单选题As a Network Engineer in a large-sized company, you have to master the knowledge of the Cisco mobility solution. Which of the following statement most appropriately identifies the characteristics of it?()AIt provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit.BIt allows you to centralize management, automate repetitive tasks, and provision IP services easily.CIt centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN.DIt authenticates users and devices so that it is impossible for a rogue device to be connected to the network.
单选题
As a Network Engineer in a large-sized company, you have to master the knowledge of the Cisco mobility solution. Which of the following statement most appropriately identifies the characteristics of it?()
A
It provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit.
B
It allows you to centralize management, automate repetitive tasks, and provision IP services easily.
C
It centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN.
D
It authenticates users and devices so that it is impossible for a rogue device to be connected to the network.
参考解析
解析:
暂无解析
相关考题:
as an engineer ,you must be familiar with SMS .can you please tell what is DP(s) and who was the DP of the company you served last time ?
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D
You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()A.AB.BC.CD.D
As a Network Engineer in a large-sized company, you have to master the knowledge of the Cisco mobility solution. Which of the following statement most appropriately identifies the characteristics of it?()A、It provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit.B、It allows you to centralize management, automate repetitive tasks, and provision IP services easily.C、It centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN.D、It authenticates users and devices so that it is impossible for a rogue device to be connected to the network.
You work as a network engineer for the company, you want to configure two BGP speakers to form an EBGP session across a firewall. On the engineer’s network, the firewall always permits TCP sessions that are initiated from the inside network (the network attached to the inside interface of the firewall). What prerequisite is there for enabling BGP to run on this network?()A、EBGP multihop will need to be configured for this to work.B、This should work with normal BGP peering, with no additional configuration on the BGP speakers or the firewall.C、The BGP protocol port must be opened on the firewallD、There is no way to make BGP work across a firewall.
As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()A、An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.B、The counters were deleted.C、The ARP cache was removed.D、The IP EIGRP neighbor relationship was cleared manually.
As a Cisco Network Engineer, you have to master the knowledge of the Cisco Storage Area Network solution for the data center. Which three of the following are features of it? ()(Choose three.)A、It provides multiprotocol support.B、It allows you to create separate networks on the VSAN.C、It allows you to migrate to new technologies without a complete equipment upgrade.D、It reduces cost and complexity by providing an easy transition to evolving technologies.
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured a user named Rory Allen as a Delegate for a user named Dean Austin.During the course of the business week you receive instruction from Company.com to ensurethat Rory Allen is able to add Dean Austin in the from field when sending messages whilst ensuring messages which contain Dean Austin in the From field should display Dean Austin s the message sender when the recipient receive the messages. What should you do?()A、You should consider having a Sharing policy created.You should then have Rory Allen granted Modify permission to Dean Austin’s mailbox.B、You should consider having a Sharing policy created.You should then have Rory Allen granted Full Mailbox permission to Dean Austin’s mailbox.C、You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send As permission to Dean Austin’s Mailbox.D、You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send on Behalf permission to Dean Austin’s mailbox.
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messagingsolution.During the course of the business week you receive instruction from Company.com to have a set of cmdlets grouped for administrative delegation of duties.What should you do?()A、You should consider having a new management role created.B、You should consider having a new role assignment policy created.C、You should consider having a managed folder mailbox policy created.D、You should consider having a new distribution group created.
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com. What should you do?()A、You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.B、You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.C、You should consider having mail enabled for KingPublic.D、You should consider having the author role assigned to Anonymous.
Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()A、You should consider changing the EWS virtual directory.B、You should consider changing the Federation Trust.C、You should consider changing the Organizational Relationship.D、You should consider changing the default sharing policy.
You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet. What must you do so that you can access the Internet?()A、Configure the ISDN connection to use SLIP instead of PPP.B、Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.C、Clear the Use default gateway on remote network check box.D、Install and configure the SAP Agent service.
Network topology exhibit: You are the administrator at ExamSheet.net. You use TCP/IP as the only protocol on your network. The network is configured as in the network topology exhibit. All existing computers and devices use 255.255.240.0 as the subnet mask. You install Windows 2000 Professional on a computer named ExamSheet2. You configure ExamSheet2 to have a TCP/IP address of 10.10.20.234, a default gateway of 10.10.20.1, a subnet mask of 255.255.0.0 and a WINS server address of 10.10.13.10. You cannot connect to shared resources on ExamSheetB by using its UNC name. You want ExamSheet2 to be able to connect to ExamSheetB. What should you do? ()A、Install a WINS server on the same segment as Company2B、Install and configure a DNS server and configure Company2 to use the DNS Server service.C、Configure Company2 with a default gateway address 10.10.13.1.D、Configure Company2 with a default gateway address of 10.10.30.1.E、Configure Company2 with a TCP/IP address of 10.10.20.234.
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that the network users are able to open a resource mailbox. What should you do?()A、You should consider having a new Sharing policy crated from the Exchange Management Console (EMC).B、You should consider having the Resource Delegated parameter set for the resource mailbox from the Exchange Management Shell.C、You should consider having the password for the account associated to the resource mailbox reset from Active Directory Users And Computers console.You should then have the password provided to the network users .D、You should consider having the properties of the resource mailbox modified from Microsoft Office Outlook.
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.
You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover. What should you do? () A、The contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS) B、You should restore a backup to the active node C、You should get rid of the shared array from the active node D、From the active node, you have to uplug the network cable(s)
单选题You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()AYou should use /63.BYou should use /64.CYou should use /61.DYou should use /62.
多选题You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network. What should you do?()AConfigure a DNS suffix.BConfigure a subnet mask.CConfigure an LMHOSTS file.DConfigure an Interface metric.EConfigure at least one DNS address.
多选题As a Network Engineer, you have to master how to deploy Virtual Storage Area Network and what are the results of the deployment. Which two of the following are resulting from its deployment?()Areduced backupBincreased securityCgreater storage demandDimproved availability
多选题As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()AAn update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.BThe counters were deleted.CThe ARP cache was removed.DThe IP EIGRP neighbor relationship was cleared manually.
单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com. What should you do?()AYou should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.BYou should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.CYou should consider having mail enabled for KingPublic.DYou should consider having the author role assigned to Anonymous.
单选题Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()AYou should consider configuring the sender reputation.BYou should consider configuring the sender filtering.CYou should consider configuring the content filtering.DYou should consider configuring the recipient filtering.
多选题As a Cisco Network Engineer, you have to master the knowledge of the Cisco Storage Area Network solution for the data center. Which three of the following are features of it? ()(Choose three.)AIt provides multiprotocol support.BIt allows you to create separate networks on the VSAN.CIt allows you to migrate to new technologies without a complete equipment upgrade.DIt reduces cost and complexity by providing an easy transition to evolving technologies.
多选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover. What should you do? ()AThe contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS)BYou should restore a backup to the active nodeCYou should get rid of the shared array from the active nodeDFrom the active node, you have to uplug the network cable(s)