单项选择题
You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()
A.You should use /63.
B.You should use /64.
C.You should use /61.
D.You should use /62.
相关考题
-
单项选择题
Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2008 R2.DC1 hosts a primary zone for contoso.com. DC2 hosts a secondary zone for contosto.com.You need to ensure that DNS zone data is encrypted when the data replicates across the network. DC2 must provide authoritative responses to client computers.What should you do?()
A.Configure the contoso.com zone to use DNSSEC
B.Create a new delegation in the contoso.com zone
C.Modify the zone transfer settings of the contoso.com zone
D.Convert the contoso.com zone to an Active Directory-integrated zone -
单项选择题
Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()
A.Configure the wireless network to use WPA2, PEAP and MSCHAP v2.
B.Configure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.
C.Configure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.
D.Configure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords. -
单项选择题
You deploy a windows server 2008 VPN server behind a firewall. Remote uses connect to the VPN by using portable computers that run windows vista with the latest service pack. The firewall is configured to allows only secured web communications. You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall. What should you do?()
A.Create an IPsec tunnel.
B.Create an SSTP VPN connection.
C.Create a PPTP VPN connection.
D.Create a L2tp VPN connection.
