多选题You need to evaluate whether the currently available network bandwidth is adequate to run NewApp. Which three actions should you perform?()AUse a debug version of NewApp to collect information about NewApp.BUse Performance Monitor to collect data about the saturation of each WAN link.CUse Network Monitor to analyze the data that is transmitted over the network for App1.DInstall SNMP on all computers that are connected to App1 to obtain information about App1.EBuild a test environment for NewApp to analyze how much bandwidth is required for NewApp.

多选题
You need to evaluate whether the currently available network bandwidth is adequate to run NewApp. Which three actions should you perform?()
A

Use a debug version of NewApp to collect information about NewApp.

B

Use Performance Monitor to collect data about the saturation of each WAN link.

C

Use Network Monitor to analyze the data that is transmitted over the network for App1.

D

Install SNMP on all computers that are connected to App1 to obtain information about App1.

E

Build a test environment for NewApp to analyze how much bandwidth is required for NewApp.


参考解析

解析: 暂无解析

相关考题:

Evaluate the following command and its output:Which two statements correctly interpret the output?() A. FREE_SPACE indicates only the space that is currently unallocated.B. ALLOCATED_SPACE indicates only the space currently allocated and in use.C. FREE_SPACE indicates only the space that is currently allocated and available for reuse.D. ALLOCATED_SPACE indicates both the space currently allocated and used, and the space that is available for reuse.E. FREE_SPACE indicates both the space that is currently allocated and available for reuse, and the space that is currently unallocated.

You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless netework is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile.What should you do?()A.AB.BC.CD.D

You are unable to connect your computer to a wireless network projector. The wireless network projector does not appear in the list of available network projectors provided by the Connect to a Network Projector wizard.You need to connect to the network projector.What are two possible ways to achieve this goal?()A.AB.BC.CD.D

Ezonexam has a Class C network and you need ten subnets. You wish to have as many addresses available for hosts as possible. Which one of the following subnet masks should you use?A.255.255.255.192B.255.255.255.224C.255.255.255.240D.255.255.255.248E.None of the above

You have a Class C network, and you need ten subnets. You wish to have as many addresses available for hosts as possible. Which one of the following subnet masks should you use?() A. 255.255.255.192B. 255.255.255.224C. 255.255.255.240D. 255.255.255.248E. None of the above

You need to implement a high availability design in the Company routed network.  Which protocol  allows for the automatic selection and simultaneous use of multiple available gateways as well as  automatic failover between those gateways?()A、 VRRPB、 GLBPC、 IRDPD、 HSRPE、 None of the other alternatives apply

You are running Linux 2.0.36 and you need to add a USB mouse to your system. Which of the following statements is true?()A、 You need to rebuild the kernel.B、 You need to upgrade the kernelC、 You need to load the USB modules for your existing modular kernel.D、 USB support is not available in Linux.

Evaluate the following command and its output:   SQLSELECT * FROM dba_temp_free_space;  TABLESPACE_NAME TABLESPACE_SIZE ALLOCATED_SPACE FREE_SPACE  LMTEMP 250609664 101048576 149561088 Which two statements correctly interpret the output?()  A、 FREE_SPACE indicates only the space that is currently unallocated.B、 ALLOCATED_SPACE indicates only the space currently allocated and in use.C、 FREE_SPACE indicates only the space that is currently allocated and available for reuse.D、 ALLOCATED_SPACE indicates both the space currently allocated and used,and the space that is available for reuse.E、 FREE_SPACE indicates both the space that is currently allocated and available for reuse,and the space that is currently unallocated.

You have a DHCP server that runs windows server 2008. You restore the DHCP database by using a recent backup. You need to prevent DHCP clients from receiveing IP addresses that are currently in use on the network. What should you do?()A、Add the DHCP serve option 44.B、Set the conflict detetion value to 0.C、Set the conflict detection value to 2.

You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

You want to create a shortcut to a folder named Project on a network share. You want this shortcut to be available when you are not connected to the network. You attempt to configure the shortcut to be available offline. However, you do not see any option, which will let you do so. What should you do?()A、Use Windows Explorer to enable caching for the Project folder.B、Use Windows Explorer to configure the Project folder on the network share with the full  control permission for your user account.C、Connect to the network before trying to make the shortcut available offlineD、Create shortcuts to each file in the Project folder and make the shortcuts to the files available  offline.

Windows NT 4.0 is currently on the system you are using, and you want to install Windows 2000 Professional. Windows NT 4.0 is currently on an NFTS partition.  For some reason you have decided that you are not going to upgrade, but rather, you are going to run this in a dual boot fashion.  What do you need to do? ()A、Can’t be done.B、You need to put Windows 2000 on a separate partition from Windows NT 4.0C、You need to put Windows 2000 on the same partition as Windows NT 4.0.D、You need to upgrade Windows NT 4.0 to SP4.

Your network contains an Active Directory domain that has two sites.    You need to identify whether logon scripts are replicated to all domain controllers.   Which folder should you verify()A、GroupPolicyB、NTDSC、SoftwareDistributionD、SYSVOL

You have a computer that runs Windows 7. You need to view the processes that currently generate network activity. What should you do? ()A、Open Resource Monitor and click the Network tab.B、Open Windows Task Manager and click the Networking tab.C、Open Event Viewer and examine the NetworkProfile Operational log.D、Open Performance Monitor and add all the counters for network interface.

