You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()A、OSPFB、RIPC、BGPD、static

You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()

  • A、OSPF
  • B、RIP
  • C、BGP
  • D、static

相关考题:

You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()A. OSPFB. RIPC. BGPD. static

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A. from source-portB. from source-addressC. from destination-addressD. from destination-port

You must segement your internal 192.168.1.0/24 network into a minimun of 12 subnet, each containing a minimun of 12 hosts. Which network mask do you use?() A. /26B. /27C. /28D. /29

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A、from source-portB、from source-addressC、from destination-addressD、from destination-port

You must segement your internal 192.168.1.0/24 network into a minimun of 12 subnet, each containing a minimun of 12 hosts. Which network mask do you use?()A、/26B、/27C、/28D、/29

You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A、/24B、/26C、/27D、/28

You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts. Which network mask do you use?()A、/26B、/27C、/28D、/29

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messagingsolution.During the course of the business week you receive instruction from Company.com to have a set of cmdlets grouped for administrative delegation of duties.What should you do?()A、You should consider having a new management role created.B、You should consider having a new role assignment policy created.C、You should consider having a managed folder mailbox policy created.D、You should consider having a new distribution group created.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single site named KingSite1.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging  solution.Company.com has recently configured the mailbox server as members of a database availability group (DAG) with a public folder database. During the course of the business week you receive instruction from Company.com to create a new Active Directory site and install Exchange server in the site whilst ensuring the public folders are stored on servers in both sites. What should you do?()A、You should consider having clustered continuous replication (CCR) configured on two servers in the new site.You should then have the replication settings for all public folder databases modified.B、You should consider having the standby continuous replication (SCR) configured on a server in the new site.You should then have the Enable-StorageGroupCopy cmdlet run from a server in the new site.C、You should consider having a public folder database created on a server in the new site.You should then have the replication settings for all public folders modified.D、You should consider having a public folder database created on a server in the new site.You should then have the set-DatabaseAvailabilityGroup cmdlet run from a server in the new site.

You have a file server named Server1 that runs Windows Server 2003 Service Pack (SP2). Server1 has a 10-gigabit network adapter and is connected to a 100-Mb switch. You replace the 100-Mb switch by using a 1-GB switch. You discover that copying files to Server1 over the network is slow. You need to reduce the amount of time it takes to copy files to Server1 over the network. Which connection type should you specify for the network adapter? ()A、1-gigabit half-duplexB、1-gigabit full-duplexC、10-gigabit half-duplexD、10-gigabit full-duplex

You are designing the IP address assignment strategy for the VPN users. Which two actions should you perform.()A、 Configure VPN1 as a DHCP Relay Agent.B、 Configure VPN1 to assign IP Address by using DHCP server.C、 Configure VPN1 to have a static pool of IP Address from the network address of 131.107.1.0/24.D、 Configure VPN1 to have a static pool of IP Address from the network address of 192.168.1.0/24.E、 Configure the perimeter firewall to allow inbound DHCP traffic to be passed to VPN1.F、 Configure the interval firewall to allow DHCP broadcasts to be forwarded from the external network to the internal network.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2008 Service Pack 2 (SP2) as their messaging solution.During the course of the business week you receive instruction from Company.com to plan the installation of Microsoft Exchange Server 2010 whilst ensuring you install the Microsoft Exchange Server 2010 prerequisites for the Mailbox, Hub Transport and Client Access server roles. What should you do?()A、You should consider having Windows Management Framework installed.You should have Message Queuing installed before installing the Web Server role.B、You should consider having Windows Management Framework installed.You should then have the Web Server role installed before installing the RPC over HTTP Proxy component.C、You should consider having Microsoft .NET Framework 3.5 Service Pack 1 (SP1) installed. You should then have Install Windows Management Framework installed and run the ServerManagerCmd.exe -IP Exchange-Typical.xml command.D、You should consider having Microsoft .NET Framework 3.5 Service Pack 1 (SP1) installed. You should then have Windows Remote Management (WinRM) 2.0 installed and run the ServerManagerCmd.exe -IP Exchange-Base.xml command.

