单选题Computers on a small network are not able to receive new addresses from the DHCP server. However, the administrator has checked the server and ensured it is connected, responding, and functional. Which of the following is the MOST likely problem in this scenario?()AThe DHCP server has an incorrect gateway configured.BThe DHCP server was incorrectly configured with a six hour lease time on addresses.CThe DHCP server was incorrectly configured with no-expiring lease time on addresses.DThe DNS server is no longer functional and internal name-address resolution is down.
单选题
Computers on a small network are not able to receive new addresses from the DHCP server. However, the administrator has checked the server and ensured it is connected, responding, and functional. Which of the following is the MOST likely problem in this scenario?()
A
The DHCP server has an incorrect gateway configured.
B
The DHCP server was incorrectly configured with a six hour lease time on addresses.
C
The DHCP server was incorrectly configured with no-expiring lease time on addresses.
D
The DNS server is no longer functional and internal name-address resolution is down.
参考解析
解析:
暂无解析
相关考题:
You want to install Windows 2000 Professional on 20 new PXE compliant computers, which do not have operating systems installed. You create a RIS image and load the image onto the RIS server and then start the new computers. You find that the new computers cannot connect to the RIS server. You verify that existing client computers on the network can connect to network servers.What should you do? (SELECT AND PLACE)
You are the administrator for your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 20 new PXE-compliant computers on the marketing segment of your network. The new computers do not have operating systems installed.You create a RIS image. You load the image onto the RIS server. You then start the new computers.You find that the new computers cannot connect to the RIS server. You verify that the new computers cannot connect to the RIS server. You verify that the existing client computers in the network can connect to the network servers, including the RIS server. You want to enable the new computers to connect to the RIS server.What should you do?A.Add a Windows 2000 Server computer running WINS to the network.B.Add a Windows 2000 Server computer running DHCP to the network.C.Add the domain Everyone group to the RIS OS image security settings.D.Place the new computers on the same segment as the RIS server.
You are the administrator of the Coho Vineyard network. The network consists of 10 Windows 2000 Advanced Server computers and 250 Windows 2000 Professional computers.Your company has two domains cohovineyard.com and westcoastsales.com.The company's intranet site is on a Windows 2000 Advanced Server computer named ServerA. ServerA is in the cohovineyard.com domain and is running Internet Information Services (IIS) and Microsoft Proxy Server 2.0You want to configure the Windows 2000 Professional computers in the westcoastsales.com domain to access the intranet site. You want users to be able to connect to the intranet site by using the URL http://serverA rather than its fully qualified domain name.What should you do?A.Add cohovineyard.com to the Domain Suffix Search Order on the computers.B.Add westcoastsales.com to the Domain Suffix Search Order on the computers.C.Add westcoastsales.com to the exceptions list in the proxy server settings on the computers.D.Configure the proxy server settings on the computers to bypass the proxy server for intranet addresses.
You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D
A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()A、Install anti-virus software on the student computers.B、Put the faculty computers in a separate VLAN.C、Power down the switches that connect to faculty computers when they are not in use.D、Remove the student computers from the network and put them on a peer-to-peer network.E、Create an access list that blocks the students from the Internet where the hacking tolls are located.
Computers on a small network are not able to receive new addresses from the DHCP server. However, the administrator has checked the server and ensured it is connected, responding, and functional. Which of the following is the MOST likely problem in this scenario?()A、The DHCP server has an incorrect gateway configured.B、The DHCP server was incorrectly configured with a six hour lease time on addresses.C、The DHCP server was incorrectly configured with no-expiring lease time on addresses.D、The DNS server is no longer functional and internal name-address resolution is down.
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).You need to ensure that computers can receive IP configurations from the DHCP server. What should you do?()A、Add a scope option.B、Add a server option.C、Authorize the DHCP server.D、Reconcile the DHCP scope.
A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA
Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23 subnet. The company hires temporary employees. You provide user accounts and computers to the temporaryem ployees. The temporary employees receive computers that are outside the Active Directory domain. The temporary employees use their computers to connect to the network by using wired connections andwireless connections. The company’s security policy specifies that the computers connected to the network must have the latest updates for the operating system. You need to plan the network’s security so that it complies with the company 's security policy. What should you include in your plan?()A、Implement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.B、Create an extranet domain within the same forest. Migrate the temporary employees user accounts to the extranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.C、Move the temporary employees user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO tothe new OU.D、Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.
Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use NetBIOS names to connect to all shared resources as the network. You configure a TCP/IP address and a subnet mask on each new computer. Which 2 additional TCP/IP properties should you configure on each new computer?()A、The bindings.B、A DNS address.C、A Gateway address.D、A WINS server address.E、A DHCP server address.
