your headquarters

Your Web site uses custom Themes. Your Web site must support additional Themes based on the user‘s company name. The company name is set when a user logs on to the Web site. The company‘s Theme name is stored in a variable named ThemeName. You need to use this variable to dynamically set the Web site‘s Theme.What should you do?()A.B.C.D.

A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?() A. It uses a Reliable transport mechanism.B. It uses a Non-reliable transport mechanismC. It is less bandwidth-intensive than connection oriented servicesD. it uses handshaking

A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()A、It uses a Reliable transport mechanism.B、It uses a Non-reliable transport mechanismC、It is less bandwidth-intensive than connection oriented servicesD、it uses handshaking

Your company has an Active Directory domain. All computers are members of the domain. Your networkcontains an internal Web site that uses Integrated Windows Authentication. From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication. You verify that youruser account has permission to access the Web site. You need to ensure that you are automaticallyauthenticated when you connect to the Web site.  What should you do?()A、Create a complex password for your user account.B、Open Credential Manager and modify your credentials.C、Add the URL of the Web site to the Trusted sites zone.D、Add the URL of the Web site to the Local intranet zone.

You work as a network technician at Company. Your boss, Mrs.   , is interested in   GLBP. In particular, she wants to know the multicast address that this protocol uses.  What should  you tell her? ()A、 224.0.0.100B、 224.0.0.1C、 224.0.0.102D、 224.0.0.10E、 224.0.0.101F、 None of the other alternatives apply

You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.

Your company has an Active Directory domain. AlI servers run Windows Server 2008. Your company uses an Enterprise Root certificate authority (CA). You need to ensure that revoked certificate information is highly available. What should you do()A、Implement an Online Certificate Status Protocol (OCSP) responder by using Network Load Balancing.B、Implement an Online Certificate Status Protocol (OCSP) responder by using an Internet Security and Acceleration Server array.C、Publish the trusted certificate authorities list to the domain by using a Group Policy Object (GPO).D、Create a new Group Policy Object (GPO) that allows users to trust peer certificates. Link the GPO to the domain.

Your company has an Active Directory forest. The company has servers that run Windows Server   2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.   Your partner company has an Active Directory forest that contains a single domain. The company has  servers that run Windows Server 2008 R2 and client computers that run Windows 7.   You need to configure your partner companys domain to use the approved set of administrative  templates.   What should you do()A、Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site,  import the GPO to the default domain policy.B、Copy the ADMX files from your companys PDC emulator to the PolicyDefinitions folder on the partner  companys PDC emulator.C、Copy the ADML files from your companys PDC emulator to the PolicyDefinitions folder on thepartner  companys PDC emulator.D、Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates  Web site. Copy the ADM files to the PolicyDefinitions folder on the partner companys PDC emulator.

Your company uses a SQL Server 2005 database. Customer data from your trading partners is imported into the Customers table every night. You need to ensure that the customer record is updated if it already exists in the Customers table. If the record does not exist, the data needs to be inserted into the Customers table. What should you do?()A、 Create a FOR trigger. B、 Create an INSTEAD OF trigger. C、 Create an AFTER trigger. D、 Create a DDL trigger.

You are the administrator of ExamSheet.net's network.   Your Windows 2000 Professional computer has a removable disk device installed. The device can use storage modules of varying sizes. You use these storage modules to transfer graphics files between your location and a printing company. The printing company uses Windows 98. You insert a new 100 MB disk device into your computer and format the new disk device as NTFS with the default options. You then place large graphics files on the disk device and deliver it to the printing company. The printing company reports that they are unable to access the files.  You want the printing company to be able to access the graphics files on the new disk device. What should you do?()A、Format the new disk device as NTFS with a 4 KB cluster size.B、Format the new disk device as FAT32 with a 4 KB cluster size.C、Format the new disk device as FAT32 with a 1 KB cluster size.D、Format the new disk device as FAT16 with a 4 KB cluster size.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You have to perform the backup of the default trace according to the requirement of your failure recovery plan. The default trace is contained in the subdirectory.You have to backup the subdirectory.  Which SQL Server database engine subdirectory should be backed up?()A、DATAB、INSTALL C、LOG D、BINN

Your Windows 2000 Professional computer has a removable disk device installed. The device can use storage modules of varying sizes. You use these storage modules to transfer graphics filed between your location and a printing company. The printing company uses Windows NT 4.0 service pack 3. You insert a new 20-Mailbox disk device into your computer. When you attempt to format it as FAT32 with the default options, you receive the following error message “Windows was unable to complete the format.” You need to format the device so that you can use it to send a large graphic file to the printing company. How should you format the device?()A、As FAT 16 with a 4-KB cluster sizeB、As FAT 32 with a 1-KB cluster sizeC、As FAT 32 with a 4-KB cluster sizeD、As NTFS with a 4-KB cluster size

单选题You are a database administrator for your company. The company uses a SQL Server 2005 database that includes a table named Inventory. The table contains a column named Price. A company policy states that the value in the Price column cannot be decreased by more than 10 percent in any single database operation. Updates to the Price column are made by various means, including by using ad hoc queries. You need to ensure that this company policy is enforced. What should you do?()ACreate a trigger that rolls back changes to the Price column that violate company policy.BCreate a stored procedure that disallows changes to the Price column that violate company policy.COn the Price column, create a check constraint that requires a specified minimum value.DOn the Price column, create a foreign key constraint to a table that contains valid prices.

