You are a network administrator for The network contains a Windows Server 2003 computer named Testking4, which functions as a file server.Testking4 contains several applications. One application is named App1. Another application is named App2. Users report that App2 is performing poorly. You examine Testking4 and discover that App1 was started by using the start app1 /realtime command.You need to ensure that no other application was started by using the /realtime switch.What should you do?()
A. Use Performance Monitor to create a trace log. Trace Process creations/deletions.
B. Use Performance Monitor to create a trace log. Trace Thread creations/deletions.
C. Use Task Manager to view processes. View the Base Priority column.
D. Use Task Manager to view performance. On the View menu, select Show Kernel Times
时间:2023-09-10 13:00:27
-
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
A . Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
B . Allow all inbound VPN traffic to pass through the perimeter firewall only.
C . Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
D . Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
-
As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)
A . cost savings
B . product variety
C . well-tested interoperability
D . regular upgrade proce
-
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
A . Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
B . Allow all inbound VPN traffic to pass through the perimeter firewall only.
C . Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
D . Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
-
Which IOS command would you use to find out which networks are routed by a particular OSPFprocess?()
A . show ospf
B . show ip route
C . show ip protocols
D . show ip ospf database
E . None of the other alternatives apply
-
You are operating a multi-vendor network and are considering adding redundancy at the access level. Which routing redundancy solution should you implement?()
A . Both Gateway Load Balancing Protocoland Hot Stand by Router Protocol
B . Gateway Load Balancing Protocol
C . Virtual Router Redundancy Protocol
D . Hot Stand by Router Protocol
-
You’re a network administer and you issue the command (show port 3/1) on an Ethernet port. To your surprise you notice a non-zero entry in the ’Giants’ column. What could be the cause of this? ()
A . IEEE 802.1Q
B . IEEE 802.10
C . Misconfigured NIC
D . User configuration
E . All of the above
-
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
A . Wireless router
B . Hub
C . Repeater
D . Wireless network adapter
-
You need to ensure that the network administrators are able to administer the NewApp database servers. Which two actions should you perform?()
A . Create an organizational unit (OU) for all users who log on to any of the NewApp servers.
B . Create an organizational unit (OU) named NewApp Users for the NewApp users.
C . Create an organizational unit (OU) named NewApp Servers for the NewApp servers.
D . Create a Group Policy object (GPO) for the NewApp Users OU to enforce the use of IPSec.
E . Create a global group for all NewApp servers. Add this group to the NewApp Servers OU.
F . Create a Group Policy object (GPO) for the NewApp Servers OU to enforce the use of smart cards.
-
You are experiencing intermittent issues relating to congestion with your network.What are the possible causes of congestion on a LAN?()
A . A broadcast domain with too many hosts.
B . Full duplex operation.
C . Broadcast storms.
D . Multicasting.
E . Network Segmentation.
F . Low bandwidth.
-
You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this network?()
A . There are 254 usable subnets.
B . There are 256 usable hosts per subnet.
C . There are 50 usable subnets.
D . There are 254 usable hosts per subnet.
E . There are 24 usable hosts per subnet.
F . There is one usable network.
-
You are about to migrate a customer network to use a VSS. Which of these statements is true about a VSS? ()
A . The VSS switch must be the root bridge for all VLANs and is automatically designated
B . The VSS switch is defined in RFC 4318 as a managed object
C . The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devices
D . A VSS interoperates with a virtual port channel
E . The 802.1Q or ISL protocols are used to maintain the operational state of the VSS devices
F . A VSS increases the size of the spanning-tree domai
-
You are designing a DNS implementation strategy for the network. Which two zone types should you use?()
A . Reverse lookup zones
B . Standard primary zones
C . Standard secondary zones
D . Active Directory-integrated zone
-
Which command should you use to verify what networks are being routed by a given OSPFprocess?()
A . show ip ospf
B . show ip route
C . show ip protocol
D . show ip ospf database
E . None of the other alternatives apply
-
You are about to migrate a customer network to use a VSS. Which of these statements is true about a VSS?()
A . The VSS switch must be the root bridge for all VLANs and is automatically designated.
B . The VSS switch is defined in RFC 4318 as a managed object.
C . The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devices.
D . A VSS interoperates with a virtual port channel.
