多选题Which three best practices should be implemented at the campus backbone submodule to support the server farm module?()AImplement highly redundant switching and links with no single points or paths of failure.BImplement server load balancing.CImplement the Hot Standby Router Protocol (HSRP) for failover protection.DImplement intrusion detection with automatic notification of intrusion attempts in place.

多选题
Which three best practices should be implemented at the campus backbone submodule to support the server farm module?()
A

Implement highly redundant switching and links with no single points or paths of failure.

B

Implement server load balancing.

C

Implement the Hot Standby Router Protocol (HSRP) for failover protection.

D

Implement intrusion detection with automatic notification of intrusion attempts in place.


参考解析

解析: 暂无解析

相关考题:

Required:Discuss the principles and practices which should be used in the financial year to 30 November 2008 to accountfor:(b) the costs incurred in extending the network; (7 marks)

Discuss the principles and practices which should be used in the financial year to 30 November 2008 to accountfor:(c) the purchase of handsets and the recognition of revenue from customers and dealers. (8 marks)Appropriateness and quality of discussion. (2 marks)

Which of the following should be implemented to allow a user to securely connect to a network driveremotely?() A. Enable file and print shareB. FTPC. VPND. Map a drive

Which three best practices should be implemented at the campus backbone submodule to support the server farm module?() A. Implement highly redundant switching and links with no single points or paths of failure.B. Implement server load balancing.C. Implement the Hot Standby Router Protocol (HSRP) for failover protection.D. Implement intrusion detection with automatic notification of intrusion attempts in place.

Which one is the most important based on the following common elements of a network design?()A、Business needsB、Risk analysisC、Security policyD、Best practices

Which of the following procedures are involved in the recommended three-step troubleshootingflow?(Choose the best three answers.)()A、Problem reportB、Problem collaborationC、Problem diagnosisD、Problem resolutionE、Problem documentationF、Probiem authentication

Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()A、Enable file and print shareB、FTPC、VPND、Map a drive

You have an Exchange Server 2010 organization.You need to identify whether an administrator has made a configuration change in the Exchange organization.What should you run?()A、Get-EventLogLevelB、Get-ExchangeServerC、Exchange Best Practices AnalyzerD、Microsoft Baseline Security Analyzer (MBSA)

A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.)()A、hubB、routerC、switchD、STPE、subinterfacesF、VLAN

Which three items should the site survey documentation include?()A、photographsB、floor plansC、wired network layoutD、blueprints

A company is installing IP phones. The phones and office computers connect to the same devicE.To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffiC.What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? ()A、hubB、routerC、switchD、STPE、subinterfacesF、VLAN

Which three best practices should be implemented at the campus backbone submodule to supportthe server farm module? ()A、 Implement highly redundant switching and links with no single points or paths of failure.B、 Implement server load balancing.C、 Implement the Hot Standby Router Protocol (HSRP) for failover protection.D、 Implement intrusion detection with automatic notification of intrusion attempts in place.

You need to design the VLAN scheme for the Company network. Which two statements are true  about best practices in VLAN design?()A、Routing should occur at the access layer ifvoice VLANs are utilized. Otherwise, routing should occur at the distribution layer.B、Routing should always be performed at the distribution layer.C、VLANs should be localized to a switch.D、VLANs should be localized to a single switch unlessvoice VLANs are being utilized.E、Routing should not be performed between VLANs located on separate switches.

Which firewall best practices can help mitigate worm and other automated attacks?()A、Segment security zonesB、Restrict access to firewallsC、Use logs and alertsD、Set connection limits

The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()A、Install a new operating systemB、Delete users’ data before donationC、Write the drive with 1’s and 0’s three timesD、Delete all partitions of the hard drive

According to best practices, which of the following should be the FIRST step after a full boot into anewly installed Windows Server OS?()A、 Remove the Internet Explorer Enhanced Security configuration.B、 Disable the Guest account.C、 Apportion additional storage.D、 Apply all relevant updates and patches.

A company has just implemented a disaster recovery plan in which critical business must be restored in a four hour window.  Which of the following methods should be used to backup theservers?()A、Incremental backupB、Data only backupsC、SAN replicationD、Full backup

Which four are true?()A、 Has-a relationships should never be encapsulated.B、 Has-a relationships should be implemented using inheritance.C、 Has-a relationships can be implemented using instance variables.D、 Is-a relationships can be implemented using the extends keyword.E、 Is-a relationships can be implemented using the implements keyword.F、 An array or a collection can be used to implement a one-to-many has-a relationship.G、 The relationship between Movie and Actress is an example of an is-a relationship.

Which four statements are true?()A、Has-a relationships should never be encapsulated.B、Has-a relationships should be implemented using inheritance.C、Has-a relationships can be implemented using instance variables.D、Is-a relationships can be implemented using the extends keyword.E、Is-a relationships can be implemented using the implements keyword.F、An array or a collection can be used to implement a one-to-many has-a relationship.

多选题Which of the following procedures are involved in the recommended three-step troubleshootingflow?(Choose the best three answers.)()AProblem reportBProblem collaborationCProblem diagnosisDProblem resolutionEProblem documentationFProbiem authentication

多选题Which four statements are true?()AHas-a relationships should never be encapsulated.BHas-a relationships should be implemented using inheritance.CHas-a relationships can be implemented using instance variables.DIs-a relationships can be implemented using the extends keyword.EIs-a relationships can be implemented using the implements keyword.FAn array or a collection can be used to implement a one-to-many has-a relationship.

单选题According to best practices, which of the following should be the FIRST step after a full boot into anewly installed Windows Server OS?()A Remove the Internet Explorer Enhanced Security configuration.B Disable the Guest account.C Apportion additional storage.D Apply all relevant updates and patches.

多选题Which three protocols or applications should be placed in a class that is configured with WRED?()AHTTPBRTPCstreaming videoDBitTorrentEPOP3

多选题A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device (Choose two.)()。AhubBrouterCswitchDSTPEsubinterfacesFVLAN

多选题A company is installing IP phones. The phones and office computers connect to the same devicE.To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffiC.What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? ()AhubBrouterCswitchDSTPEsubinterfacesFVLAN

单选题You have an Exchange Server 2010 organization.You need to identify whether an administrator has made a configuration change in the Exchange organization.What should you run?()AGet-EventLogLevelBGet-ExchangeServerCExchange Best Practices AnalyzerDMicrosoft Baseline Security Analyzer (MBSA)

多选题You need to design the VLAN scheme for the Company network. Which two statements are true  about best practices in VLAN design?()ARouting should occur at the access layer ifvoice VLANs are utilized. Otherwise, routing should occur at the distribution layer.BRouting should always be performed at the distribution layer.CVLANs should be localized to a switch.DVLANs should be localized to a single switch unlessvoice VLANs are being utilized.ERouting should not be performed between VLANs located on separate switches.

多选题Which four are true?()AHas-a relationships should never be encapsulated.BHas-a relationships should be implemented using inheritance.CHas-a relationships can be implemented using instance variables.DIs-a relationships can be implemented using the extends keyword.EIs-a relationships can be implemented using the implements keyword.FAn array or a collection can be used to implement a one-to-many has-a relationship.GThe relationship between Movie and Actress is an example of an is-a relationship.