ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Management Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()A.1B.2C.3D.4

题目

ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Management Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()

A.1

B.2

C.3

D.4


相似考题

3.Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()

更多“ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Managem ”相关问题
  • 第1题:

    The company has the right to end his employment at any time.

    A:offer
    B:continue
    C:stop
    D:provide

    答案:C
    解析:
    这句话的意思是:公司有权在任何时间终止对他的雇用。句中“end”意为“结束”,四个 选项中A项意为“提出”;B项意为“继续”;C项意为“停止”;D项意为“提供”。因此只有C项最为合适。

  • 第2题:

    资料:As more personal business is conducted through smartphone devices , more users are implementing security measures for their devices, according to a recent survey by Harris Poll and commissioned by the CTIA.
    The survey was a part of the company’s ongoing efforts to boost user education on the pitfalls of mobile security and assess whether the CTIA’s initiatives are working.
    It turns out that mobile users in the US have begun implementing many of the initiatives set forth and have increased both awareness of, and protection for, their mobile devices:
    More smartphone users are protecting their devices with PINs and passwords than in previous years. In 2016, of smartphone users had some sort of PIN/password, up from 2015 and form 2012.
    An increasing number of smartphone users have installed built-in remote lock-and-erase software. Of survey respondents, have this type of lock-and-erase software installed, up an astounding from 2015 and from 2012.
    Smartphone users are increasingly aware of the importance of anti-virus software. of smartphone users have an anti-virus software installed, compared with only of smartphone owners in 2015, according to BI Intelligence.
    The survey results indicate that users are becoming increasingly aware of the danger posed by the increasing reliance on mobile technology form not only malicious entities like hackers, but also government surveillance. Specifically, users are increasingly seeking for ways to guard themselves in light of a number of recent high-profile incidents involving phone security–like Apple's case against the FBI, for example.
    Because of this, it will become increasingly common for app developers and device manufactures to build in security and end-to-end encryption. This can be seen in devices and apps such as WhatsApp and iPhones. Developers and device manufacturers that don't include this feature in their products could be faced with negative consumer attitudes.

    In what way shows that people have increased awareness of and protection for their mobile devices?

    A.Smartphone users are increasingly aware of the importance of anti-virus software.
    B.An increasing number of smartphone users have installed built-in remote lock-and-erase software.
    C.More smartphone users are protecting their devices with PINs and passwords than in previous years.
    D.All of above.

    答案:D
    解析:
    本题考查的是细节理解。
    【关键词】in what way;awareness of and protection; mobile devices
    【主题句】第四段More smartphone users are protecting their devices with PINs and passwords than in previous years.(和前几年相比,越来越多的智能手机用户通过个人识别码和密码来保护个人手机。);第五段An increasing number of smartphone users have installed built-in remote lock-and-erase software.(越来越多的智能手机用户安装了内置远程锁定清除软件。);第六段Smartphone users are increasingly aware of the importance of anti-virus software.(智能手机用户越来越意识到杀毒软件的重要性。)
    【解析】本题问“如何体现出人们提高了保护手机的意识?”。根据文章第4,5,6段的内容(主题句),得出通过设置密码和安装软件的方式来保护手机,只有D选项是涵盖了这三个方面。

  • 第3题:

    Static VLANs are being used on the Company network. What is true about static VLANs?()

    • A、Devices use DHCP to request their VLAN.
    • B、Attached devices are unaware of any VLANs.
    • C、Devices are assigned to VLANs based on their MAC addresses.
    • D、Devices are in the same VLAN regardless of which port they attach to.

    正确答案:B

  • 第4题:

    Which three statements describe the configuration change management feature in DCNM LAN? ()

    • A、 Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.
    • B、 DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.
    • C、 You can archive a maximum of 50 configuration versions per managed device.
    • D、 Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.
    • E、 Device-running configuration will be archived only if it differs from the last archived version.

    正确答案:C,D,E

  • 第5题:

    Mr. Jones()in the company for twenty years by the end of next month

    • A、will work 
    • B、will have worked  
    • C、has worked   
    • D、would work

    正确答案:A

  • 第6题:

    A company may use the Windows XP Professional MUI Pack because the company:()

    • A、has offices where users who speak different languages share computers.
    • B、wants to maintain multiple operating systems.
    • C、has users who work remotely at home offices.
    • D、wants to deploy and maintain a single operating system standard.

    正确答案:A,D

  • 第7题:

    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()

    • A、You should consider changing the EWS virtual directory.
    • B、You should consider changing the Federation Trust.
    • C、You should consider changing the Organizational Relationship.
    • D、You should consider changing the default sharing policy.

