Your company named Contoso, Ltd. has a Network Load Balancing cluster named nlb.contoso.com. The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenly distributes HTTP traffic between both hosts.  You need to configure WEB2 to handle all HTTPS traffic for nlb.contoso.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2.  Which two actions should you perform?()A、In the properties for WEB2, change the Handling priority option for the TCP 443 port rule to the value of1.B、In the properties for WEB1, change the Handling priority option for the TCP 443 port rule to the value of 0.C、In the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering mode option set to Single host.D、In the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering mode option set to Multiple host and the Affinity option set to the value of Single.

Your company named Contoso, Ltd. has a Network Load Balancing cluster named nlb.contoso.com. The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenly distributes HTTP traffic between both hosts.  You need to configure WEB2 to handle all HTTPS traffic for nlb.contoso.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2.  Which two actions should you perform?()

  • A、In the properties for WEB2, change the Handling priority option for the TCP 443 port rule to the value of1.
  • B、In the properties for WEB1, change the Handling priority option for the TCP 443 port rule to the value of 0.
  • C、In the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering mode option set to Single host.
  • D、In the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering mode option set to Multiple host and the Affinity option set to the value of Single.

相关考题:

Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()A. a conditional forwarderB. a GlobalNames zoneC. a secondary zoneD. a zone delegation

Your company, Contoso, Ltd., has a main office and a branch office. The offices are connected  by a WAN link. Contoso has an Active Directory forest that contains a single domain named  ad.contoso.com.     The ad.contoso.com domain contains one domain controller named DC1 that is located in the  main office. DC1 is configured as a DNS server for the ad.contoso.com DNS zone. This zone is  configured as a standard primary zone.   You install a new domain controller named DC2 in the branch office. You install DNS on DC2.  You need to ensure that the DNS service can update records and resolve DNS queries in the  event that a WAN link fails.     What should you do()A、Create a new stub zone named ad.contoso.com on DC2.B、Configure the DNS server on DC2 to forward requests to DC1.C、Create a new secondary zone named ad.contoso.com on DC2.D、Convert the ad.contoso.com zone on DC1 to an Active Directory-integrated zone.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. Your company has a Network Load Balancing cluster named nlb.wiikigo.com.The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenlydistributes HTTP traffic between both hosts. WEB2 needs to be configured to handle all HTTPS traffic fornlb.wiikigo.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2. What should you do to achieve this?()A、In the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Single host.B、In the properties for WEB2, the Handling priority option for the TCP 443 port rule should be changed tothe value of 1.C、In the properties for WEB1, the Handling priority option for the TCP 443 port rule should be changed tothe value of 0.D、In the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Multiple host and the Affinity option set to the value of Single.

Your network contains an Active Directory domain named contoso.com. The network is configured to use ISATAP.You have a server named Server1 that runs Windows Server 2008 R2.On Server1, you discover that a tunnel adapter named isatap.contoso.com has a Media State of Media disconnected.You confirm that Server1 has a valid network connection and can query the DNS server.You need to ensure that the isatap.contoso.com tunnel adapter has an IPv6 address.What should you do?()A、Start the IP Helper service.B、Start the IPsec Policy Agent service.C、Add a new rule to Windows Firewall.D、Add an entry for ISATAP to the Hosts file.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

You have two hosts that run VMware ESX. You need to recommend a management solution for the virtual machines (VMs) on the VMware hosts. The solution must support the ability to move the VMs from one VMware host to the other VMware host by using VMware vMotion technology. What should implement on the network?()A、a failover cluster between the VMsB、Second-Level Address Translation (SLAT)C、a failover cluster for the Hyper-V hostsD、virtual machine queue (VMQ)E、quick migrationF、Virtual Machine ChimneyG、Microsoft System Center Operations Manager with Performance and Resource Optimization (PRO)H、Network Attached Storage (NAS)I、Network Load Balancing (NLB) for the VMsJ、Network Load Balancing (NLB) for the Hyper-V hostsK、Windows System Resource Manager (WSRM)L、Microsoft System Center Virtual Machine Manager 2008 R2M、Cluster Shared Volumes (CSV)N、pass-through disks

