-
As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)
A . cost savings
B . product variety
C . well-tested interoperability
D . regular upgrade proce
-
You are designing the IP addressing scheme for the new Barcelona office. Which network address or addresses are valid for your design?()
A . 10.10.10.0/28
B . 10.10.255.0/24
C . 131.15.0.0/24
D . 151.10.10.0/24
E . 192.168.11.0/25
-
You are designing the DNS name resolution strategy for the internal network. What should you do? ()
A . Configure all internal DNS servers to use the default root hints.
B . Disable recursion on the DNS server in Seattle. Configure the Seattle DNS to use Dallas DNS server as a forwarder.
C . Create a root zone on the DNS server in Dallas. Configure the Seattle DNS server to use the Dallas DNS server as a forwarder.
D . Create a root zone on the DNS server in both Dallas and Seattle.
-
You are operating a multi-vendor network and are considering adding redundancy at the access level. Which routing redundancy solution should you implement?()
A . Both Gateway Load Balancing Protocoland Hot Stand by Router Protocol
B . Gateway Load Balancing Protocol
C . Virtual Router Redundancy Protocol
D . Hot Stand by Router Protocol
-
As a Network Engineer, you have to master how to deploy Virtual Storage Area Network and what are the results of the deployment. Which two of the following are resulting from its deployment?()
A . reduced backup
B . increased security
C . greater storage demand
D . improved availability
-
You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()
A . CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;
B . CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;
C . CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;
D . CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;
-
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
A . Wireless router
B . Hub
C . Repeater
D . Wireless network adapter
-
You need to ensure that the network administrators are able to administer the NewApp database servers. Which two actions should you perform?()
A . Create an organizational unit (OU) for all users who log on to any of the NewApp servers.
B . Create an organizational unit (OU) named NewApp Users for the NewApp users.
C . Create an organizational unit (OU) named NewApp Servers for the NewApp servers.
D . Create a Group Policy object (GPO) for the NewApp Users OU to enforce the use of IPSec.
E . Create a global group for all NewApp servers. Add this group to the NewApp Servers OU.
F . Create a Group Policy object (GPO) for the NewApp Servers OU to enforce the use of smart cards.
-
You are the Cisco Network Designer in Cisco.com. Which two statements about Layer 3 access designs are correct?()
A . Convergence time is fractionally slower than STP.
B . Broadcast and fault domains are increased.
C . IP address space is difficult to manage.
D . Fast uplink convergence is supported for failover and fallback.
-
You are designing a DNS implementation strategy for the network. Which two zone types should you use?()
A . Reverse lookup zones
B . Standard primary zones
C . Standard secondary zones
D . Active Directory-integrated zone
-
Network topology Exhibit:
https://assets.asklib.com/images/image2/2018073108484671566.jpg
You work as a network engineer for. You are required to set up the network being displayed in the network topology exhibit through the console using IOS commands.
A . 正确
B . 错误
-
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
A . Network management
B . Network optimization
C . Network security
D . Content storage networking
-
You are designing a DNS implementation strategy for the network. Which two zone types should you use?()
A . Reverse lookup zones
B . Standard primary zones
C . Standard secondary zones
D . Active Directory-integrated zone
-
You are designing the IP addressing scheme for the new Barcelona office. Which network address or addresses are valid for your design?()
A . 10.10.10.0/28
B . 10.10.255.0/24
C . 131.15.0.0/24
D . 151.10.10.0/24
E . 192.168.11.0/25
-
You are the network administrator tasked with designing a switching solution for the Company network. Which of the following statements describing trunk links are INCORRECT?()
A . The trunk link belongs to a specific VLAN.
B . Multiple trunk links are used to connect multiple end user devices.
C . A trunk link only supports native VLAN.
D . Trunk links use 802.10 to identify a VLAN.
E . The native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets.
-
You are the Cisco Network Designer in Cisco.com. You are designing an e-Commerce module,which routing statement is correct?()
A . Routing is mostly static.
B . Hardcoded IP addresses are used to support failover.
C . Inbound servers use the CSM or ACE as the default gateway.
D . VLANs between the access layer switches are used for FHRP protocols.
-
You are subneting in the network, out of network address,what’s feature can add one more address?
-
You are the Cisco Network Designer in Cisco.com. You are designing an e-Commerce module, which routing statement is correct?()
A . Routing is mostly static.
B . Hardcoded IP addresses are used to support failover.
C . Inbound servers use the CSM or ACE as the default gateway.
D . VLANs between the access layer switches are used for FHRP protocols.
-
You are the network administrator in the New York office of TestKing.The company net
You are the network administrator in the New York office of TestKing.
The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA.
All file servers in the New York office are in an organizational unit (OU) named
New York Servers. You have been assigned the Allow - Change permission for a
Group Policy object (GPO) named NYServersGPO, which is linked to the New
York Servers OU.
The written company security policy states that all new servers must be configured
with specified predefined security settings when the servers join the domain. These
settings differ slightly for the various company offices.
You plan to install Windows Sever 2003, on 15 new computers, which all functions
as file servers. You will need to configure the specified security settings on the new
file servers.
TestKingA currently has the specified security settings configured in its local
security policy. You need to ensure that the security configuration of the new file
servers is identical to that of TestKingA. You export a copy of TestKingA‘s local
security policy settings to a template file.
You need to configure the security settings of the new servers, and you want to use
the minimum amount of administrative effort.
What should you do?()
-
You are a network administrator for The network consists of a single Active Directory domain named.
The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO.
Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:\Program Files\MT Apps. The financial application suite contains many executable files.
Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components.
The financial application suite and the browser-based application are frequently updates with patches or new versions.
You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration.
Which three actions should you perform to configure software restriction polices?()
(Each correct answer presents part of the solution. Choose three)
-
You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.
You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.
Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.
You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.
A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/c1ca10b5ef7976b1e62efd8e32fc3420.jpg' />
You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/35218487c59e1ec9d3305e8d5fd23b81.jpg' />
You need to ensure that Paul can establish Remote Desktop connections with DC1.
What should you do? ()
-
You are the administrator of the Coho Vineyard network. The network consists of 10 Windows 2000 Advanced Server computers and 250 Windows 2000 Professional computers.
Your company has two domains cohovineyard.com and westcoastsales.com.
The company's intranet site is on a Windows 2000 Advanced Server computer named ServerA. ServerA is in the cohovineyard.com domain and is running Internet Information Services (IIS) and Microsoft Proxy Server 2.0
You want to configure the Windows 2000 Professional computers in the westcoastsales.com domain to access the intranet site. You want users to be able to connect to the intranet site by using the URL http://serverA rather than its fully qualified domain name.
What should you do?
A.Add cohovineyard.com to the Domain Suffix Search Order on the computers.
B.Add westcoastsales.com to the Domain Suffix Search Order on the computers.
C.Add westcoastsales.com to the exceptions list in the proxy server settings on the computers.
D.Configure the proxy server settings on the computers to bypass the proxy server for intranet addresses.
-
You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.
However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?
A. STP
B. GVRP
C. SNMP
D. VTP
E. DHCP
F. None of the above
-
You are the administrator on a Linux network.You have created and are ready to impleme
A.Chmod-M30
B.Chgrp-d30
C.Chage-M30
D.Useradd-D30