更多“The company network is in the pr”相关问题
  • 第1题:

    You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()

    A.A

    B.B

    C.C

    D.D


    参考答案:C

  • 第2题:

    You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()

    A.Campus

    B.Teleworker

    C.Branch

    D.Data center


    参考答案:C

  • 第3题:

    Jitter is causing problems with the VOIP application in the Company network.  What causes  network jitter?()

    • A、Variable queue delays
    • B、Packet drops
    • C、Transmitting too many small packets
    • D、Compression

    正确答案:A

  • 第4题:

    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()

    • A、The Connection should be set to Host for the network interface card.
    • B、The Connection should be set to None for the network interface card.
    • C、You should choose the Not connected option for each virtual machine.
    • D、The Enable virtual LAN identification option should be enabled for each virtual machine.

    正确答案:A,D

  • 第5题:

    The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management  domain?()

    • A、Enable VTP pruning on any switch in the management domain
    • B、Enable VTP pruning on any client switch in the domain
    • C、Enable VTP pruning on a VTP server in the management domain
    • D、Enable VTP pruning on every switch in the domain
    • E、None of the other alternatives apply

    正确答案:C

  • 第6题:

    Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()

    • A、Network diagram
    • B、Performance baseline
    • C、Network security procedure
    • D、Company policy

    正确答案:A

  • 第7题:

    Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()

    • A、Create an IPsec Enforcement Network policy.
    • B、Create an 802.1X Enforcement Network policy.
    • C、Create a Wired Network (IEEE 802.3) Group policy.
    • D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

    正确答案:A

  • 第8题:

    You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()

    • A、Replace the network adapters with 10/100 Mbps network adapters. 
    • B、Enable TCP/IP on all of the computers on the network.
    • C、Configure the NWLink frame type of the network adapters to be Ethernet II. 
    • D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.

    正确答案:A

  • 第9题:

    单选题
    Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()
    A

    Configure the NWLink frame type of the network adapters to be ethernet 802.3.

    B

    Configure the NWLink frame type of the network adapters to be ethernet II.

    C

    Replace the network adapters with 10/100 BNC adapters.

    D

    Replace the network adapters with 10/100 UTP network adapters.


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()
    A

    The Connection should be set to Host for the network interface card.

    B

    The Connection should be set to None for the network interface card.

    C

    You should choose the Not connected option for each virtual machine.

    D

    The Enable virtual LAN identification option should be enabled for each virtual machine.


    正确答案: C,A
    解析: 暂无解析

  • 第11题:

    单选题
    The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management  domain?()
    A

    Enable VTP pruning on any switch in the management domain

    B

    Enable VTP pruning on any client switch in the domain

    C

    Enable VTP pruning on a VTP server in the management domain

    D

    Enable VTP pruning on every switch in the domain

    E

    None of the other alternatives apply


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()
    A

     Create an IPsec Enforcement Network policy

    B

     Create an 802.1X enforcement network policy

    C

     Create a wired network (IEEE 802.3) Group Policy

    D

     Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy


    正确答案: A
    解析: 暂无解析

  • 第13题:

    A ______ system placed between the company network and the outside world may limit outside access to the internal network.

    A.firewall

    B.modem

    C.gateway

    D.key


    正确答案:A
    解析:译文的含义是:()系统在公司网络和外部世界之间,可以限制外界访问内部网络。选项A~D的含义分别是防火墙、调制解调器、网关和密钥。

  • 第14题:

    VOIP is being implemented on the Company network. In a properly designed network,  what is the  maximum amount of time a voice package should spend crossing a network?  ()

    • A、90 milliseconds
    • B、120 milliseconds
    • C、150 milliseconds
    • D、240 milliseconds

    正确答案:C

  • 第15题:

    A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?()

    • A、Coaxial
    • B、CAT3
    • C、CAT5
    • D、CAT5e

    正确答案:D

  • 第16题:

    Which should be the key driver for a company security policy’s creation, implementation and enforcement?()

    • A、 the business knowledge of the IT staff
    • B、 the technical knowledge of the IT staff
    • C、 the company’s business objectives
    • D、 the company’s network topology
    • E、 the IT future directions

    正确答案:C

  • 第17题:

    You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()

    • A、Campus
    • B、Teleworker
    • C、Branch
    • D、Data center

    正确答案:C

  • 第18题:

    What must be done in order to automatically close the purchase requisition (PR) after one or more purchase orders (PO) have been created?  ()

    • A、 All PR lines must be assigned to a PO.
    • B、 The PR must be in the Approved status.
    • C、 The PR must enter the workflow process.
    • D、 All manual company input fields must be completed.

    正确答案:A

  • 第19题:

    All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()

    • A、Configure the Network authentication (Shared mode) setting.
    • B、Apply a Wireless Network Policy to set the network type to WPA-PSK.
    • C、Apply a Wireless Network Policy to automatically connect to the company wireless network.
    • D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

    正确答案:D

  • 第20题:

    You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()

    • A、Configure the DSL connection to use PPTP instead of L2TP. 
    • B、Enable Internet Connection Sharing for the DSL connection properties. 
    • C、CLEAR THE Use default gateway on remote network check box. 
    • D、Clear the Require data encryption check box. 

    正确答案:C

  • 第21题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
    A

     the business knowledge of the IT staff

    B

     the technical knowledge of the IT staff

    C

     the company’s business objectives

    D

     the company’s network topology

    E

     the IT future directions


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()
    A

    You should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.

    B

    You should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.

    C

    You should consider having the new server joined to an Active Directory domain.

    D

    You should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?()
    A

    Coaxial

    B

    CAT3

    C

    CAT5

    D

    CAT5e


    正确答案: C
    解析: 暂无解析