You are the network administrator for Company. Company has r

题目
单选题
You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()
A

Enable DHCP in the TCP/IP properties.

B

Replace the Token Ring network adapter with an Ethernet network adapter.

C

Configure a different TCP/IP address on the same subnet.

D

Configure a valid DNS Server in the TCP/IP properties.

参考答案和解析
正确答案: B
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()

A.Campus

B.Teleworker

C.Branch

D.Data center


参考答案:C

第2题:

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()

  • A、Campus
  • B、Teleworker
  • C、Branch
  • D、Data center

正确答案:C

第3题:

Can you provide a bodyguard for the CEO of our company?

A.Yes. A former national judo champion is in our company. You will be satisfied with him.

B.No. Our company is expected to have a judo champion If he comes, you will be satisfied with him.

C.No. He has already removed to a neighboring city. If he were here, you would be satisfied with him.

D.Yes. My company has got a former national judo champion But he is highly demanding


正确答案:A

第4题:

You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()

  • A、You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.
  • B、You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.
  • C、You should consider having mail enabled for KingPublic.
  • D、You should consider having the author role assigned to Anonymous.

正确答案:C

第5题:

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange  Server 2010 organization.Company.com contains an exchange server 2010 server named -sr15 that has the following roles installed: client access, hub transport, and mailbox server.the Company.com also has a windows server 2008 r2 certification authority (ca).Company.com has merged with another company named Courseware Publishers that contains an internal root C A.You have received instructions from the CIO to install a certificate to create the federated trust as well as to reduce the cost. What should you do?()

  • A、You need to set up a computer certificate request on -sr15; thereafter you should submit the request to a third-party trusted ca
  • B、You need to use -sr15 and generate a self-signed certificate
  • C、You need to use request a computer certificate from the Company.com.com ca from -sr15
  • D、You need to set up a computer certificate request on -sr15; thereafter you should submit the request to courseware publishers ca

正确答案:A

第6题:

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()

  • A、You should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.
  • B、You should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.
  • C、You should consider having the new server joined to an Active Directory domain.
  • D、You should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.

正确答案:D

第7题:

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server. Which account type should you use? () 

  • A、You should use local Service account
  • B、You should use network Service account
  • C、You should use domain account
  • D、You should use local System account

正确答案:C

第8题:

You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


正确答案:B
解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

Incorrect answers:
A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

第9题:

You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()

  • A、Enable DHCP in the TCP/IP properties.
  • B、Replace the Token Ring network adapter with an Ethernet network adapter.
  • C、Configure a different TCP/IP address on the same subnet.
  • D、Configure a valid DNS Server in the TCP/IP properties.

正确答案:B

第10题:

Your company has four regional offices. You install the Windows Deployment Services (WDS) role on the network.  Your company creates three images for each office. There are a total of 12 images for the company. The images will be used as standard images for workstations. You deploy the images by using WDS. You need to ensure that each administrator can view only the images for his or her regional office. What should you do?()

  • A、Create a global group for each regional office and place the computers in the appropriate global group.
  • B、Create an organizational unit (OU) for each regional office and place the computers in the appropriate OU.
  • C、Place all images into a single image group on the WDS server. Grant each administrator permissions to the image group.
  • D、Place each regional office into a separate image group on the WDS server. Grant each administrator permissions to his or her regional offices image group.

正确答案:D

更多相关问题