    正确答案:D

  • 第8题:

    You are a systems engineer for your company. Your company has 20,000 users in a large campus environment located in Los Angeles. Each department in the company is located in its own building. Each department has its own IT staff, which is responsible for all network administration within the building.   The company’s network is divided into several IP subnets that are connected to one another by using dedicated routers. Each building on the company’s main campus contains at least one subnet, and possibly up to five subnets. Each building has at least one router. All routers use RIP version 2 (RIPv2) broadcasts.   The company acquires a new business unit located in Denver. The Denver office has 25 users. The network in the Denver office is connected to the network at the main campus by using a leased frame relay connection. The network administrator at the Denver office installs a Windows Server 2003 computer and configures Routing and Remote Access on this server. The network administrator at the Denver office configures this server as a router and implements RIPv2 in Routing and Remote Access.   Later, the Denver administrator reports that his router is not receiving routing table updates from the routers on the main campus network. He must manually add routing entries to the routing table to enable connectivity between the locations. You investigate and discover that the RIPv2 broadcasts are not being received at the Denver office. You also discover that no routing table announcements from the Denver office are being received on the main campus network.  You need to ensure that the network in the Denver office can communicate with the main campus network and can send and receive automatic routing table updates as network conditions change.   What should you do on the router in the Denver office?()

    • A、 Configure the router to use RIPv1 broadcasts.
    • B、 Configure the router to use auto-static update mode.
    • C、 Add the IP address ranges of the main campus network to the router’s Accept list and Announce list.
    • D、 Add the IP addresses of the main campus routers to the router’s Neighbors list.

    正确答案:D

  • 第9题:

    多选题
    Which three statements describe the configuration change management feature in DCNM LAN? ()
    A

    Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.

    B

    DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.

    C

    You can archive a maximum of 50 configuration versions per managed device.

    D

    Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.

    E

    Device-running configuration will be archived only if it differs from the last archived version.


    正确答案: C,D,E
    解析: 暂无解析

  • 第10题:

    多选题
    Which three statements describe user authentication in Cisco DCNM-LAN? ()
    A

    Cisco DCNM-LAN server users are local to the Cisco DCNM-LAN server. Creating, changing, and removing Cisco DCNM-LAN server users has no effect on user accounts on managed devices.

    B

    A Cisco DCNM-LAN server user that has Administrator privileges can push out changes to managed devices even if the Cisco NX-OS role that is used on the discovered device has the network operator role.

    C

    Cisco DCNM-LAN user roles restrict the ability of users to make changes to Cisco DCNM-LAN server settings. Cisco NX-OS user roles enforce read/write privileges on the discovered devices.

    D

    Cisco DCNM-LAN allows you to configure unique credentials for each discovered device or use default credentials when you do not configure unique credentials for a device.

    E

    Cisco DCNM-LAN can use AAA servers to authenticate users. Only TACACS servers are supported.


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    多选题
    Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()
    A

    MAC address

    B

    DNS server

    C

    DHCP server

    D

    resolve address

    E

    endpoint address


    正确答案: D,E
    解析: 暂无解析

  • 第12题:

    单选题
    You are an administrator of a large campus network. Every switch on a floor within each building of your campus has been configured for a different VLAN. During implementation of the Junos Pulse Access Control Service, you must configure a RADIUS return attribute policy to apply a role representing a group of authenticated users that frequently transport their laptops from building to building and floor to floor. In the admin GUI, which policy element would you enable to accommodate these users?()
    A

    Add Session-Timeout attribute with value equal to the session lifetime

    B

    Add Termination-Action attribute with value equal 1

    C

    VLAN

    D

    Open port


    正确答案: B
    解析: 暂无解析

  • 第13题:

    资料:As more personal business is conducted through smartphone devices , more users are implementing security measures for their devices, according to a recent survey by Harris Poll and commissioned by the CTIA.
    The survey was a part of the company’s ongoing efforts to boost user education on the pitfalls of mobile security and assess whether the CTIA’s initiatives are working.
    It turns out that mobile users in the US have begun implementing many of the initiatives set forth and have increased both awareness of, and protection for, their mobile devices:
    More smartphone users are protecting their devices with PINs and passwords than in previous years. In 2016, of smartphone users had some sort of PIN/password, up from 2015 and form 2012.
    An increasing number of smartphone users have installed built-in remote lock-and-erase software. Of survey respondents, have this type of lock-and-erase software installed, up an astounding from 2015 and from 2012.
    Smartphone users are increasingly aware of the importance of anti-virus software. of smartphone users have an anti-virus software installed, compared with only of smartphone owners in 2015, according to BI Intelligence.
    The survey results indicate that users are becoming increasingly aware of the danger posed by the increasing reliance on mobile technology form not only malicious entities like hackers, but also government surveillance. Specifically, users are increasingly seeking for ways to guard themselves in light of a number of recent high-profile incidents involving phone security–like Apple's case against the FBI, for example.
    Because of this, it will become increasingly common for app developers and device manufactures to build in security and end-to-end encryption. This can be seen in devices and apps such as WhatsApp and iPhones. Developers and device manufacturers that don't include this feature in their products could be faced with negative consumer attitudes.

