单选题A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()ATwo switch ports will be needed on a switch, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.BTwo switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.CTwo switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, two different IP addresses will be needed.DOne switch port will be needed on one switch, a splitter will be needed to split the connection, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and two different IP addresses will be needed.

单选题
A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()
A

Two switch ports will be needed on a switch, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.

B

Two switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.

C

Two switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, two different IP addresses will be needed.

D

One switch port will be needed on one switch, a splitter will be needed to split the connection, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and two different IP addresses will be needed.


参考解析

解析: 暂无解析

相关考题:

The difference between a project and a program is that:A.A program is made up of multiple projectsB.A program requires at least three times longer to plan than a projectC.A project is a one-shot deal while a program is on-goingD.A and CE.B and C

37 The difference between a project and a program is that:A. A program is made up of multiple projectsB. A program requires at least three times longer to plan than a projectC. A project is a one-shot deal while a program is on-goingD. A and CE. B and C

● The difference between a project and a program is that:A A program is made up of multiple projectsB A program requires at least three times longer to plan than a projectC A project is a one-shot deal while a program is on-goingD A and CE B and C

You are the administrator of a 12 SQL Server 2000 computers. These servers are located in company offices throughout the world.You configure a multiserver job on the server in your company's New York City office. You configure this server as a master server, and designate the remaining 11 servers as target servers.After the job completes successfully, you decide to set up a new SQL Server 2000 computer as the master server. The new server will be named JobMaster and the other 12 servers will be target servers.You need to make the New York City server a target server instead of a master server. What should you do?A.On the New York City server, defect all 11 target servers. On the JobMaster server, enlist the 12 servers as target servers.B.On the JobMaster server, enlist all other servers as target servers.C.On the New York City server enlist the JobMaster server as a target server. Transfer the multiserver jobs from the New York City server to the JobMaster server.D.On the JobMaster server, enlist the New York City server as a target server. On the JobMaster server, enlist the other 11 servers as target servers. On the JobMaster server, defect the New York City server.

A new()will be set up in this area so we will have enough electricity in the future.Apower stationBelectricity stationCpower factoryDelectrical station

Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

After installing a second processor and corresponding heatsink into a server, an administrator notices that the new processor is not showing up during POST.  Which of the following could be the cause of this issue?()A、 The power supply is not sufficient to power the server.B、 The voltage regulator module (VRM) was not installed.C、 The IRQ setting was not set.D、 The DMA setting was not set.

An administrator notices that every time a particular server is restarted it requires a password in order for the server to begin the start up process. Which of the following is the reason this is happening?()A、The server needs to have the password service verified and reconfigured.B、The server administrator has set a password policy in Group Policy.C、The server has the BIOS setting configured incorrectly.D、The server is set with a boot password before accessing the OS

A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()A、Two switch ports will be needed on a switch, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.B、Two switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, and one IP address will be needed.C、Two switch ports will be needed on two different switches, two Ethernet cables will be needed for the server each connecting to two different Ethernet cards, two different IP addresses will be needed.D、One switch port will be needed on one switch, a splitter will be needed to split the connection, two ethernet cables will be needed for the server each connecting to two different Ethernet cards, and two different IP addresses will be needed.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com contains an exchange server 2010 mailbox server named -sr10.quite a few mailbox databases reside on -sr10.you have received instructions from the cio to set an alert on the volume of the mailbox database files, if the free space is less than 20%.What should you do?()A、The best option is to set up a new Event Viewer Subscription.B、The best option is to set up a new Data Collector Set.C、The best option is to attach a new task to the Application event log.D、The best option is to change the properties of the mailbox database objects.

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange Server 2010 environment. TestKing.com contains 30 offices that consist of 1,500 users. AT present TestKing.com users make use of Microsoft Exchange Server to access their e-mail messages. During the course of day you receive an instruction from the CIO to ensure that users in their offices is only able download the list of recipients for their offiche as well asensuring that they are able to communicate to any other user in the orgranization via e-mail. What should you do?()A、The best option is to set up 30 new managed folder mailbox policies and 20 e-mail address policies.B、The best option is to set up 30 new mailbox database and then move the mailboxes from each officheto a separate mailbox database.C、The best option is to set up 30 new address lists and 30 offline address books (OABs)D、The best option is to set up 30 new dynamicdistribuition groups and then create 20 new global address lists (GALs).

You need to create a VPN connection. What should you do?()A、From Windows Explorer, right-click Computer and then click Map network drive.B、From Windows Explorer, right-click Computer and then click Add a network location.C、From Network and Sharing Center, click Set up a new connection or network and then click Set up anew network.D、From Network and Sharing Center, click Set up a new connection or network and then click Connect to aworkplace.

