Users at the Charleville Company

题目

Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()

  • A、Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
  • B、Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
  • C、Use class-based policing to limit the peer-to-peer traffic rate.
  • D、Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C
参考答案和解析
正确答案:C
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Company A is a cloud service provider that provides users with old tenants,customizable office software and customer relationship management software.The cloud service provided by Company A belongs to()service type.

A.IaaS
B.PaaS
C.SaaS
D.DaaS

答案:C
解析:
解析:翻译:A公司是一家云服务提供商,向用户提供老租户、可定制的办公软件和客户关系管理软件,A公司所提供的此项云服务属于( )服务类型。A.IaaS B.PaaS C.SaaS D.DaaS
云计算服务按照提供的资源层次,可以分为IaaS、PaaS、SaaS等三种服务类型。——IaaS(基础设施即服务),向用户提供计算机能力、存储空间等基础设施方面的服务。——PaaS(平台即服务),向用户提供虚拟的操作系统、数据库管理系统、Web应用等平台化的服务。——SaaS(软件即服务),向用户提供应用软件(如CRM、办公软件等)、组件、工作流等虚拟化软件的服务。

第2题:

Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()

  • A、Open port 1423 on the firewall
  • B、Open port 1723 on the firewall
  • C、Open port 3389 on the firewall
  • D、Open port 6000 on the firewall

正确答案:B

第3题:

Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem.Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()

A. dig company.com ns

B. ipconfig/all

C. ifconfig-a

D. dig company.com mx


参考答案:A

第4题:

You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization named Company.com.All Company.com users make use of their Personal Archive. A new Company.com directive states hat messages be moved from the mail box of users to their Personal Archive after 60 days.What should you do?()

  • A、You should consider running the New Managed Content Settings wizard and creating a new managed folder mailbox policy.Thereafter the policy should be applied to all users.
  • B、You should consider creating a managed custom folder.Then the New Managed Content Settings wizard should be run and a journal rule created.
  • C、You should consider having a retention tag created.Then the retention tag should be assigned to a retention policy.Thereafter the retention policy should be applied to all users.
  • D、You should consider having a retention tag created.Then the retention tag should be assigned to a retention policy. Thereafter a journal rule should be created.

正确答案:C

第5题:

Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()

  • A、dig company.com ns
  • B、ipconfig/all
  • C、ifconfig-a
  • D、dig company.com mx

正确答案:A

第6题:

An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()

  • A、Secure VPN
  • B、MAC filtering
  • C、IP filtering
  • D、Static IP addresses

正确答案:B

第7题:

A company may use the Windows XP Professional MUI Pack because the company:()

  • A、has offices where users who speak different languages share computers.
  • B、wants to maintain multiple operating systems.
  • C、has users who work remotely at home offices.
  • D、wants to deploy and maintain a single operating system standard.

正确答案:A,D

第8题:

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()

A.A

B.B

C.C

D.D


参考答案:C

第9题:

A company has acquired another company and is consolidating data centers. During the consolidation, half of the users of a business critical application lost access. The users who maintained access experienced slow performance.  What is the first action the SAN/storage administrator should take to determine the source of the problem()

  • A、review SAN configuration, connectivity, and zoning
  • B、review application parameters for contention or tuning problems
  • C、use internal disk monitoring tools to determine the problem source
  • D、check the disk parameters in the OS setup on the systems

正确答案:A

第10题:

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()

  • A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.
  • B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.
  • C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.
  • D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

正确答案:A

更多相关问题