更多“On the Internet, users can share( )and communicate with each other. A.process B.tasks C.r ”相关问题
  • 第1题:

    OSI is a theoretical model that shows how any two different systems can communicate with each other. Router, as a networking device, operate at the ______ layer of the OSI model.

    A.transport

    B.application

    C.network

    D.physical


    正确答案:C

  • 第2题:

    ( )is the extension of internet connectivity into physical devices and everyday objects. Embedded with electronics, internet connectivity, and other forms of hardware (such as sensors), these devices can communicate and interact with others over the Internet, and they can be remotely monitored and controlled

    A.Cloud Computing
    B.Internet of Things
    C.BIock Chain
    D.Artificial Intelligence

    答案:B
    解析:
    物联网就是将互联网连接扩展到物理设备和日常事务中,这些设备嵌入电子设备,互联网连接设备和其他形式的硬件中(例如传感器),可以通过互联网与其他设备通信和交互,并且可以实现远程监控和控制。

  • 第3题:

    Which of the following is true about the following share access properties? ()

    • A、 +managers will be resolved as a Winbind group.  
    • B、 The timo and taki users can manipulate files regardless of the file system permissions.  
    • C、 +managers will be resolved as a Unix group.  
    • D、 +managers is a builtin default Samba group.  
    • E、 The "admin users" can be applied only to print shares.

    正确答案:B,C

  • 第4题:

    Your network contains multiple computers that run Windows XP Professional. Multiple users share the computers. You need to ensure that users can switch their keyboard layouts between multiple languages. What should you do?() 

    • A、Install the Multilingual User Interface (MUI) pack.
    • B、From Internet Explorer, modify the Language Preferences.
    • C、From the Keyboard settings, update the driver for the keyboard. 
    • D、From Regional and Language Options, modify the Text services and input languages settings.

    正确答案:D

  • 第5题:

    Which of the following describe private IP addresses?()

    • A、Addresses chosen by a company to communicate with the Internet.
    • B、Addresses that cannot be routed through the public Internet.
    • C、Addresses that can be routed through the public Internet.
    • D、A scheme to conserve public addresses.
    • E、Addresses licensed to enterprise or ISPs by an Internet registry organization.

    正确答案:B,D

  • 第6题:

    You have an Exchange Server 2010 organization that contains 1,500 mailboxes.The Average size of each mailbox is a 750 MB.All users run either Microsoft Office Outlook 2010 or Outlook Web App to access their e-mail.All users who run Outlook 2010 are configured to use Cached Exchange Mode.You need to configure a mailbox solution for the organization to meet the following requirements:  (1)Ensure that administrators can search and find any message  (2)Reduce the size of the offline store (OST) for each user  (3)Provide access to all e-mail messages by using either Outlook 2010 or Outlook Web App  What should you do?()

    • A、Create a Personal Archive for each user and then create a retention policy.Instruct users to compact the OST file.
    • B、Create a personal folder (PST) file for each user.Store all PST files on a network share. Instruct users to compact the OST file.
    • C、Create a second disabled user account and a second mailbox for each user.Configure Journal rules to journal all the messages for each user to the users second mailbox
    • D、Create a new disabled user account and a new mailbox named Journaling Mailbox. Configure journal rules to journal all the messages for each user to Journaling Mailbox.

    正确答案:A

  • 第7题:

    You are the administrator of a small server based network. While installing Windows 2000 Professional on your computer, you configure the network adapter card for each computer to use TCP/IP and assign static IP setting information. During installation the setup detects and installs the 10/100 MBPS UTP only network adepter card on computers 6 & 8 and 10 MBPS/UTP combination adapter card on the other 7 computers. You accept the default settings for the network adapter card and finish installing the network adapter card. All computers are connected to 10/100 switch that has category 5 UTP cabling. After installation you find that computer 6 and 8 can communicate with each other. You want all 9 computers on your network to be able to communicate with each other.   What should you do?()

    • A、Configure the 10/100 switch to transfer only at the 100 MBPS rate.
    • B、Configure 10/100 MBPS network adapter card to switch all the computers at 10 MBPS rate.
    • C、Change the combination network adapter card to use the BNC transceiver setting.
    • D、Change the combination network adapter card to use the UTP transceiver setting.

    正确答案:D

  • 第8题:

    You upgraded a computer to Windows 2000 Professional and kept the FAT32 file system. You want each of three employees who use this computer to have their own documents area that no one else can access. You create a shared folder for each of the three users. You give only the owner permission to use the folder. Later in the week you are informed that User1's folder was modified while User1 was on vacation. What is wrong with your security configuration? ()

    • A、Local computer policy must restrict the rights of the three users.
    • B、You gave each share the same name under the users’ Documents and Settings folders.
    • C、Shared folder security only works when accessing the folder over the network.
    • D、Domain authentication should be required at log on.

    正确答案:C

  • 第9题:

    单选题
    You have a computer that runs Windows XP Professional. Multiple users share the computer. Users work in either French or English. You need to ensure that users can change the language in which the system menus appear. What should you do first?()
    A

    From the Display Properties, modify the Desktop settings.

    B

    From Internet Explorer, modify the Language Preferences. 

    C

    From the Multilingual User Interface (MUI) pack installation CD, run muisetup.exe. 

    D

    From Regional and Language Options, modify the Location settings and the Input Languages settings. 


