单选题A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?()ACoaxialBCAT3CCAT5DCAT5e
单选题
A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?()
A
Coaxial
B
CAT3
C
CAT5
D
CAT5e
参考解析
解析:
暂无解析
相关考题:
● A (75) system placed between the company network and the outside world may limit outside access to the internal network.(75)A. firewallB. modemC. gatewayD. key
A ______ system placed between the company network and the outs2012q2/cte world may limit outs2012q2/cte access to the internal network.A.firewallB.modemC.gatewayD.KeyA.B.C.D.
A(75)system placed between the company network and the outside world may limit outside access to the internal network.A.firewallB.modemC.gatewayD.key
Users are unable to stay connected to the company‘s wireless network. Several times throughoutthe day the users‘ signals are dropped and they are forced to reconnect to the network.A technician determines the network cabling that supplies the WAP has been run inside with severalpower lines.Which of the following is the MOST likely cause of the network issue?()A.AshortB.Open pairsC.ESDD.EMI
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D
A ______ system placed between the company network and the outside world may limit outside access to the internal network.A.firewallB.modemC.gatewayD.key
Refer to the exhibit. ROUTE.com is planning to implement a secure OSPF network to support traffic between clients on the 172.16.10.0/24 network and the file server on the 172.16.20./24 network. You have been asked to review the implementation and verification plans for this OSPF project. Which statement about the plan is true? ()A. It is complete as writtenB. It should include a task that verifie s that the interarea routes are using the proper MEDC. It should include a task that verifies that load sharing is active on R1 and R4D. It should include a task that verifies that all redundant links will become active when the primary links are sh ut down
You need to implement a high availability design in the Company routed network. Which protocol allows for the automatic selection and simultaneous use of multiple available gateways as well as automatic failover between those gateways?()A、 VRRPB、 GLBPC、 IRDPD、 HSRPE、 None of the other alternatives apply
A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?()A、CoaxialB、CAT3C、CAT5D、CAT5e
The Cisco Unified Wireless Network minimizes the TCO and maximizes woreless network uptime by optimizing which two deployment, management, and security features?()A、 unified wireless and wired infrastructure for a single point of control for all WLAN trafficB、 simplified management of central or remotely located access pointsC、 extension features to wired network services, such as denial of service prevention and ACLsD、 threat defense with a robust wired IDS
The Company network needs to pass traffic between VLANs. Which device should be used to accomplish this? ()A、 HubB、 SwitchC、 RouterD、 BridgeE、 None of the other alternatives apply
You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition toimplementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actionsshould you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.
Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()A、AshortB、Open pairsC、ESDD、EMI
A system is being designed with many LPARs which will be clients of dual VIO Servers. The VIO Servers must be redundant so that, in the event of scheduled maintenance, the clients do not need to be shut down. Which of these strategies could be used to ensure that the client LPARs continue to be able to use the network in the event of a VIO Server being shut down?()A、Implement PowerHA SystemMirror on both VIO servers.B、Configure Etherchannel between the client LPARs and the two VIO servers.C、Configure Network Interface Backup between the two VIO servers and use each VIO server to access the network.D、Implement Shared Ethernet Adapter failover and have all client partitions access the network through the shared adapters.
You create two resource plans, one for data warehouse loading jobs at night and the other for application jobs at day time. You want the resource plans to activate automatically so that the resource allocation is optimum as desired by the activity.How would you achieve this?()A、Implement job classesB、Implement Scheduler windowsC、Implement the mapping rule for the consumer groupsD、Set the SWITCH_TIME resource plan directive for both the resource plans
Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23 subnet. The company hires temporary employees. You provide user accounts and computers to the temporaryem ployees. The temporary employees receive computers that are outside the Active Directory domain. The temporary employees use their computers to connect to the network by using wired connections andwireless connections. The company’s security policy specifies that the computers connected to the network must have the latest updates for the operating system. You need to plan the network’s security so that it complies with the company 's security policy. What should you include in your plan?()A、Implement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.B、Create an extranet domain within the same forest. Migrate the temporary employees user accounts to the extranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.C、Move the temporary employees user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO tothe new OU.D、Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling. You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home. What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.
You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?() A、Configure the wireless network connection on Pro1 so that it has an IP address of 192. 168. 0. 2.B、Disable and then re-enable Internet Connection Sharing (ICS) on Pro1.C、Create a network bridge between the wired and wireless connections on Pro1. D、Clear the Allow other network users to control or disable the shared Internet connection check box in the advanced properties of the VPN connection.
多选题Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home. Which two actions should you perform?()AWhen you configure access to the wired network at home, set the wired network adapter location type to Public.BWhen you configure access to the wired network at home, set the wired network adapter location type to Private.CWhen you configure access to the public wireless access points, set the wireless network adapter location type to Public.DWhen you configure access to the public wireless access points, set the wireless network adapter location type to Private.
单选题Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network. What should you do? ()ASet the security type to the No authentication (Open) option.BConfigure the wired and wireless network adapters as a network bridge.CModify the wireless network profile type to the Use all-user profiles only (recommended) option.DOn each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.
单选题Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()ACreate an Ipsec enforcement network policy.BCreate an 802.1xenforcemen tnetwork policy.CCreatea wired network(IEEE802.3)Group policy.DCreate an extensible authentication protocol(EAP)enforcement network policy.
单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A Create an IPsec Enforcement Network policyB Create an 802.1X enforcement network policyC Create a wired network (IEEE 802.3) Group PolicyD Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
单选题You create two resource plans,one for data warehouse loading jobs at night and the other for application jobs at day time. You want the resource plans to activate automatically so that the resource allocation is optimum as desired by the activity. How would you achieve this?()A Implement job classesB Implement Scheduler windowsC Implement the mapping rule for the consumer groupsD Set the SWITCH_TIME resource plan directive for both the resource plans
单选题Your network consists of a single Active Directory domain. Your main office has an Internet connection. Your company plans to open a branch office. The branch office will connect to the main office by using a WAN link. The WAN link will have limited bandwidth. The branch office will not have access to the Internet. The branch office will contain 30 Windows Server 2008 R2 servers. You need to plan the deployment of the servers in the branch office. The deployment must meet the following requirements: èInstallations must be automated. èComputers must be automatically activated. èNetwork traffic between the offices must be minimized. What should you include in your plan?()AIn the branch office,implement Key Management Service(KMS),a DHCP server,andWindowsDeployment Services (WDS).BUse Multiple Activation Key (MAK) Independent Activation on the servers. In the main office,implement a DHCP server and Windows Deployment Services(WDS).CIn the main office,implement Windows Deployment Services(WDS). In the branch office,implement a The safer ,easier way to help you pass any IT exams.DHCP server and implement the Key Management Service(KMS).DUse Multiple Activation Key(MAK) Independent Activation on the servers. In the main office,implement a DHCP server. In the branch office implement Windows Deployment Services(WDS).
单选题You need to implement a high availability design in the Company routed network. Which protocol allows for the automatic selection and simultaneous use of multiple available gateways as well as automatic failover between those gateways?()A VRRPB GLBPC IRDPD HSRPE None of the other alternatives apply
单选题According to the writer, the key role of a General Manager is to ______.Ahelp to formulate company policyBcommunicate between groups of peopleCinterpret plans made by senior managementDdivide the company into departments