微软认证考试

Your network contains two Active Directory forests named contoso.com and    nwtraders.com. A  two-way forest trust exists between contoso.com and nwtraders.com. The forest trust is  configured to use selective authentication.   Contoso.com contains a ser

题目

Your network contains two Active Directory forests named contoso.com and    nwtraders.com. A  two-way forest trust exists between contoso.com and nwtraders.com. The forest trust is  configured to use selective authentication.   Contoso.com contains a server named Server1. Server1 contains a shared folder named  Marketing. Nwtraders.com contains a global group named G_Marketing. The Change share  permission and the Modify NTFS permissions for the Marketing folder are assignes to the  G_Marketing group.   Members of G_Marketing report that they cannot accesss the Marketing folder.   You need to ensure that the G_Marketing members can accesss the folder from the network.     What should you do()

  • A、From Windows Explorer, modify the NTFS permissions of the folder
  • B、From Windows Explorer, modify the share permissions of the folder
  • C、From Active Directory Users and Computers, modify the computer object for Server1
  • D、From Active Directory Users and Computers, modify the group object for G_Marketing
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()

A.A

B.B

C.C

D.D


参考答案:C

第2题:

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

  • A、STP
  • B、GVRP
  • C、SNMP
  • D、VTP
  • E、DHCP

正确答案:D

第3题:

You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.

However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?

A. STP

B. GVRP

C. SNMP

D. VTP

E. DHCP

F. None of the above


正确答案:D
D 解析:Explanation:
The VTP (VLAN Trunking Protocol) is a Cisco Layer 2 messaging protocol that manages the addition, deletion, and renaming of VLANs on a network-wide basis. It allows for VLAN information to span multiple switches within the switch domain.

Incorrect Answers:
A. STP is a switching protocol but it is used for preventing network loops.

B. GVARP is an actual protocol used in switch administration, but it beyond the scope of what a CCNA is expected to know.

C. SNMP is a protocol used for managing and monitoring networks

E. DHCP is the Dynamic Host Configuration Protocol, which allows for PC's to obtain their IP address dynamically upon booting up, along with their DNS and default gateway information.

第4题:

You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

  • A、Disable the Connect even if the network is not broadcasting option.
  • B、In the Network and Sharing Center window, click the Diagnose and repair option.
  • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
  • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

正确答案:D

第5题:

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()

  • A、 has a permissive interface that is used to monitor networks
  • B、 is an active device in the traffic path
  • C、 passively listens to network traffic
  • D、 has a promiscuous interface that is used to monitor the network

正确答案:C,D

第6题:

You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()

A.A

B.B

C.C

D.D


参考答案:A

第7题:

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

  • A、Repeater
  • B、Wireless router
  • C、Hub
  • D、Wireless network adapter

正确答案:D

第8题:

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?()

A.A

B.B

C.C

D.D

E.E


参考答案:C, D

第9题:

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()

  • A、 core layer
  • B、 bridging two VLANs on one switch
  • C、 between two Layer 2 devices with trunking
  • D、 between two Layer 2 devices without trunking

正确答案:C,D

第10题:

You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()

  • A、Restart the computer in the docking station.
  • B、Run the Add/Remove Hardware wizard.
  • C、Use Device Manager to scan for hardware changes.
  • D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.
  • E、Install the new network adapter driver.

正确答案:B,E

更多相关问题