    It can be inferred that WhatsApp and iPhones _____.

    A.had built in security and end-to-end encryption.
    B.included the CTIA feature in their products.
    C.were faced with negative consumer attitudes.
    D.cooperated with FBI to guarantee the securety.

    答案:B
    解析:
    本题考查的是细节推理。
    【关键词】inferred (推测);WhatsApp;iPhones
    【主题句】最后一段Because of this, it will become increasingly common for app developers and device manufactures to build in security and end-to-end encryption. This can be seen in devices and apps such as WhatsApp and iPhones. Developers and device manufacturers that don’t include this feature in their products could be faced with negative consumer attitudes. 因此,对于应用开发商和手机制造商来说,内置安全措施和端到端加密法变得越来越重要。WhatsApp和iPhones都有做到这一点。如果他们不这样做的话,可能会面临消费者的负面态度。
    【解析】本题问“根据WhatsApp和iPhones能推测出什么?”。A选项“内置安全措施和端到端加密法”,可以通过This can be seen in devices and apps such as WhatsApp and iPhones.得出,this指代的正是前文的“build in security and end-to-end encryption”。该选项虽然对,但不是推测的内容,所以不能选。B选项“在他们的产品中包含了CTIA的特点”。CTIA的特点是什么?根据文章三四段可以得出,就是手机安全措施(increased both awareness of, and protection for, their mobile devices),所以和WhatsApp,iPhones的特点一致,属于推测内容。C选项偷换概念,原文说如果没有安全措施才会遭到消费者的反对,但WhatsApp和iPhones都拥有该特点。D选项“与FBI合作确保安全”,杜撰原文为未出现的信息。

  • 第14题:

    ABC Company has 1500 managed devices and 15,000 end users on a campus network. LANManagement Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()

    • A、 1
    • B、 2
    • C、 3
    • D、 4

    正确答案:A

  • 第15题:

    ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Management Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()

    • A、1
    • B、2
    • C、3
    • D、4

    正确答案:A

  • 第16题:

    Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()

    • A、MPLS is enabled on the core, distribution, and edge devices.
    • B、A triple stack is enabled on PE devices.
    • C、The network has at least six PE devices.
    • D、A dual stack is enabled on all the P and PE devices in a network.

    正确答案:A,D

  • 第17题:

    Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()

    • A、Ashort
    • B、Open pairs
    • C、ESD
    • D、EMI

    正确答案:D

  • 第18题:

    You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization named Company.com.All Company.com users make use of their Personal Archive. A new Company.com directive states hat messages be moved from the mail box of users to their Personal Archive after 60 days.What should you do?()

    • A、You should consider running the New Managed Content Settings wizard and creating a new managed folder mailbox policy.Thereafter the policy should be applied to all users.
    • B、You should consider creating a managed custom folder.Then the New Managed Content Settings wizard should be run and a journal rule created.
    • C、You should consider having a retention tag created.Then the retention tag should be assigned to a retention policy.Thereafter the retention policy should be applied to all users.
    • D、You should consider having a retention tag created.Then the retention tag should be assigned to a retention policy. Thereafter a journal rule should be created.

    正确答案:C

  • 第19题:

    You are the network administrator for your company. The network consists of a single Active Directory domain.  The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP.   The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server.  You need to choose a secure authentication method.   What should you do? ()

    • A、 Use the authentication method of the default IPSec policies.
    • B、 Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.
    • C、 Create a custom IPSec policy and use certificate-based authentication.
    • D、 Create a custom IPSec policy and use preshared key authentication.
    • E、 Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.

    正确答案:C

  • 第20题:

    多选题
    Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()
    A

    MPLS is enabled on the core, distribution, and edge devices.

    B

    A triple stack is enabled on PE devices.

    C

    The network has at least six PE devices.

    D

    A dual stack is enabled on all the P and PE devices in a network.


    正确答案: D,B
    解析: 暂无解析

  • 第21题:

    单选题
    ABC Company has 1500 managed devices and 15,000 end users on a campus network. LANManagement Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()
    A

     1

    B

     2

    C

     3

    D

     4


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Management Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()
    A

    1

    B

    2

    C

    3

    D

    4


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()
    A

    BranchCache

    B

    DirectAccess

    C

    Distributed File System Replication (DFSR)

    D

    Universal Group Membership Caching


    正确答案: B
    解析: 暂无解析