单选题Your company has an Active Directory forest. The company has servers that run Windows Server 2008 amd client computers that run Windows Vista. The domain uses a set of GPO administrative templates that have been approved to support regulatory compliance requirements. Your partner company has an Active Directory forest that contains a single domain, The company has servers that run Windows Server 2008 and client computers that run Windows Vista. You need to configure your partner company’s domain to use the approved set of administrative templates. What should you do()AUse the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPO to the default domain policy.BCopy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorCCopy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorDDownload the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy the ADM files to the PolicyDefinitions folder on thr partner company’s emulator.

单选题Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()AConfigure the NWLink frame type of the network adapters to be ethernet 802.3.BConfigure the NWLink frame type of the network adapters to be ethernet II.CReplace the network adapters with 10/100 BNC adapters.DReplace the network adapters with 10/100 UTP network adapters.

单选题Your company uses a SQL Server 2005 database. Customer data from your trading partners is imported into the Customers table every night. You need to ensure that the customer record is updated if it already exists in the Customers table. If the record does not exist, the data needs to be inserted into the Customers table. What should you do?()A Create a FOR trigger. B Create an INSTEAD OF trigger. C Create an AFTER trigger. D Create a DDL trigger.

单选题Putting your mobile phone on a restaurant table may make your friends think _____.Ayou prefer to talk to your friends at the tableByou value your calls more than your friendsCyou are enjoying the company of your friendsDyou are polite and considerate of your friends

问答题Task I (10 marks)  Write a letter to a company declining a job offer. In the letter, you:  ● Express your gratitude to the company for the job offer  ● Explain the reason(s) why you have to decline the offer  ● Apologise and extend your good wishes to the company  Write a letter of between 100 and 120 words in an appropriate style on the answer sheet. Do not write your name or address.

单选题Your company has an Active Directory forest. The company has servers that run Windows Server  2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.     Your partner company has an Active Directory forest that contains a single domain. The company  has servers that run Windows Server 2008 R2 and client computers that run Windows 7.     You need to configure your partner company’s domain to use the approved set of administrative  templates.   What should you do()AUse the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPBCopy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDCCCopy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC DDownload the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site.

单选题You work as a network technician at Company. Your boss, Mrs.   , is interested in   GLBP. In particular, she wants to know the multicast address that this protocol uses.  What should  you tell her? ()A 224.0.0.100B 224.0.0.1C 224.0.0.102D 224.0.0.10E 224.0.0.101F None of the other alternatives apply

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now you get an order from your company CIO, you have to identify whether a database integrity check (DBCC CHECKDB) was run for a particular database.  Which log file should you examine?()Alog.trc Bdefault.trc CERRORLOG DSQLAGENT

单选题Your company’s network has client computers that run Windows 7.   A software vendor releases version 2 of an application that your company uses.  Your company currently uses version 1.  Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application.   You have the following requirements:Users must be able to run both versions of the application on their computers.   Version 2 must be available when a client computer is not connected to the network.  You need to plan a software deployment process that meets the requirements.   What should you do?()A Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B Deploy version 2 of the application as a Remote Desktop Services RemoteApp.C Deploy version 2 of the application by using a Group Policy Software Installation policy.D Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.

单选题Your Windows 2000 Professional computer has a removable disk device installed. The device can use storage modules of varying sizes. You use these storage modules to transfer graphics filed between your location and a printing company. The printing company uses Windows NT 4.0 service pack 3. You insert a new 20-Mailbox disk device into your computer. When you attempt to format it as FAT32 with the default options, you receive the following error message “Windows was unable to complete the format.” You need to format the device so that you can use it to send a large graphic file to the printing company. How should you format the device?()AAs FAT 16 with a 4-KB cluster sizeBAs FAT 32 with a 1-KB cluster sizeCAs FAT 32 with a 4-KB cluster sizeDAs NTFS with a 4-KB cluster size

单选题You are the administrator of Company’s network.  Your Windows 2000 Professional computer has a removable disk device installed. The device can use storage modules of varying sizes. You use these storage modules to transfer graphics files between your location and a printing company. The printing company uses Windows 98. You insert a new 1 GB disk device into your computer and format the new disk device as NTFS with the default options. You then place large graphics files on the disk device and deliver it to the printing company. The printing company reports that they are unable to access the files.  You want the printing company to be able to access the graphics files on the new disk device.   What should you do? ()AFormat the new disk device as FAT16 with a 128 KB cluster size.BFormat the new disk device as FAT32 with a 4 KB cluster size.CFormat the new disk device as NTFS with a 4 KB cluster size.DFormat the new disk device as NTFS with a 8 KB cluster size.

问答题Practice 2  ● Recently your company is planning to bid for hosting an exhibition and now the manager of your company has asked you to write a letter to the organizing committee to introduce your company to them.  ● Write a letter to introduce the details about your company.  ● introducing the department structure and service,  ● introducing previous exhibitions you have hosted,  ● expressing your confidence in the success if you are permitted to host it.

问答题Practice 9  ● You are the Purchasing Manager for a large company. Last month you decided to look for a new supplier for the stationery and office equipment that your company uses. You have found a new supplier, Compass Office Goods Ltd.  ● Write a memo to your company’s department heads:  ● explaining why you looked for a new supplier.  ● saying who the new supplier is.  ● asking for feedback about the goods that they supply.  ● Write 40—50 words.

多选题A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()AIt uses a Reliable transport mechanism.BIt uses a Non-reliable transport mechanismCIt is less bandwidth-intensive than connection oriented servicesDit uses handshaking