You are the network administrator for TestKing. All network servers run Windows Server 2003. You administer a server named TestKing76. You need to configure TestKing76 to function as a streaming media server for TestKing.com's content team. The content team wants TestKing76 to provide the fastest performance and the most available space possible. Redundancy is not import. TestKing76 currently has three identical, unpartitioned hard disks available. You need to configure the disks to meet the content team's requirements. What should you do?()A、Create a simple volume on disk and then expand it to the other two disks.B、Create a mirrored volume that uses two of the disks.C、Create a RAID-5 volume that uses all three disks.D、Create a striped volume that uses all three disks.

You are using a Windows 2000 Professional computer. You create a shortcut for the folder named PROJECTS on the network share. You want to make shortcuts to the projects folder available, when you are not connected to the network. You attempt to configure the shortcut to be available offline. However you do not see an option to make the folder available offline. What should you do?()A、Use Windows Explorer to enable the cache for the project folder.B、Use Windows Explorer to configure the projects folder on the network share to be available for offline access.C、Connect to the network before trying to make the shortcut available online.D、Create shortcuts to each file in the projects folder and then make the shortcut files available offline.

Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

You have a computer that runs Windows 7. You need to view the processes that currently generate networkactivity.  What should you do?()A、Open Resource Monitor and click the Network tab.B、Open Windows Task Manager and click the Networking tab.C、Open Event Viewer and examine the NetworkProfile Operational log.D、Open Performance Monitor and add all the counters for network interface.

You need to evaluate whether the currently available network bandwidth is adequate to run NewApp. Which three actions should you perform?()A、Use a debug version of NewApp to collect information about NewApp.B、Use Performance Monitor to collect data about the saturation of each WAN link.C、Use Network Monitor to analyze the data that is transmitted over the network for App1.D、Install SNMP on all computers that are connected to App1 to obtain information about App1.E、Build a test environment for NewApp to analyze how much bandwidth is required for NewApp.

You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named King will leave TestKing in one week. A replacement will be hired in one month. The replacement will need the same access to network resources that King currently has. The replacement will also need ownership of all files that currently reside in King's home folder. You need to minimize the administrative effort that will be required when the replacement is hired. You also need to ensure that no one can use King's user account to log on to the domain until the replacement is hired. What should you do?()A、Move King's user account to the LostAndFound organizational unit (OU).B、Disable King's user account.C、Configure King's user account to require a change in password at next logon.D、Delete King's user account.

You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

多选题Evaluate the following command and its output: Which two statements correctly interpret the output?()AFREE_SPACE indicates only the space that is currently unallocated.BALLOCATED_SPACE indicates only the space currently allocated and in use.CFREE_SPACE indicates only the space that is currently allocated and available for reuse.DALLOCATED_SPACE indicates both the space currently allocated and used, and the space that is available for reuse.EFREE_SPACE indicates both the space that is currently allocated and available for reuse, and the space that is currently unallocated.

单选题You are the network administrator for Your network consists of two Active Directory domains in a single forest. All network servers run Windows Server 2003. Currently, you use more than 1,000 security groups. A member server named TK1 contains a folder named Testing. This folder contains resources required by users in the engineering department. A written security policy states that engineering users must have the approval of the management group before they can be assigned the Full Control NTFS permission on Testing. You need to discover whether any engineering users currently have the Full Control NTFS permission on Testing. You must complete this task by using the minimum amount of administrative effort. What should you do?()AUse Active Directory Users and Computers to view the access level available to engineering users.BUse the Find Users, Contacts, and Groups utility to view the membership of each group that has access to Testing.CIn the properties of Testing, view the Effective Permissions tab.DWrite an ADSI script to search for members of all groups that have access to testing

单选题You have a Class C network, and you need ten subnets. You wish to have as many addresses available for hosts as possible. Which one of the following subnet masks should you use?()A255.255.255.192B255.255.255.224C255.255.255.240D255.255.255.248ENone of the above

单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

单选题Your company has deployed network access protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP what should you do?()AConfigure all access points as RADIUS clients to the remediation servers.BConfigure all access points as RADIUS clients to the network Policy Server (NPS).CCreate a network policy that defines remote access server as a network connection method.DCreate a network policy that specifies EAP-TLS as the only available authentication method.

多选题You are unable to connect your computer to a wireless network projector. The wireless network projector does not appear in the list of available network projectors provided by the Connect to a Network Projector wizard.  You need to connect to the network projector.  What are two possible ways to achieve this goal?()AStart the Microsoft Windows Media Center Service Launcher service.BEnable the File and Printer Sharing Windows Firewall exception.CConnect your computer to the same subnet as the network projector.DType the IP address of the network projector in the Connect to a Network Projector wizard.

多选题Evaluate the following command and its output:   SQLSELECT * FROM dba_temp_free_space;  TABLESPACE_NAME TABLESPACE_SIZE ALLOCATED_SPACE FREE_SPACE  LMTEMP 250609664 101048576 149561088 Which two statements correctly interpret the output?()AFREE_SPACE indicates only the space that is currently unallocated.BALLOCATED_SPACE indicates only the space currently allocated and in use.CFREE_SPACE indicates only the space that is currently allocated and available for reuse.DALLOCATED_SPACE indicates both the space currently allocated and used,and the space that is available for reuse.EFREE_SPACE indicates both the space that is currently allocated and available for reuse,and the space that is currently unallocated.