PracticeQuiz content is free on an ad-supported model.
Unfortunately, we can't support ad blocker usage because of the impact on our servers. If you'd like to continue, please disable your ad blocker and reload page.
26.Jack wants to view events generated by Windows Management. He also wants to view the event date and time, class, point of origin, and description. Which of the following WIM tools should he use?
27.Chad is the administrator of a Windows Server 2008 computer named Globe1. Globe1 is an FTP server located in Globe's internal network. Administrators report an increased amount of FTP traffic to Globe1. Chad needs to configure Globe1 to achieve these goals: Identify the MAC address of a computer using FTP transfers from Globe1, find out the FTP commands executed, and ensure that operation of Globe1 isn’t disrupted. What should Chad do?
28.An employee is receiving an error message when she tries to open a Web page. The error states “Web page requested is not available.” You note that https:// appears in the address bar. You confirm that the site is up and running by accessing it from a computer outside your corporate network. Which of the following should you do to fix this problem?
29.You are an administrator of an Active Directory domain named xyz.com. You configure a server named Server 2 as xyz.com’s DHCP server. All client computers are configured as DHCP clients. Users report that they cannot connect to network resources. You investigate and discover that the client computers are not receiving their TCP/IP configurations from Server 2. What should you do to fix this issue?
30. All computers on your network use the 10.10.0.0/16 address scheme. Tom, your manager, instructs you to place the 15 servers into a separate subnet that uses the 192.168.10 public addressing scheme. You must plan for a maximum of 25 servers in the future and need to configure a new subnet mask.
The subnet mask must allow a sufficient number of IP addresses for the existing servers and future growth. However, you want to conserve addresses as much as possible. Which subnet mask should you use?