BlingbyAlex.com was known several years ago by the name AlexBling.com.At times, the sales staff still receives orders from clients at the AlexBling.com address.Both names are owned by the company.After you successfully deploy an Exchange 2010 server configuration, which includes two Hub Transport servers, the sales staff informs you that they are no longer able to receive mail at the AlexBling.com address.What should you do so that they can receive email from both domains?()A、On the Hub Transport server, use the New Accepted Domain Wizard to add AlexBling.com.B、On the Mailbox server, use the New Accepted Domain Wizard to add AlexBling.com.C、Use Active Directory to add an email alias to each user’s account for AlexBling.com.D、On the Client Access server, use the New Accepted Domain Wizard to add AlexBling.com.
You are the desktop administrator for one of your company's branch offices. The network in the branch office consists of a single network segment, which contains a domain controller, a DHCP server, 10 Windows 2000 Server computers, and 50 Windows 2000 Professional computers. All servers and client computers are members of the company's Active Directory domain. You purchase 50 new client computers for the branch office. Each new client computer contains a built-in PXE-compliant network adapter. You install and configure RIS on one of the Windows 2000 Server computers that is on the network in the branch office. You create a Windows XP Professional RIS image on the Windows 2000 Server computer. You connect the new client computers to the network in the office, and you turn on each computer. Each computer displays a message stating that it cannot contact a PXE boot server. You verify that the RIS server is connected to the network. You need to ensure that the new client computers can connect to the RIS server and can begin installing Windows XP Professional. What should you do?()A、Ask a domain administrator to authorize the RIS server. B、Grant the Everyone group Allow - Read NTFS permission on the RIS image.C、Install RIS on the domain controller. Copy the RIS image to the domain controller.D、Add a reservation for the RIS server to the DHCP server.
You have a single network segment. All servers run Windows Server 2003 Service Pack 2 (SP2). You have a DHCP server named Server1. Client computers receive IP addresses from Server1. You add a second network segment separated by a RFC 1542-compliant router. You need to ensure that computers in the new network segment can receive their IP configurations from Server1. You make the appropriate configuration changes on the router. What should you do on Server1?()A、Create a new scope.B、Configure a DHCP Relay Agent.C、Add an Extensions Path scope option.D、Create a new exclusion range in the existing scope.
You are the network administrator for ExamSheet. Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers. What should you do?()A、On the research computers use the Local Computer Policy to disable theAccess this computer from the networkoption.B、Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.C、Add the users of the research computers to the Power Users group on each computer.D、On the research computers configure the security settings to prevent anonymous access.
You are the administrator of a small network supporting Windows NT 4.0 computers. You configure a setup script to automatically upgrade Windows NT Workstation 4.0 computers to Windows 2000 Professional. When you attempt to test the process on a single computer, you receive this error message: "The specified Setup script file (path:/unattend.txt) is inaccessible or invalid. Contact your system administrator." Which action will most likely resolve this error? ()A、Add the UnattendedInstall="Yes" parameter to the [Unattended] section of your Unattend.txt fileB、Add the UnattendMode=FullUnattended parameter to the [Data] section of your Unattend.txt fileC、Add the UnattendedInstall="Yes" parameter to the [GuiUnattended] section of your Unattend.txt fileD、Add the UnattendMode=FullUnattended parameter to the [Unattended] section of your Unattend.txt file
You are the network administrator for . The network consists of a single Active Directory domain named . All client computers run Windows XP Professional. The finance deparment uses a specific naming process to audit users and their computers. The process requires that each user's client computer has an account in Active Directory and that each client computer name corresponds to a specific user account. A user name Marie is a member of only the Domain Users security group. She reports that the hardware on her computer fails. She receives a new computer. You need to add Marie's new computer to the domain. You need to comply with the finance department naming process. What should you do?()A、Instruct Marie to run the ipconfig /flushdns command on her new computer and to add the new computer to the domain by using the same computer name as her failed computer.B、Assign Marie permissions for adding computer accounts to the default container named Computers. Instruct Marie to add her new computer to the domain.C、Reset the computer account for Marie's failed computer. Instruct Marie to add her new computer to the domain by using the same name as her failed computer.D、Configure the IP address of Marie's new computer to be the same as the failed computer. Instruct Marie to add the new computer to the domain.
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Three thousand client computers run Windows 2000 Professional, and 1,500 client computers run Windows XP Professional. A new employee named Dr King is hired to assist you in installing Windows XP Professional on 150 new client computers. You need to ensure that Dr King has only the minimum permissions required to add new computer accounts to the domain and to own the accounts that he creates. Dr King must not be able to delete computer accounts. What should you do?()A、Add Dr King's user account to the Server Operators group.B、Add Dr King's user account to the Account Operators group.C、Use the Delegation of Control Wizard to permit Dr King's user account to create new computer objects in the Computers container.D、Create a Group Policy object (GPO) and link it to the domain. Configure the GPO to permit Dr King's user account to add client computers to the domain.