You are the network administrator for the Paris branch office of Fourth Coffee.The Paris office has a Windows Server 2003 DNS server named Server10. Server10 hosts a DNS primary zone named fourthcoffee.com. All computers in the Paris office are configured to use Server10 as their preferred DNS server. The Berlin branch office of Fourth Coffee has a UNIX DNS server named Server11. Server11 hosts a primary zone named engineering.fourthcoffee.com. The refresh interval of the engineering.fourthcoffee.com zone is set to 24 hours. In the Berlin office, a firewall filters all incoming network traffic from other offices. A rule on this firewall prevents all computers from the Paris office network, except Server10, from performing DNS lookups against Server11.There is a business requirement that no delay should occur between the time that a new record is created in the engineering.fourthcoffee.com zone and the time that the record can be resolved from any computers in the Paris office. All computers in the Paris office must be able to resolve names in the engineering.fourthcoffee.com namespace.You need to configure DNS on Server10 to meet the requirements.  What should you do?()A、Set up a stub zone named engineering.fourthcoffee.com.B、Set up conditional forwarding to Server11 for the engineering.fourthcoffee.com namespace.C、In the fourthcoffee.com zone, set up a delegation to the engineering.fourthcoffee.com zone on Server11.D、Set up a secondary zone named engineering.fourthcoffee.com that has Server11 as master.

Your company has a domain controller named Server1 that runs Windows Server 2008 R2 and the DNS server role. A server named Server2 runs Windows Server 2003 and Microsoft Exchange Server 2007. The company wants to deploy a new Exchange server named Server3 to receive all inbound e-mail traffic. You need to configure DNS to direct incoming e-mail traffic to the Exchange servers. You also need to ensure that higher priority is given to Server3. What should you do?()A、Set the priority value of the Server2 Mail Exchanger (MX) record to 20. Create a new Mail Exchanger (MX) record for Server3. Set the priority value to 5.B、Set the priority value of the Server2 Mail Exchanger (MX) record to 5. Create a new Mail Exchanger (MX) record for Server3. Set the priority value to 20.C、Create a new Service Location (SRV) record in the domain for Server3. Set the port number value to 25. Configure the priority setting to 20.D、Create a new Service Location (SRV) record in the domain for Server3. Set the port number value to 110. Configure the priority setting to 5.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Outlook Web App to have access to their e-mail.A new Company.com policy prohibits the employees from downloading ZIP files from Outlook Web App.The CIO wants the employees to use Microsoft Office Outlook to download ZIP files.What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy.B、The best option is to set up the Content Filter agent.C、The best option is to set up a managed folder mailbox policy.D、The best option is to set up the Attachment Filter agent.

问答题Mr. Black is considering taking up a new project instead of finishing this boring one.

单选题A project requires a new server to be set up with the ability to automatically fail over its Ethernet connection to a second connection if a network failure occurs. Which of the following provides greatest resiliency?()ATwo switch ports will be needed on a switch,two Ethernet cables will be needed for theserver each connecting to two different Ethernet cards,and one IP address will be neededBTwo switch ports will be needed on two different switches two Ethernet cables will beneeded for the server each connecting to two different Ethernet cards,and one IP address will be neededCTwo switch ports will be needed on two different switches,two Ethernet cables will be needed for the server each connecting to two different Ethernet cards,two different IP addresses will be neededDOne switch port will be needed on one switch,a splitter will be needed to split the connection,two Ethernet cables will be needed for the server each connecting to two different Ethernet cards,and two different IP addresses will be needed

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The TerminalServices server role is installed on the server. A Terminal Services application runs on the server. Now youreceive report from users saying that that the application stops responding. You monitor the memory usageon the server for a week and find that the application has a memory leak. A patch is not currently available.You create a new resource-allocation policy in Microsoft Windows System Resource Manager (WSRM).You configure a Process Matching Criteria named TrackShip and choose the application. You have toterminate the application when the application consumes more than half of the available memory on theserver. What action should you perform?()AThe resource-allocation policy and the maximum working set limit option should be set to half the available memory on the server. The new policy should be set as a Managing Policy.BThe resource-allocation policy and the maximum committed memory option should be set to half the available memory on the server. The new policy should be set as a Profiling Policy.CThe resource-allocation policy and the maximum committed memory option should be set to half the available memory on the server. The new policy should be set as a Managing Policy.DThe resource-allocation policy should be configured and the maximum working set limit option should be set to half the available memory on the server. The new policy should be set as a Profiling Policy.