Your company has a main office and a branch office. The offices connect by using WAN links. The network consists of a single Active Directory domain. An Active Directory site exists for each office.   Servers in both offices run Windows Server 2008 R2 Enterprise.   You plan to deploy a failover cluster solution to service users in both offices.  You need to plan a failover cluster to meet the following requirements: èMaintain the availability of services if a single server fails èMinimize the number of servers required What should you include in your plan?()A、Deploy a failover cluster that contains one node in each office.B、Deploy a failover cluster that contains two nodes in each office.C、In the main office, deploy a failover cluster that contains one node. In the branch office, deploy a  failover cluster that contains one node.D、In the main office, deploy a failover cluster that contains two nodes. In the branch office, deploy a  failover cluster that contains two nodes.

Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()A、a conditional forwarderB、a GlobalNames zoneC、a secondary zoneD、a zone delegation

You have a Windows Server 2008 R2 Hyper-V failover cluster that has 16 nodes. You plan to load- balance eight virtual machines (VMs) on the Hyper-V failover cluster by using network load balancing (NLB). You need to ensure that the NLB cluster converges. What should you do?()A、Set the NLB cluster type to MulticastB、Dedicate a virtual network for all NLB trafficC、Use static MAC addresses for the parent network adapterD、Enable spoofing of MAC addresses on the virtual network adapter

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are two servers named FC01 and FC02 in your company. And WindowsServer 2008 Enterprise is run by the server. The Failover Clustering feature is installed on the server. Theserver is configured as a two-node cluster. An application named APP01 is run by the cluster. The company work time is from 09:00 to 17:00. You need to make sure that APP01 can be accessed duringthese hours. FC01 is configured as the preferred owner for APP01. And you are required to preventfailback of the cluster during business hours. Which action should be performed to achieve the goal?()A、To achieve the goal, the Prevent failback option should be enabled in the Failover properties.B、To achieve the goal, the If resource fails, attempt restart on current node policy should be enabled for all APP01 resources. And then, the Maximum restarts for specified period should be set to 0.C、To achieve the goal, the Period option should be set to 8 hours in the Failover properties.D、To achieve the goal, the Allow failback option should be set to allow failback between 17 and 9 hours in the Failover properties.

You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.

Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

You plan to deploy two virtual machines (VMs) that will be configured as nodes in a failover cluster. The VMs will run file and print services. You need to recommend a storage solution for the planned deployment. What should you include in the recommendation?()A、pass-through disksB、Network Load Balancing (NLB) for the Hyper-V hostsC、virtual machine queue (VMQ)D、Cluster Shared Volumes (CSV)E、an iSCSI Storage Area Network (SAN)F、a failover cluster for the Hyper-V hostsG、Network Load Balancing (NLB) for the VMsH、Network Attached Storage (NAS)I、Microsoft System Center Operations Manager with Performance and Resource Optimization (PRO)J、Windows System Resource Manager (WSRM)K、a failover cluster between the VMsL、Virtual Machine ChimneyM、Second-Level Address Translation (SLAT)N、quick migration

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully.   You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node.   However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF://0A:32:08:46."   In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF://0A:32:08:46." Only the hardware address is different in the two descriptions.  You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes.  You want to configure a four-node Network Load Balancing cluster.   What should you do?  ()A、 Configure the fourth node to use multicast mode.B、 Remove 10.50.8.70 from the Network Connections Properties of the fourth node.C、 On the fourth node, run the nlb.exe resume command.D、 On the fourth node, run the wlbs.exe reload command.

