微软认证考试

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the

题目

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()

  • A、Port mirroring
  • B、DHCP guard
  • C、Router guard
  • D、MAC address
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()

A.A

B.B

C.C

D.D


参考答案:A

第2题:

To provide quality of service (QoS) for voice traffic in an IEEE 802.1 q network, which class of service (CoS) value should be used in the 3-bit, user priority bits (PRI) field? ()

  • A、The PRI field should contain the Cos value of 010
  • B、The PRI field should contain the Cos value of 011
  • C、The PRI field should contain the Cos value of 100
  • D、The PRI field should contain the Cos value of 101
  • E、The PRI field should contain the Cos value of 110
  • F、The PRI field should contain the CoS value of 111

正确答案:D

第3题:

Which of the following would contain information regarding network device alerts using SNMP?()

A. Syslog

B. Audit log

C. History log

D. Ping sweep reports


参考答案:A

第4题:

Your network contains an Exchange Server 2010 server.You need to prevent e-mail messages that contain specific words from being sent between users in the organization. What should you do?()

  • A、Create a transport rule.
  • B、Create an Outlook Protection Rule.
  • C、Configure the content filtering feature.
  • D、Configure the sender reputation feature.

正确答案:A

第5题:

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()

  • A、 has a permissive interface that is used to monitor networks
  • B、 is an active device in the traffic path
  • C、 passively listens to network traffic
  • D、 has a promiscuous interface that is used to monitor the network

正确答案:C,D

第6题:

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

  • A、STP
  • B、GVRP
  • C、SNMP
  • D、VTP
  • E、DHCP

正确答案:D

第7题:

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

  • A、Repeater
  • B、Wireless router
  • C、Hub
  • D、Wireless network adapter

正确答案:D

第8题:

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?()

A.A

B.B

C.C

D.D

E.E


参考答案:C, D

第9题:

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()

  • A、 core layer
  • B、 bridging two VLANs on one switch
  • C、 between two Layer 2 devices with trunking
  • D、 between two Layer 2 devices without trunking

正确答案:C,D

第10题:

You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

  • A、Disable the Connect even if the network is not broadcasting option.
  • B、In the Network and Sharing Center window, click the Diagnose and repair option.
  • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
  • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

正确答案:D

更多相关问题