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner.  What should you modify?()
    A

    the Federation Trust

    B

    the EWS virtual directory

    C

    the default sharing policy

    D

    the Organizational Relationship


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    A technician who separated two departments using VLANs now discovers that the VLANs cannot communicate with each other. Which of the following does the technician need to enable communication between the VLANs?()
    A

    Port spanning

    B

    VLAN concentrator

    C

    Firewall

    D

    Router


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Jill, a technician, is tasked with installing BitLocker on all the machines in an office. Which of the following may the users experience?()
    A

    Frequent reboots

    B

    Delayed processor times

    C

    Disabled Internet connection

    D

    Denied access to share drives


    正确答案: B
    解析: 暂无解析

  • 第13题:

    ( )is the extension of internet connectivity into physical devices 3nd everyday objects.Embedded with electronicsjntemet connectivity and other forms of hardware(such as sensors),these devices can communicate and interact with others over the Internet,and they can be remotely monitored and controlled.

    A.Cloud Computing
    B.Internet of things
    C.Block Chain
    D.Artificial intelligence

    答案:B
    解析:
    物联网就是将互联网连接扩展到物理设备和日常事务中,这些设备嵌入电子设备,互联网连接设备和其他形式的硬件中(例如传感器),可以通过互联网与其他设备通信和交互,并且可以实现远程监控和控制。

  • 第14题:

    Which three statements about the secure domain router are true?()

    • A、The logical router can span across chassis.
    • B、The fabric and system controller module are shared by all logical routers.
    • C、Each logical router has a distinct fabric and system controller module
    • D、The logical router can share a route processor
    • E、The logical router cannot share a route processor

    正确答案:A,B,E

  • 第15题:

    A customer has multiple application servers which create one process for each connected user.  All users share the same AIX environment. What is a benefit of using WPARs in this environment?()

    • A、WPARs give more controls for resource management than the traditional AIX operating system tools.
    • B、WPARs support Live Application Mobility which can be used to balance user processes acrosssystems.
    • C、WPARs each have a copy of the AIX kernel, offering better availability than a system without WPARs.
    • D、WPARs provide the ability to apply fixes specific for each environment, enabling the customer to create specialized application servers.

    正确答案:B

  • 第16题:

    You share your computer with other users.  You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users.  What should you do?()

    • A、Uninstall the new Windows Internet Explorer add-on.
    • B、Log on as an administrator and disable the new Windows Internet Explorer add-on.
    • C、Direct other users to log on and disable the new Windows Internet Explorer add-on.
    • D、Select the Turn off Automatic Website Checking option for the Phishing filter.

    正确答案:C

  • 第17题:

    What is the purpose of assigning an IP address to a switch?()

    • A、Provides local hosts with a default gateway address
    • B、Allows remote management of the switch.
    • C、Allows the switch to respond to ARP requests between two hosts
    • D、Ensures that hosts on the same LAN can communicate with each other.

    正确答案:B

  • 第18题:

    Your network consists of a single Active Directory domain. All network servers run Windows Server 2003 Service Pack 2 (SP2). You create a folder named CorporateData. You share the folder as CorpData and assign the Change permission to the Domain Users group. In the CorporateData folder, you create a folder named HumanResources. On the HumanResources folder, you assign the Modify permission to a global group named HRUsers. You share the HumanResources folder as HRData. You confirm that all users in the domain can view the files in the HRData share. You need to ensure that only HRUsers and administrators can access files in the HRData share. The solution must maintain user access to the CorpData share. What should you do? ()

    • A、On the CorpData share, assign the Read permission to Domain Users.
    • B、On the CorpData share, remove Domain Users and assign the Change permission to HRUsers.
    • C、On the CorporateData folder, disable permission inheritance and remove the inherited permissions.
    • D、On the HumanResources folder, disable permission inheritance and remove the inherited permissions.

    正确答案:D

  • 第19题:

    our network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a shared folder named Share1. Share1 contains the home folder of each user. All users have the necessary permissions to access only their home folder. The users report that when they access Share1, they can see the home folders of all the users. You need to ensure that the users see only their home folder when they access Share1. What should you do from Server1?()

    • A、From Windows Explorer,modify the properties of the volume that contains Share1.
    • B、From Server Manager,modify the properties of the volume that contains Share1.
    • C、From Server Manager,modify the properties of Share1.
    • D、From Windows Explorer,modify the properties of Share1.

    正确答案:C

  • 第20题:

    You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner.  What should you modify?()

    • A、the Federation Trust
    • B、the EWS virtual directory
    • C、the default sharing policy
    • D、the Organizational Relationship

    正确答案:C

  • 第21题:

    单选题
    Your company has two offices. Each office is configured as a separate subnet. The network contains a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). Users report that they are unable to resolve host names on the Internet. You verify that users can access all servers on both subnets.You need to ensure that users can resolve names on the Internet. The solution must ensure that users can access resources on the internal network.  What should you configure?()
    A

    all client computers to use the IP address of a DNS server on the Internet as the primary DNS server

    B

    all client computers to use the IP address of a DNS server on the Internet as the secondary DNS server

    C

    the internal DNS servers to use a forwarder

    D

    the internal DNS servers to use round robin


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following network modifications should be implemented to extend the wirelessnetwork range and allow out-of-range users to share the Internet connection?()
    A

    Create a new VLAN for the out-of-range users.

    B

    Add a wireless access point for the out-of-range users.

    C

    Upgrade the out-of-range users’ SSID searching software.

    D

    Enable network sharing on the users’ computers that are within range.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    多选题
    Which of the following is true about the following share access properties? ()
    A

    +managers will be resolved as a Winbind group.

    B

    The timo and taki users can manipulate files regardless of the file system permissions.

    C

    +managers will be resolved as a Unix group.

    D

    +managers is a builtin default Samba group.

    E

    The admin users can be applied only to print shares.


    正确答案: B,C
    解析: 暂无解析