Your network includes

题目

Your network includes Windows Server 2008 R2 Hyper-V failover clusters that support highly available virtual machines (VMs).  You manage virtual machines by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are planning to deploy a large number of VMs to the failover clusters. All VMs must remain available when one node of each cluster is offline. You need to determine the best placement for the new VMs among the clusters.  Which two actions should you perform?()

  • A、For each cluster, set the cluster reserve to 1
  • B、In each cluster, place one host server in maintenance mode
  • C、Determine the placement for each VM by using the data that is generated by running the Get-VMHostRating PowerShell cmdlet
  • D、Determine the placement for each VM by using the data that is generated by running the Get-VMPerformance PowerShell cmdlet
参考答案和解析
正确答案:A,C
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?()

A.A

B.B

C.C

D.D

E.E


参考答案:C, D

第2题:

Your virtual environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to configure the live migration network priorities for all virtual machines (VMs). What should you do?()

  • A、Enable Cluster Shared Volumes (CSVs).
  • B、In Failover Cluster Manager, edit the properties of a single VM.
  • C、In Virtual Network Manager, edit the properties of the virtual network.
  • D、In Hyper-V Manager, take each VM offline and edit the settings of each VM.

正确答案:B

第3题:

You are the network administrator for Ezonexam. The network consists of a single Active Directory domain Ezonexam.com. All network servers run Windows Server 2000.

Your network includes a shared folder named EzonexamDocs. This folder must not be visible in a browse list.

However, users report that they can see EzonexamDocs when they browse for shared folders.

How should you solve this problem?

A.Modify the share permissions to remove the All - Read permission on EzonexamDocs from the Users group.

B.Modify the NTFS permissions to remove the Allow - Read permissions on EzonexamDocs from the Users group.

C.Change the share name to EzonexamDocs #.

D.Change the share name to EzonexamDocs $.


正确答案:D
解析:Explanation: Appending a dollar sign ($) to a share name hides the share. A share that is followed by a dollar sign ($) indicates that the share is hidden from view when users access utilities such as My Network Places and browse network resources.

Incorrect answers:
A: The Read share permission allows a user to view and execute files in the shared folder. This is not what is
required. This will not hide the share.

B: The NTFS Read permission allows the following rights: List the contents of a folder and read the data in a folder's files, See a file's or folder's attributes and View ownership. This is not what is required. This will not hide the share. Users will see the share, but get an "Access Denied" message.

C: This sign is used when working with user account templates. The share will be visible with the name EzonexamDocs#.

第4题:

You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

  • A、Disable the Connect even if the network is not broadcasting option.
  • B、In the Network and Sharing Center window, click the Diagnose and repair option.
  • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
  • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

正确答案:D

第5题:

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()

  • A、 core layer
  • B、 bridging two VLANs on one switch
  • C、 between two Layer 2 devices with trunking
  • D、 between two Layer 2 devices without trunking

正确答案:C,D

第6题:

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

  • A、STP
  • B、GVRP
  • C、SNMP
  • D、VTP
  • E、DHCP

正确答案:D

第7题:

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()

  • A、 has a permissive interface that is used to monitor networks
  • B、 is an active device in the traffic path
  • C、 passively listens to network traffic
  • D、 has a promiscuous interface that is used to monitor the network

正确答案:C,D

第8题:

You are the administrator of a Windows 2000 Network for Ezonexam Inc. The network includes four Web servers named WWW1, WWW2, WWW3, and WWW4. Your network also includes a Windows 2000 Server computer that uses DNS.

Each Web server contains exactly the same content, and users accessing www.Ezonexam.com can be directed to any one of them.

You add records to your DNS server, as shown in the following table.

Record type Name IP address

CNAME www 192.168.10.5

CNAME www 192.168.10.6

CNAME www 192.168.10.7

CNAME www 192.168.10.8

When you examine the logs for the Web servers, you discover that all incoming traffic is being directed to 192.168.10.5, which is the IP address for WWW1.

You want the incoming traffic to be balanced across the four Web servers. What should you do?

A.Select the Disable recursion check box in the properties of the DNS server.

B.Enable round-robin in the properties of the DNS server.

C.Enable W3C logging in the properties of the Web servers.

D.Install and configure Network Load Balancing on WWW1.


正确答案:B
解析:Explanation: By enabling round robin the DNS server will start to rotate between the CNAME records when it resolves the host name www. This will result in load balancing between the web servers.

Incorrect Answers
A: Disabling recursion would prevent the local DNS server from using other DNS servers. It would not be helpful in configuring load balancing.
Note: A DNS server can query or contact other DNS servers on behalf of the requesting client to fully resolve the name, and then send an answer back to the client. This process is known as recursion.

C: W3C logging would enhance the logging that takes place. This could be useful of security reasons. It would not be helpful for load balancing purposes.

D: Load Balancing must be configured on all the servers that should be load balanced.

第9题:

In what way does Cisco SMARTnet help customers protect their network investments?()

  • A、allows them to acquire replacement hardware as needed instead of carrying it in inventory
  • B、includes upgrade insurance
  • C、includes Cisco Learning Credits for staff training
  • D、provides them with trade-in incentives for their end-of-life products

正确答案:A

第10题:

Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You plan to deploy Microsoft Virtual Desktop Infrastructure. You plan to scale both static and dynamic deployments across several servers. You need to design a plan that supports static and dynamic deployments and that allows for capacity growth without outages. What should you include in your plan?()

  • A、Use the Remote Desktop Connection Broker and failover clustering
  • B、Use the Remote Desktop Gateway and network load balancing
  • C、Use network load balancing and failover clustering
  • D、Use DNS round-robin and network load balancing

正确答案:A

更多相关问题