Which protocol creates a complete database of the network topology prior to calculating the optimal route?()
A.BGP
B. PIM
C. OSPF
D. RIP
A.BGP
B. PIM
C. OSPF
D. RIP
A. Specify Marketing.Testking.com and Sales.Testking.com as the host header names for the two new Web sites.
B. For each new Web site, create a file named Default.htm in the directory path.
C. For each new Web site, specify a unique TCP port. Ensure that all client computers use the appropriate port to connect to each site,
D. For all Web sites, create custom HTTP headers.
E. For all Web sites, specify unique IP addresses. Modify the appropriate host records on the DNS server.
F. For all Web sites, enable anonymous access.
single Active Directory domain named The domain contains Windows
Server 2003 computers and Windows XP Professional computers.
All confidential company files are stored on a file server named TestKing1. The
written company security states that all confidential data must be stored and
transmitted in a secure manner. To comply with the security policy, you enable
Encrypting File System (EFS) on the confidential files. You also add EFS
certificates to the data decryption field (DDF) of the confidential files for the users
who need to access them.
While performing network monitoring, you notice that the confidential files that are
stored on TestKing1 are being transmitted over the network without encryption.
You must ensure that encryption is always used when the confidential files on
TestKing1 are stored and transmitted over the network.
What are two possible ways to accomplish this goal?() (Each correct answer presents
a complete solution. Choose two)
A. In the Backup utility, clear the Enabled (scheduled tasks runs at specified time) check box.
B. In Control Panel, use Scheduled Tasks to pause Task Scheduler.
C. Run the Schtasks command with the /end /p parameters.
D. Use the Services snap-in to change the startup type of the Task Scheduler service from Automatic to Manual.
A. On each server in your office, use Performance Logs and Alers to create a baseline log. Configure the log tocollect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
B. From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
C. On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.
D. From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.
The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA.
All file servers in the New York office are in an organizational unit (OU) named
New York Servers. You have been assigned the Allow - Change permission for a
Group Policy object (GPO) named NYServersGPO, which is linked to the New
York Servers OU.
The written company security policy states that all new servers must be configured
with specified predefined security settings when the servers join the domain. These
settings differ slightly for the various company offices.
You plan to install Windows Sever 2003, on 15 new computers, which all functions
as file servers. You will need to configure the specified security settings on the new
file servers.
TestKingA currently has the specified security settings configured in its local
security policy. You need to ensure that the security configuration of the new file
servers is identical to that of TestKingA. You export a copy of TestKingA‘s local
security policy settings to a template file.
You need to configure the security settings of the new servers, and you want to use
the minimum amount of administrative effort.
What should you do?()
A. Turn down the transmission strength of the access point.
B. Replace the antenna with a smaller one.
C. Change the wireless password to a more complex one.
D. Change the SSID of the access point
TestKing‘s main office is located in Berlin, which is also the location of all domain controllers. The Berlin office contains 200 client computers.
A branch office is located in Helsinki. This office contains 60 client computers. All user accounts for permanent employees in Helsinki are contained in an organizational unit (OU) named HelUsers. All user accounts for temporary employees in Helsinki are contained in an OU named TempUsers.
A temporary employee named King is hired in the Helsinki office. The business hours in his office are 9:00 A.M. to 5:00 P.M. at 9:05 A.M. on his first Monday at work, King tries to log on to the domain from his client computer. However, he receives the message shown in the exhibit.
You need to ensure that King can log on to the domain.
What should you do?()
A. Dynamic routing provides redundant IP addresses for end-user devices, unlike static routing.
B. Dynamic routing requires no initial user configuration, unlike static routing.
C. Dynamic routing provides DNS services along with IP connectivity; static routing does not.
D. Dynamic routing typically requires less time to implement than static routing in a large network.
为了保护您的账号安全,请在“简答题”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!