niusouti.com

You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the

题目

You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)

A. no single point of failure

B. determine which protocol to use

C. trading database server location

D. deterministic response to all failures


相似考题
更多“You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value tran”相关问题
  • 第1题:

    Your customer wants to build a network for a financial trading floor that has a requirement for multiple high-value transactions, which are also vital to the customer. What are the two most critical requirements? ()(Choose two.)

    • A、no single point of failure
    • B、trading database server location
    • C、redundant application servers location
    • D、deterministic response to all failures
    • E、determine which protocol to use

    正确答案:A,D

  • 第2题:

    As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()

    • A、GLBP
    • B、RSTP
    • C、BPDU guard
    • D、root guard

    正确答案:C

  • 第3题:

    You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

    • A、Repeater
    • B、Wireless router
    • C、Hub
    • D、Wireless network adapter

    正确答案:D

  • 第4题:

    You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()

    • A、Campus
    • B、Teleworker
    • C、Branch
    • D、Data center

    正确答案:C

  • 第5题:

    You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()

    • A、Enable Internet Connection Sharing
    • B、Enable on-demand dialing
    • C、Enable sharing a modem on one computer on the network
    • D、Configure a DHCP Server
    • E、Disable Internet Connection Sharing

    正确答案:A

  • 第6题:

    You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()

    • A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.
    • B、Start the RunAs service and configure the service to start automatically.
    • C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.
    • D、Use Scheduled Tasks to configure the task to run under the security context of your account.

    正确答案:D

  • 第7题:

    You need to recommend the server configurations for the new failover cluster. The configurations must support the company's planned changes    Which two actions should you recommend?()

    • A、From Hyper-V Manager on each node, configure one virtual network.
    • B、From Hyper-V Manager on one node, configure two virtual networks.
    • C、Install one network adapter on each node. Configure the network adapters to use multiple IP ddresses.
    • D、Install two network adapters on each node. Configure the network adapters to communicate on  separate subnets.

    正确答案:A,D

  • 第8题:

    Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? 

    • A、Configure all access points as RADIUS clients to the Remediation Servers
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS)
    • C、Create a Network Policy that defines Remote Access Server as a network connection method
    • D、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

    正确答案:B

  • 第9题:

    多选题
    Your customer wants to build a network for a financial trading floor that has a requirement for multiple high-value transactions, which are also vital to the customer. What are the two most critical requirements? ()(Choose two.)
    A

    no single point of failure

    B

    trading database server location

    C

    redundant application servers location

    D

    deterministic response to all failures

    E

    determine which protocol to use


    正确答案: D,E
    解析: 暂无解析

  • 第10题:

    单选题
    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
    A

    STP

    B

    GVRP

    C

    SNMP

    D

    VTP

    E

    DHCP


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()
    A

    Use Windows Explorer to receive the offline files

    B

    Using the Windows Explorer, disable the cache for the reports on the network share

    C

    Use the Windows NT explorer to grant the special access for the reports on the network  share

    D

    Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions. And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)
    A

    no single point of failure

    B

    determine which protocol to use

    C

    trading database server location

    D

    deterministic response to all failures


    正确答案: C,D
    解析: 暂无解析

  • 第13题:

    You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet.  You have enabled Internet connection sharing. You do not want to initiate this connection automatically when a request for Internet reaches your computer. What should you do? ()

    • A、You should uncheck “Enable on demand dialing
    • B、Enable on-demand dialing
    • C、Enable sharing a modem on one computer on the network
    • D、Configure a DHCP Server
    • E、Disable Internet Connection Sharing

    正确答案:A

  • 第14题:

    You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions. And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)

    • A、no single point of failure
    • B、determine which protocol to use
    • C、trading database server location
    • D、deterministic response to all failures

    正确答案:A,D

  • 第15题:

    As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)

    • A、It provides reliable input for verifying network consistency.
    • B、It requires a network audit to support some upgrade decisions.
    • C、It requires a network audit to support any network restructuring.
    • D、It begins with gathering organizational input that may be inaccurate.

    正确答案:A,C,D

  • 第16题:

    You are the administrator of your company’s network. You run the English (US) edition of Windows 2000 Professional on all computers in your network. As your company continues to grow, and the number of computers is continually expanding, you decide that another domain is needed. Management asks you about what is required to accommodate this new domain. What should you answer the Management in this regard? ()

    • A、WINS, DHCP and DNS
    • B、At least one domain controller and one DNS server.
    • C、At least one domain controller, Active Directory and DNS server.
    • D、Nothing more is needed.
    • E、Nothing more is needed, we can just subnet the network.

    正确答案:C

  • 第17题:

    You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()

    • A、Configure a HOSTS file.
    • B、Configure a LMHOSTS file.
    • C、Configure a WINS server database.
    • D、Configure a DHCP server address.
    • E、Configure at least one DNS address.

    正确答案:A,E

  • 第18题:

    You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()

    • A、Enable Internet Connection Sharing
    • B、Enable on-demand dialing
    • C、Enable sharing a modem on one computer on the network
    • D、Configure a DHCP Server
    • E、Disable Internet Connection Sharing
    • F、Configure all the other computers to be DHCP enabled.

    正确答案:A,F

  • 第19题:

    You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()

    • A、Configure a WMI event trigger.
    • B、Configure a Network Monitor capture filter.
    • C、Configure a Network Monitor trigger.
    • D、Configure a System Monitor alert.

    正确答案:C

  • 第20题:

    You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()

    • A、You should use /63.
    • B、You should use /64.
    • C、You should use /61.
    • D、You should use /62.

    正确答案:B

  • 第21题:

    单选题
    You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs? ()
    A

     Only use fiber in pairs.

    B

     Configure root guard on your switches.

    C

     Do not use fiber but use copper.

    D

     Configure UDLD to prevent one-way link conditions.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()
    A

    When you configure access to the wired network at home, set the wired network adapter location type to Public.

    B

    When you configure access to the wired network at home, set the wired network adapter location type to Private.

    C

    When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

    D

    When you configure access to the public wireless access points, set the wireless network adapter location type to Private.


    正确答案: D,B
    解析: 暂无解析

  • 第23题:

    多选题
    As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)
    A

    It provides reliable input for verifying network consistency.

    B

    It requires a network audit to support some upgrade decisions.

    C

    It requires a network audit to support any network restructuring.

    D

    It begins with gathering organizational input that may be inaccurate.


    正确答案: A,C,D
    解析: 暂无解析