You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You use a non-administrative user account named Joseph to log on to a client computer. You need to change the password for a domain user account named Sophia. You open the Active Directory Users and Computers console. When you attempt to change Sophia's password, you receive the following error message: "Access is denied". You need to remain logged on to the client computer as Joseph, and you need to be able to change Sophia's password. What should you do?()A、Add the non-administrative domain user account to the local Administrators group.B、Use the runas command to run Active Directory Users and Computers with domain administrative credentials.C、From a command prompt, run the net user Sophia /add /passwordreq:yes command.D、From a command prompt, run the net accounts /uniquepw: /domain command.
You are the network administrator for your company. The network consists of a single Active Directorydomain. All network servers run Windows Server 2003. Three thousand client computers run Windows 2000Professional, and 1,500 client computers run Windows XP Professional.A new employee named Peter is hired to assist you in installing Windows XP Professional on 150 new client computers.You need to ensure that Peter has only the minimum permissions required to add new computer accounts to the domain and to own the accounts that he creates. Peter must not be able to delete computer accounts.What should you do()?A、Add Peter's user account to the Server Operators group.B、Add Peter's user account to the Account Operators group.C、Use the Delegation of Control Wizard to permit Peter's user account to create new computer objects in the Computers container.D、Create a Group Policy object (GPO) and link it to the domain. Configure the GPO to permit Peter's user account to add client computers to the domain.
单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Three thousand client computers run Windows 2000 Professional, and 1,500 client computers run Windows XP Professional. A new employee named Dr King is hired to assist you in installing Windows XP Professional on 150 new client computers. You need to ensure that Dr King has only the minimum permissions required to add new computer accounts to the domain and to own the accounts that he creates. Dr King must not be able to delete computer accounts. What should you do?()AAdd Dr King's user account to the Server Operators group.BAdd Dr King's user account to the Account Operators group.CUse the Delegation of Control Wizard to permit Dr King's user account to create new computer objects in the Computers container.DCreate a Group Policy object (GPO) and link it to the domain. Configure the GPO to permit Dr King's user account to add client computers to the domain.
单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()AThe network uses MAC filteringBThe network uses WEPCThe network uses SSID broadcastDThe network uses WPA
单选题A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()AInstall anti-virus software on the student computers.BPut the faculty computers in a separate VLAN.CPower down the switches that connect to faculty computers when they are not in use.DRemove the student computers from the network and put them on a peer-to-peer network.ECreate an access list that blocks the students from the Internet where the hacking tolls are located.
单选题Your company has 1,000 client computers. You are planning to deploy Windows 7 and a new line-of-business application. You have the following requirements: Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment. The application must be available for use on client computers that are not connected to the network. You need to ensure that the application is installed on all new client computers. What should you do?()APublish the application by using Group Policy Software Installation.BDeploy the application by using Windows Server Update Services (WSUS).CService an online image of Windows 7 to add the new application.DService an offline image of Windows 7 to add the new application.
单选题You are the network administrator for your company. The network consists of a single Active Directorydomain. All network servers run Windows Server 2003. Three thousand client computers run Windows 2000Professional, and 1,500 client computers run Windows XP Professional.A new employee named Peter is hired to assist you in installing Windows XP Professional on 150 new client computers.You need to ensure that Peter has only the minimum permissions required to add new computer accounts to the domain and to own the accounts that he creates. Peter must not be able to delete computer accounts.What should you do()?AAdd Peter's user account to the Server Operators group.BAdd Peter's user account to the Account Operators group.CUse the Delegation of Control Wizard to permit Peter's user account to create new computer objects in the Computers container.DCreate a Group Policy object (GPO) and link it to the domain. Configure the GPO to permit Peter's user account to add client computers to the domain.
单选题You have a single network segment. All servers run Windows Server 2003 Service Pack 2 (SP2). You have a DHCP server named Server1. Client computers receive IP addresses from Server1. You add a second network segment separated by a RFC 1542-compliant router. You need to ensure that computers in the new network segment can receive their IP configurations from Server1. You make the appropriate configuration changes on the router. What should you do on Server1?()ACreate a new scope.BConfigure a DHCP Relay Agent.CAdd an Extensions Path scope option.DCreate a new exclusion range in the existing scope.
单选题Your network consists of a single Active Directory domain and a single subnet. The network is not connected to the Internet. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have a DHCP server named Server1. All client computers receive their IP configurations from Server1. You implement a new server named Server2. You connect Server2 to the internal network and the Internet. You then configure Server2 as a network address translation (NAT) router. From a client computer, you discover that you cannot access any Internet servers. From Server2, you verify that you can access Internet servers and internal servers. You need to ensure that all internal computers can access Internet servers. What should you do?()AOn Server2, add a new route. BOn Server1, create a multicast scope. COn Server1, add the Router scope option. DOn Server2, modify the default gateway address.
单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network. You need to configure the wireless connection to allow your computer to discover other computers. What should you do?()AConfigure the network category of your wireless network connection to Private.BConfigure the network category of your wireless network connection to Public.CConfigure the TCP/IP packet filtering on the wireless network connection.DConfigure the wireless network connection with the appropriate authentication to the router.