-
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
A . Virtual Gateway
B . Real-IP Gateway
C . NAT Gateway
D . Central Gateway
-
Your company has an IPv6 network that has 25 segments. You deploy a server on the IPv6 network. You need to ensure that the server can communicate with all segments on the IPv6 network. What should you do? ()
A . Configure the IPv6 address as fd00::2b0:d0ff:fee9:4143/8
B . Configure the IPv6 address as fe80::2b0:d0ff:fee9:4143/64
C . Configure the IPv6 address as ff80::2b0:d0ff:fee9:4143/64
D . Configure the IPv6 address as 0000::2b0:d0ff:fee9:4143/64
-
Your network contains a server that runs Windows Server 2008. The server has the Network Policy Server (NPS) service role installed. You need to allow only members of a global group named Group1 VPN access to the network. What should you do?()
A . Add Group1 to the RAS and IAS Servers Group
B . Add Group1 to the Network Configuration Operators group
C . Create a new network policy and define a group-based connection for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1
D . Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access Granted. Set the processing of the policy to 3.
-
Your company has deployed Network Access Protection (NAP) enforcement for VPNs.You need to ensure that the health of all clients can be monitored and reported. What should you do?()
A . Create a Group Policy object (GPO) that enables Security Center and link the policy to the domain.
B . Create a Group Policy object (GPO) that enables Security Center and link the policy to the Domain Controllers organizational unit (OU).
C . Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the domain.
D . Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the Domain Controllers organizational unit (OU).
-
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
A . Virtual Gateway
B . Real-IP Gateway
C . NAT Gateway
D . Central Gateway
-
Your network contains a server that runs Windows Server 2008 R2. The server has the Network Policy and Access Services server role installed. You need to allow only members of a global group named Group1 VPN access to the network. What should you do? ()
A . Add Group1 to the RAS and IAS Servers group.
B . Add Group1 to the Network Configuration Operators group.
C . Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.
D . Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.
-
Your network contains an Active Directory domain that has two sites. You need to identify whether logon scripts are replicated to all domain controllers. Which folder should you verify()
A . GroupPolicy
B . NTDS
C . SoftwareDistribution
D . SYSVOL
-
A switch that is to be added to the production network has been preconfigured (trunks, VLANs, VTP, and STP) and was tested in your lab. After installing the switch into the network, the entire network went down. What might explain what happened? ()
A . The new switch happened to be running Cisco Catalyst operating system, while the other network switches were running Cisco IOS Software.
B . The configuration revision of the new switch was higher than the configuration revision of the production VTP domain.
C . The link costs on the new switch are set to a high value, causing all ports on the new switch to go into a forwarding mode and none into blocking mode, thereby causing a spanning-tree loop.
D . The ports connecting to the two switches have been configured incorrectly. One side has the command switchport mode access and the other switchport mode trunk.
-
Your company has an IPv6 network that has 25 segments. You deploy a server on the IPv6 network.You need to ensure that the server can communicate with all segments on the IPv6 network. What should you do?()
A . Configure the IPv6 address as fd00::2b0:d0ff:fee9:4143/8.
B . Configure the IPv6 address as fe80::2b0:d0ff:fee9:4143/64.
C . Configure the IPv6 address as ff80::2b0:d0ff:fee9:4143/64.
D . Configure the IPv6 address as 0000::2b0:d0ff:fee9:4143/64.
-
ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Management Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()
A . 1
B . 2
C . 3
D . 4
-
Your network has 1,000 client computers that run Windows 7. You need to install an application, in the Local System account context,on the client computers. What are two possible ways to achieve this goal?()
A . Configure a logon script.
B . Configure a logoff script.
C . Configure a startup script.
D . Configure a shutdown script.
-
Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()
A . Local Security Policy
B . Scw
C . Secedit
D . Services console
-
Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network. What should you do?()
A . Change the Network Category setting of the wireless connection to Public.
B . Enable the Internet Connection Sharing feature on the wireless network adapter.
C . Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.
D . Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.
-
Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN.
What should you do?()
https://assets.asklib.com/images/image2/2018073115210636836.jpg
A . A
B . B
C . C
D . D
-
Your network has a mixture of Fast Ethernet and Gigabit Ethernet links. What needs t o be done to ensure optimal data routing when using OSPF?()
A . Nothing. OSPF will determine the most optimal path for routing data by default.
B . Adjust the hello and dead timers for more rapid detection of link failures.
C . Increase the reference - bandw idth used to calculate the interface default metrics, on all routers in your network.
