Your network consists of a single Active Directory site. You plan to deploy Exchange Server 2010.  You need to plan the deployment of Exchange Server 2010 servers to meet the following requirements:.All Mailbox servers must belong to a database availability group (DAG) .MAPI connections from Outlook clients must be load balanced by using a hardware load balancer .If a single server fails, users must continue to send and receive e-mail .The plan must minimize the number of servers deployed  What should you include in the plan?()A、Deploy two servers. On the two servers,deploy the Mailbox server role,the Client Access server role,and the HubTransport server role. Configure a Client Access server array.B、Deploy two servers. On the two servers, deploy the Mailbox server role,the Client Access Server role,and the HubTransport server role. Enable Outlook Anywhere on both Client Access servers.C、Deploy four servers. On two of the servers,deploy the Mailbox server role and the Hub Transport server role. On the other two servers,deploy the Client Access server role. Configure a Client Access server array.D、Deploy four servers. On two of the servers,deploy the Mailbox server role. On the other two servers,deploy the Client Access server role and the Hub Transport server role. Enable Outlook Anywhere on both Client Access servers.

Your network consists of a single Active Directory site. You plan to deploy Exchange Server 2010.  You need to plan the deployment of Exchange Server 2010 servers to meet the following requirements:.All Mailbox servers must belong to a database availability group (DAG) .MAPI connections from Outlook clients must be load balanced by using a hardware load balancer .If a single server fails, users must continue to send and receive e-mail .The plan must minimize the number of servers deployed  What should you include in the plan?()

  • A、Deploy two servers. On the two servers,deploy the Mailbox server role,the Client Access server role,and the HubTransport server role. Configure a Client Access server array.
  • B、Deploy two servers. On the two servers, deploy the Mailbox server role,the Client Access Server role,and the HubTransport server role. Enable Outlook Anywhere on both Client Access servers.
  • C、Deploy four servers. On two of the servers,deploy the Mailbox server role and the Hub Transport server role. On the other two servers,deploy the Client Access server role. Configure a Client Access server array.
  • D、Deploy four servers. On two of the servers,deploy the Mailbox server role. On the other two servers,deploy the Client Access server role and the Hub Transport server role. Enable Outlook Anywhere on both Client Access servers.

相关考题:

Network software consists of( ),or rules by which processes can communicate.A.protocolsB.programsC.devicesD.computers

Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()A.Event Trace Data Collector SetB.Performance Counter Data Collector SetC.Performance Counter Alert Data Collector SetD.System Configuration Information Data Collector Set

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network

Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use NetBIOS names to connect to all shared resources as the network. You configure a TCP/IP address and a subnet mask on each new computer. Which 2 additional TCP/IP properties should you configure on each new computer?()A、The bindings.B、A DNS address.C、A Gateway address.D、A WINS server address.E、A DHCP server address.

Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows7 on a new portable computer and join the computer to the domain. You need to ensure that the computercan establish DirectAccess connections.  What should you do?()A、Install a computer certificate.B、Create a new network connection.C、Enable the Network Discovery firewall exception.D、Add the computer account to the Network Configuration Operators group.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

You are the administrator of WXYZ.com Incorporation. Your company’s network consists of Windows 2000 Professional clients and Windows 2000 Servers. Users have started reporting that the network performance has degraded in recent times. Most of the Windows 2000 Professional clients on your network use the TCP/IP protocol to communicate with the Server. You want to increase network performance. Where do you change the binding order?()A、Windows 2000 Server  Network  Binding  Server  TCP/IP on the top.B、Windows 2000 Server  Network  Binding  Workstation  TCP/IP on the top.C、Windows 2000 Professional  Network  Binding  Server  TCP/IP on the top.D、Windows 2000 Professional  Network  Binding  Server  TCP/IP on the bottom.E、Windows 2000 Professional  Network  Binding  Workstation  TCP/IP on the top.F、Windows 2000 Professional  Network  Binding  Workstation  TCP/IP on thebottom.

Your network consists of a single Active Directory domain. The network contains five Windows Server 2008 R2 servers that host Web applications. You need to plan a remote management strategy to manage the Web servers.  Your plan must meet the following requirements: èAllow Web developers to configure features on the Web sites   èPrevent Web developers from having full administrative rights on the Web servers What should you include in your plan?()A、Configure request filtering on each Web server.B、Configure authorization rules for Web developers on each Web server.C、Configure the security settings in Internet Explorer for all Web developers by using a Group Policy.D、Add the Web developers to the Account Operators group in the domain.