E . The 802.1Q or ISL protocols are used to maintain the operational state of the VSS devices.
F . A VSS increases the size of the spanning-tree domain.
-
You administer your companys network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the application. What should you do? ()
A . While the standard user is logged on, at the consent prompt, click Continue and install the application.
B . While the standard user is logged on, at the credential prompt, provide administrative credentials.
C . Create a .pwl file that stores administrative credentials. Double-click the installation file.
D . Copy the contents of the CD-ROM to the local hard disk. Run the application installation from the local hard disk.
-
You are designing a security strategy for users who need remote access to the corporate network. What should you do?()
A . Configure Internet Authentication Service (IAS) for accounting.
B . Configure the server running Routing and Remote Access to support L2TP.
C . Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.
D . Create a separate account for remote access users. Configure these accounts to access the NewApp server only.
-
You are designing a DNS implementation strategy for the network. Which two zone types should you use?()
A . Reverse lookup zones
B . Standard primary zones
C . Standard secondary zones
D . Active Directory-integrated zone
-
You are the network administrator tasked with designing a switching solution for the Company network. Which of the following statements describing trunk links are INCORRECT?()
A . The trunk link belongs to a specific VLAN.
B . Multiple trunk links are used to connect multiple end user devices.
C . A trunk link only supports native VLAN.
D . Trunk links use 802.10 to identify a VLAN.
E . The native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets.
-
Which command should you use to verify what networks are being routed by a given OSPF process()
A . show ip ospf
B . show ip route
C . show ip protocol
D . show ip ospfdatabase
E . None of the other alternatives apply
-
You are a network administrator for The network consists of a single Active Directory domain named.
The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO.
Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:\Program Files\MT Apps. The financial application suite contains many executable files.
Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components.
The financial application suite and the browser-based application are frequently updates with patches or new versions.
You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration.
Which three actions should you perform to configure software restriction polices?()
(Each correct answer presents part of the solution. Choose three)
-
You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.
You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.
Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.
You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.
A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/c1ca10b5ef7976b1e62efd8e32fc3420.jpg' />
You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/35218487c59e1ec9d3305e8d5fd23b81.jpg' />
You need to ensure that Paul can establish Remote Desktop connections with DC1.
What should you do? ()
-
You are administering a database stored in Automatic Storage Management (ASM). You use RMA
You are administering a database stored in Automatic Storage Management (ASM). You use RMAN to back up the database and the MD_BACKUP command to back up the ASM metadata regularly. You lost an ASM disk group DG1 due to hardware failure.In which three ways can you re-create the lost disk group and restore the data?()
A. Use the MD_RESTORE command to restore metadata for an existing disk group by passing the existing disk group name as an input parameter and use RMAN to restore the data.
B. Use the MKDG command to restore the disk group with the same configuration as the backed-up disk group and data on the disk group.
C. Use the MD_RESTORE command to restore the disk group with the changed disk group specification, failure group specification, name, and other attributes and use RMAN to restore the data.
D. Use the MKDG command to restore the disk group with the same configuration as the backed-up disk group name and same set of disks and failure group configuration, and use RMAN to restore the data.
E. Use the MD_RESTORE command to restore both the metadata and data for the failed disk group.
F. Use the MKDG command to add a new disk group DG1 with the same or different specifications for failure group and other attributes and use RMAN to restore the data.
-
You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. User profiles are stored on TestKing2.A user named Sandra reports that she accidentally deleted a folder namedTestKingStuff from her user profile. She needs to have her TestKingStuff folderrestored. Other users are accessing TestKing2, and you do not want to negativelyaffect their work. You locate the latest backup that contains the files that you needto restore.You need to restore Sandra‘s TestKingStuff folder. You want to achieve this goal byusing the minimum amount of administrative effort.What should you do?()
A. Restore Sandra‘s TestKingStuff folder, and clear the Restore junction points, but not the folders and the file data they reference check box.
B. Restore the Documents and Settings folder that contains the TestKingStuff folder.
C. Restore Sandra‘s TestKingStuff folder, and choose an alternate location for the restoration.
D. Restore Sandra‘s TestKingStuff folder, and choose the original location for the restoration.
-
You are the administrator on a Linux network.You have created and are ready to impleme
A.Chmod-M30
B.Chgrp-d30
C.Chage-M30
D.Useradd-D30