MO type Filter
Radio and Transport Network
Advaned Filter
Transport Network only
Radio Network only
第1题:
A.Alarm
B.Radio Network Optimization
C.OSS Common Explorer
第2题:
第3题:
OSI参考模型有哪些层,按顺序()
第4题:
If two routers, both reachable from one another, originate functionally equivalent type 2 external- LSAs (i.e,same destination, cost and non-zero forwarding address ), Which of the following statements wouldapply ?()
第5题:
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()
第6题:
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling. You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home. What are two possible ways to achieve this goal?()
第7题:
Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site. The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network. You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server. What should you include in the plan?()
第8题:
You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment. The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application. You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()
第9题:
Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()
第10题:
Alarm
Radio Network Optimization
OSS Common Explorer
第11题:
When you configure access to the wired network at home, set the wired network adapter location type to Private.
When you configure access to the wired network at home, set the wired network adapter location type to Public.
When you configure access to the public wireless access points, set the wireless network adapter location type to Private.
When you configure access to the public wireless access points, set the wireless network adapter location type to Public.
第12题:
MO type Filter
Radio and Transport Network
Advaned Filter
Transport Network only
Radio Network only
第13题:
第14题:
Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network. What should you do? ()
第15题:
When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()
第16题:
You have a Windows Server 2008 R2 Hyper-V server with a single network adapter that is connected to a virtual network. The virtual network is configured as External. Virtual machines (VMs) running on the server are not able to communicate with the host server over the network. You need to ensure that VMs running on the server are able to communicate with the host server over the network. In Virtual Network Manager,what should you do?()
第17题:
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()
第18题:
You share your computer with a co-worker by using separate user accounts to log on. Your co-worker modifies the wireless network properties. When you use the computer, the change in properties is not reflected. You need to ensure that you can view all the changes made to the wireless network properties. What should you do?()
第19题:
You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()
第20题:
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home. Which two actions should you perform?()
第21题:
It can be configured to block Java traffic.
It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
It can only examine network layer and transport layer information.
It can only examine transport layer and application layer information.
The inspection rules can be used to set timeout values for specified protocols.
The ip inspect cbac-name command must be configured in global configuration mode.
第22题:
When you configure access to the wired network at home, set the wired network adapter location type to Public.
When you configure access to the wired network at home, set the wired network adapter location type to Private.
When you configure access to the public wireless access points, set the wireless network adapter location type to Public.
When you configure access to the public wireless access points, set the wireless network adapter location type to Private.
第23题:
Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.
Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.
Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.
Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.
第24题:
The type of application used on the network
The type of system bus used by the computers
The type of memory installed in each computer
The type of media used in the network topology
The type of protocols used in the network
The physical layout of the network hosts