单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange Server 2010 environment. TestKing.com contains 30 offices that consist of 1,500 users. AT present TestKing.com users make use of Microsoft Exchange Server to access their e-mail messages. During the course of day you receive an instruction from the CIO to ensure that users in their offices is only able download the list of recipients for their offiche as well asensuring that they are able to communicate to any other user in the orgranization via e-mail. What should you do?()AThe best option is to set up 30 new managed folder mailbox policies and 20 e-mail address policies.BThe best option is to set up 30 new mailbox database and then move the mailboxes from each officheto a separate mailbox database.CThe best option is to set up 30 new address lists and 30 offline address books (OABs)DThe best option is to set up 30 new dynamicdistribuition groups and then create 20 new global address lists (GALs).

单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.It has come to the attention of Xxx management that a network user named Rory Allen is using Exchange ActiveSync to abuse the company’s e-mail policy by downloading huge attachments that does not pertain to his work detail.Consequently you receive instruction from Xxx to restrict the attachments size for Rory Allen’s to 100 KB. How can you achieve the goal by ensure that only Rory Allen is restricted?()AYou must set up a new ActiveSync Device Access rule.BYou must set up a managed folder mailbox policy.CYou must set up a new role assignment policy.DYou must set up Outlook Protection Rules.

单选题Your company has a domain controller named Server1 that runs Windows Server 2008 R2 and the DNS server role. A server named Server2 runs Windows Server 2003 and Microsoft Exchange Server 2007. The company wants to deploy a new Exchange server named Server3 to receive all inbound e-mail traffic. You need to configure DNS to direct incoming e-mail traffic to the Exchange servers. You also need to ensure that higher priority is given to Server3. What should you do?()ASet the priority value of the Server2 Mail Exchanger (MX) record to 20. Create a new Mail Exchanger (MX) record for Server3. Set the priority value to 5.BSet the priority value of the Server2 Mail Exchanger (MX) record to 5. Create a new Mail Exchanger (MX) record for Server3. Set the priority value to 20.CCreate a new Service Location (SRV) record in the domain for Server3. Set the port number value to 25. Configure the priority setting to 20.DCreate a new Service Location (SRV) record in the domain for Server3. Set the port number value to 110. Configure the priority setting to 5.

单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.A new Xxx usage policy prohibits the employees from using certain words in internal e-mail messaging.What actions must you take to have the policy implemented?()AYou must set up an IP Block list.BYou must set up sender filtering.CYou must set up managed folders.DYou must build a transport rule

单选题After installing a second processor and corresponding heatsink into a server, an administrator notices that the new processor is not showing up during POST.  Which of the following could be the cause of this issue?()A The power supply is not sufficient to power the server.B The voltage regulator module (VRM) was not installed.C The IRQ setting was not set.D The DMA setting was not set.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com contains an exchange server 2010 mailbox server named -sr10.quite a few mailbox databases reside on -sr10.you have received instructions from the cio to set an alert on the volume of the mailbox database files, if the free space is less than 20%.What should you do?()AThe best option is to set up a new Event Viewer Subscription.BThe best option is to set up a new Data Collector Set.CThe best option is to attach a new task to the Application event log.DThe best option is to change the properties of the mailbox database objects.

单选题Your network contains an Exchange Server 2010 Edge Transport server named Server1. You install a new Exchange Server 2010 Edge Transport server named Server2.You need to copy the Edge Transport configurations from Server1 to Server2.What should you do on Server1?()ARun the ExportEdgeConfig.PS1 scriptBRun the New-EdgeSyncServiceConfig cmdletCBack up the system stateDBack up the Active Directory Lightweight Directory Services (AD LDS) database

单选题Terminal Services application runs on the server. Users report that the application stops responding. You monitor the memory usage on the server for a week. You discover that the application has a memory leak. A patch is not currently available.  You create a new resource-allocation policy in Microsoft Windows Server Resource Manager. You configure a Process Matching Criteria named TrackShip and select the application.  You need to terminate the application when the application consumes more than half of the available memory on the server. What should you do?()AConfigure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Profiling Policy.BConfigure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Managing Policy.CConfigure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Profiling Policy.DConfigure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Managing Policy.

单选题An administrator notices that every time a particular server is restarted it requires a password in order for the server to begin the start up process. Which of the following is the reason this is happening?()AThe server needs to have the password service verified and reconfigured.BThe server administrator has set a password policy in Group Policy.CThe server has the BIOS setting configured incorrectly.DThe server is set with a boot password before accessing the OS

单选题You are a systems administrator responsible for securing a Windows Server 2008 Web server. You havecreated a new Web site called Contoso Intranet that will contain seven Web applications. One of theapplication developers has told you that her Web application requires a new request handler that isprocessed using a .NET library her team created. How can you meet these requirements while also maximizing security for the server?()AAdd a new managed handler to the Contoso Intranet Web site.BAdd a new managed handler for the specific Web application that requires it.CAdd a new module mapping to the Contoso Intranet Web site.DAdd a new module mapping for the specific Web application that requires it.