You have a single network segment. All servers run Windows Server 2003 Service Pack 2 (SP2). You have a DHCP server named Server1. Client computers receive IP addresses from Server1. You add a second network segment separated by a RFC 1542-compliant router. You need to ensure that computers in the new network segment can receive their IP configurations from Server1. You make the appropriate configuration changes on the router.  What should you do on Server1?()A、Create a new scope.B、Configure a DHCP Relay Agent.C、Add an Extensions Path scope option.D、Create a new exclusion range in the existing scope.

You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()A、You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.B、You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.C、You should consider having mail enabled for KingPublic.D、You should consider having the author role assigned to Anonymous.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the week you receive an instruction from the CIO to stop internal users from sending e-mail messages containing the words "Classified Data" to users outside the organization. What should you do?()A、You should consider creating a message classification.B、You should consider creating a Transport rule.C、You should consider creating a Send connector.D、You should consider creating a managed folder mailbox policy.

Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()A、Join the new server to an Active Directory domain.B、Install Active? Directory Lightweight Directory Services on the new server.C、Run ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.D、Open TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.

You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured.   What should you do?()A、From a command prompt, run the diskperf command.B、Run Network Monitor in dedicated capture mode.C、Configure a Network Monitor capture filter.D、Increase the buffer size in Network Monitor.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that the network users are able to open a resource mailbox. What should you do?()A、You should consider having a new Sharing policy crated from the Exchange Management Console (EMC).B、You should consider having the Resource Delegated parameter set for the resource mailbox from the Exchange Management Shell.C、You should consider having the password for the account associated to the resource mailbox reset from Active Directory Users And Computers console.You should then have the password provided to the network users .D、You should consider having the properties of the resource mailbox modified from Microsoft Office Outlook.

You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.You need to prevent users on the network from enabling text message notification s to their Windows mobile devices.  What should you configure?()A、a Group Policy administrative templateB、an Exchange ActiveSync mailbox policyC、an Outlook Web App Mailbox policyD、an RMS template

You are the administrator of a SQL Server 2005 computer named SQL1. SQL1 is a member of a Microsoft Active Directory domain. You do not have any rights or privileges to perform domain administration. However, you have been granted membership in the local Administrators group on SQL1. You perform most of the management of SQL1 from your administrative workstation. However, for security reasons, you want to track all attempts for interactive logons and network connections to SQL1. What should you do?()A、Create a Group Policy object (GPO) that is configured for success and failure auditing of the Audit account logon events setting. Ask the domain administrator to link the GPO to the object containing SQL1.B、Configure the SQL Server service on SQL1 to audit all successful and failed logon attempts.C、Edit the local security policy of SQL1. Then, configure success and failure auditing on the Audit logon events setting.D、Run the SQL Server Profiler and use a standard default template.

单选题You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()AOSPFBRIPCBGPDstatic

单选题You must segement your internal 192.168.1.0/24 network into a minimun of 12 subnet, each containing a minimun of 12 hosts. Which network mask do you use?()A/26B/27C/28D/29

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()ACreate an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.BCreate a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.CCreate an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.DCreate a Pattern Match capture trigger for the 131.107.0.1 IP address.

单选题You have two portable computers named Computer1 and Computer2 that run Windows 7. You configureComputer1 to connect to a wireless network named Network1. You need to configure Computer2 to connectto Network1 by using the same settings as Computer1.  What should you do on Computer1?()AAt the command prompt, run Wecutil.exe es gr.BAt the command prompt, run Winrs.exe -environment.CFrom Windows Firewall with Advanced Security, export the policy.DFrom the wireless network properties of Network1, copy the network profile to a USB flash drive.

单选题You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()AYou should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.BYou should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.CYou should consider having mail enabled for KingPublic.DYou should consider having the author role assigned to Anonymous.

单选题You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts. Which network mask do you use?()A/26B/27C/28D/29

单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()ASource TCP portBSource IP addressCDestination TCP portDDestination IP address