Your company named Contoso, Ltd. has a Web server named WEB1.   The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com.  The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site.  You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()A、Contoso, Ltd.B、owa.contoso.comC、WEB1D、web1.contoso.com

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You work in a company named Wiikigo, Ltd. and there is a two-node Network Load Balancing cluster. Onlythe intranet Web site will be provided with the high availability and load balancing by the cluster. Thecompany names the cluster as web.wiikigo.com. You find a problem that the Network Load Balancingcluster can be seen in the network neighborhood by the Wiikigo users. And the users can utilize the web.wiikigo.com name to get access to various services. The web.wiikigo.com Network Load Balancing clusteris set with only one port rule. Since you are the technical support, you are required have the web.wiikigo.com Network Load Balancing cluster configured to receive only HTTP traffic. Which two actions should be performed to achieve the goal?()A、To achieve the goal, the Network Load Balancing Clusters console should be opened and a new Allow rule should be created for TCP port 80.B、To achieve the goal, the Network Load Balancing Clusters console should be opened and the default port rule should be modified to a disabled port range rule.C、To achieve the goal, one of the cluster nodes should be logged on to and the wlbs disable all command should be run.D、To achieve the goal, the Network Load Balancing Clusters console should be opened and the default port rules should be deleted.

You plan to implement Hyper-V live migration. You configure the Hyper-V hosts to connect to a shared storage. You need to prepare the Hyper-V hosts for the implementation of live migration. What should you configure on the Hyper-V hosts?()A、Microsoft System Center Operations Manager with Performance and Resource Optimization (PRO)B、virtual machine queue (VMQ)C、Network Load Balancing (NLB) for the VMsD、quick migrationE、Microsoft System Center Virtual Machine Manager 2008 R2F、Network Load Balancing (NLB) for the Hyper-V hostsG、Cluster Shared Volumes (CSV)H、Windows System Resource Manager (WSRM)I、Virtual Machine ChimneyJ、pass-through disksK、a failover cluster for the Hyper-V hostsL、Second-Level Address Translation (SLAT)M、a failover cluster between the VMsN、Network Attached Storage (NAS)

Your network contains two servers that run the Server Core installation of Windows Server 2008 R2.  The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site.  Administrators use client computers that run Windows 7.   You need to recommend a strategy that allows the administrators to remotely manage the Network Load  Balancing cluster. Your strategy must support automation.  What should you recommend?()A、On the servers, enable Windows Remote Management (WinRM).B、On the servers, add the administrators to the Remote Desktop Users group.C、On the Windows 7 client computers,enable Windows Remote Management (WinRM).D、On the Windows 7 client computers,add the administrators to the Remote Desktop Users group.

Your network consists of a single Active Directory domain. The network contains two Windows Server 2008 R2 computers named Server1 and Server2. The company has two identical print devices. You plan to deploy print services.  You need to plan a print services infrastructure to meet the following requirements: èManage the print queue from a central location.    èMake the print services available, even if one of the print devices fails. What should you include in your plan?()A、Install and share a printer on Server1. Enable printer pooling.B、Install the Remote Desktop Services server role on both servers.Configure Remote Desktop Connection broker(RD Connection Broker).C、Install and share a printer on Serve1. Install and share a printer on Server2. Use Print Management to install the printers on the client computers.D、 Add Server1 and Server2 to a Network Load Balancing cluster. Install a printer on each node of the  cluster.

Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in Paris where you are located.you are responsible for managing two exchange servers named -ex01 and -ex02.both exchange servers are configured to host the client access server role, the hub transport server role as well as the mailbox server role.terstkingex01 and -ex02 are members of a database availability group.during the course of the week you receive an instruction from management to ensure that users are able to make a connection to the client access server in the event of a single server failure. What should you do?()A、Your best option would be to have the Network Load Balancing feature installed on every server.Thereafter a second IP address should be assigned to every network adapter.B、Your best option would be to have two new records created for the Client Access server from the DNS manager.C、Your best option would be to have a hardware load balancer deployed. Then a DNS record should be created for the virtual IP address. Thereafter a Client Access server array should be configured.D、Your best option would e to have a new service named Client Access Server created and a new IP address allocated from the Failover Cluster Manager.

Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()A、Create a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleB、Run the wlbs disable command on the cluster nodesC、Assign a unique port rule for NLB cluster by using the NLB Cluster consoleD、Delete the default port rules through Network Load Balancing Cluster console

单选题You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B Use packet filtering on all inbound traffic to the cluster.C Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D Use intrusion detection on the perimeter network.

单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

单选题Your company named Contoso, Ltd. has a Web server named WEB1.   The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com.  The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site.  You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()AContoso, Ltd.Bowa.contoso.comCWEB1Dweb1.contoso.com