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. XML Web services for the internal network run on a member server named TestKingSrv1, which is configured with default settings. You are a member of the local Administrators group on TestKingSrv1. You need the ability to remotely manage TestKingSrv1. You have no budget to purchase any additional licensing for your network until the next fiscal year. How should you reconfigure TestKingSrv1?()A、In the System Properties dialog box, enable Remote Desktop.B、Add your user account to the Remote Desktop Users local group.C、In the System Properties dialog box, enable Remote Assistance.D、Install Terminal Services by using Add or Remove Programs.

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor.  B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.

Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()A、Event Trace Data Collector SetB、Performance Counter Data Collector SetC、Performance Counter Alert Data Collector SetD、System Configuration Information Data Collector Set

Your network consists of an Active Directory domain named contoso.com. You have a computer namedcomputer1.contoso.com. Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com.  Which type of record should you request ?()A、AB、AAAAC、HINFOD、NAPTR

You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. Your network includes a shared folder named TestKingDocs. This folder must not be visible in a browse list. However, users report that they can see TestKingDocs when they browse for shared folders. How should you solve this problem?()A、Modify the share permissions to remove the All - Read permission on TestKingDocs from the Users group.B、Modify the NTFS permissions to remove the Allow - Read permissions on TestKingDocs from the Users group.C、Change the share name to TestKingDocs#.D、Change the share name to TestKingDocs$.

You are the administrator of Etechsol.com Enterprises. Your company consists of a small 20-user network. Management has decided to upgrade all computers to Windows 2000.   After having a closer examination of your company’s network, you realize that only half of the network interface cards are Net PC compliant. You decide to create Windows 2000 remote boot floppies.  What executable is used for creating RIS boot disks for non-PXE compliant clients?()A、RBFG*EXEB、RIPREP*EXEC、RIS*EXED、RISPXE*EXEE、RISBOO*EXE

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()AAutomated System Recovery (ASR)BnormalCprimaryDauthoritative

单选题Your network consists of a single Active Directory domain. The domain contains more than 300 group objects. The group objects are divided between several regional organizational units (OUs). You need to create a list of all groups that have names that begin with the word Sales. Which command should you use? ()ADsget groupBDsquery groupCNetdom queryDNet group

多选题Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use NetBIOS names to connect to all shared resources as the network. You configure a TCP/IP address and a subnet mask on each new computer. Which 2 additional TCP/IP properties should you configure on each new computer?()AThe bindings.BA DNS address.CA Gateway address.DA WINS server address.EA DHCP server address.

单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server as their messaging solution.During the course of the business week you receive instruction from Company.com to perform an automated installation of Microsoft Exchange Server 2010.What should you do?()AYou should consider having the msiexec.eex command included in your script.BYou should consider having the Ipsetupui.exe command included in your script.CYou should consider having the setup.exe command included in your script.DYou should consider having the setup.com command included in your script.

单选题You are the network administrator for . The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. TestKing acquires a subsidiary. You receive a comma delimited file that contains the names of all user accounts at the subsidiary. You need to import these accounts into your domain. Which command should you use?()AldifdeBcsvdeCntdsutil with the authoritative restore optionDdsadd user

单选题You are the network administrator for ExamSheet. Your network consists of one Windows NT Server 4.0 domain and 35 Windows 2000 Professional computers. The network consists of five interconnected TCP/IP subnets. All of the computers use TCP/IP as the only network protocol. You are adding 15 Windows 2000 Professional computers to the network. You configure each of the new computers to use DHCP. The computers can communicate with each other but are unable to communicate outside their own subnet. You run the ipconfig command to examine the IP address on one of the new computers. The IP address is 169.254.101.72 You want to enable the Windows 2000 Professional computers to communicate outside their own subnet. What should you do?()AInstall a DHCP server.BInstall a WINS server. Configure each computer to use WINS.CCreate an Lmhost file on each computer.DCreate a Hosts file on each computer.

多选题You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a HOSTS file.BConfigure a LMHOSTS file.CConfigure a WINS server database.DConfigure a DHCP server address.EConfigure at least one DNS address.

多选题Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.  Which two actions should you perform?()ARight-click and click the Diagnose option in the Connect to a network window.BSet the security type value to No authentication in the wireless network properties dialog box.CClick the Manually connect to a wireless network option in the Set up a connection or network window.DIn the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.EConfigure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.

单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()AConfigure the network category of your wireless network connection to Private.BConfigure the network category of your wireless network connection to Public.CConfigure the TCP/IP packet filtering on the wireless network connection.DConfigure the wireless network connection with the appropriate authentication to the router.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()AAutomated System Recovery (ASR)BnormalCprimaryDauthoritative