D . Set the priority values on every broadcast interface to ensure that the designated and backup designated routers are the routers with the most processor and memory resources.
-
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a zero-touch installation strategy.()
A . unattended installation
B . custom Windows 7 image on DVD
C . Windows Deployment Services (WDS)
D . Microsoft System Center Configuration Manager 2007 R2
-
Your company has deployed network access protection (NAP) enforcement for VPNs. You need to ensure that the health of all clients can be monitored and reported. What should you do?()
A . Create a group policy object (GPO) that enabled security center and link the policy to the domain.
B . Create a group policy object (GPO) that enabled security center and link the policy to the domain controllers organizational unit (OU).
C . Create a group policy object (GPO) and set the require trusted path for credential entry option to enabled. Link the policy to the domain.
D . Create a group policy object (GPO) and set the require trusted path for credential entry option to Enabled. Link the policy to the domain controllers organizational unit (OU).
-
Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN. What should you do?()
A . Use the Mobile PC program.
B . Use the Ease of Access program.
C . Use the System and Maintenance program.
D . Use the Network and Sharing Center program.
-
Your company has an ipv6 network that has 25 segments. You deploy a server on the ipv6 network. You need to ensure that the server can communicate with all segments on the IPv6 network. What should you do?()
A . ConfiguretheIPv6addressasfd00::2b0:d0ff:fee9:4143/8
B . ConfiguretheIPv6addressasfe80::2b0:d0ff:fee9:4143/64
C . ConfiguretheIPv6addressasff80::2b0:d0ff:fee9:4143/64
D . ConfiguretheIPv6addressas0000::2b0:d0ff:fee9:4143/64
-
Your Company has migrated to IPv6 in their network. Which three IPv6 notations represent the same address?()
A . 2031::130F::9C0:876A:130B
B . 2031:0000:130F:0000:0000:09C0:876A:130 B
C . 2031:0:130F:::9C0:876A:130B
D . 2031::130F:0::9C0:876A:130B
E . 2031:0:130F:0:0:09C0:876A:130B
F . 2031:0:130F::9C0:876A:130B
-
听力原文:The balance in your bank account is 15,000 dollars only, and so this check in the amount of 20,000 dollars has to be bounced.
(30)
A.The figure on the check exceeds the balance in the bank account, so it's worthless.
B.If you cash the check in the amount of 15;000, we can do that for you.
C.You have plenty of money in your bank account, so we'll cash your check right now.
D.Your check can still be cashed if you deposit another 50,000 dollars now.
-
Your company network includes 6,000 Windows 2000 Professional client computers and 35 Windows 2000 Server computers in a single domain.
Your company has a print device that is used to print payroll checks. The print device is physically attached to the parallel port of one of the client computers. This print device's tray is loaded with checks at all times. You have shared this printer on the network as ChkPrinter and retained the default permissions.
A payroll application runs on a server named HRserv. Every Wednesday at 5:00P.M, the application prints paychecks from employees on this printer. The payroll application runs as a Windows 2000 service on HRserv.
You need to configure ChkPrinter so that only the payroll application will be able to use the printer.
What should you do?
A.Configure the share name for ChkPrinter to be ChkPrinter$. Configure the payroll application to print to this new share name.
B.Configure ChkPrinter so that it is available only from5:00 P.Mto5:30 P.M
C.Configure ChkPrinter to allow the HRserv domain account print permissions for ChkPrinter. Remove print permissions for the Everyone group.
D.Configure ChkPrinter to allow all HRserv domain accounts Print permissions for ChkPrinter. Change the permissions to deny print on ChkPrinter for the Everyone group.
-
Suppose your firm invests $100,000 in a project in Italy. At the time the exchange rate is $1.25 = €1.00. One year later the exchange rate is the same, but the Italian government has expropriated()
A.Exchange rate risk
B.Political risk
C.Market imperfections
D.None of the above,since $100,000 = €80,000 ′ $1.25/1.00
-
Your company has a server named Server1 that runs a Server Core installation of Windows Server 2008 R2, and the DNS Server server role. Server1 has one network interface named Local Area Connection. The static IP address of the network interface is configured as 10.0.0.1. You need to create a DNS zone named local.contoso.com on Server1.Which command should you use?()
A. ipconfig /registerdns:local.contoso.com
B. dnscmd Server1 /ZoneAdd local.contoso.com /DSPrimary
C. dnscmd Server1 /ZoneAdd local.contoso.com /Primary /file local.contoso.com.dns
D. netsh interface ipv4 set dnsserver name=±local.contoso.co¡± static 10.0.0.1 prima