Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2008.All client computers run Windows Vista. All computers are members of the Active Directory domain. You assign the Secure Server (Require Security) IPsec policy to Server1 by using a Group Policy object(GPO). Users report that they fail to connect to Server1.You need to ensure that users can connect to Server1. All connections to Server1 must be encrypted. What should you do? ()
第1题:
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
第2题:
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
第3题:
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()
第4题:
You are the network administrator for ExamSheet.net. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()
第5题:
A router that performs Network Address Translation (NAT) is installed between your computer and the Internet. The router fails. You connect the computer directly to the Internet. You need to ensure that the computer is connected to the Internet in the most secure manner possible. What should you do?()
第6题:
Disable the Connect even if the network is not broadcasting option.
In the Network and Sharing Center window, click the Diagnose and repair option.
Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.
第7题:
STP
GVRP
SNMP
VTP
DHCP
第8题:
Use the Diagnose and repair feature in the Network and Sharing Center.
At the command prompt, type ipconfig /allcompartments.
Disable the NetBIOS feature on your network adapter.
Configure the correct default gateway on the Alternate Configuration tab of your network connection properties dialog box.
第9题:
establish a communication channel from the CES, via the International Telex Network to the final destination
set up a communication channel from your SES, via a satellite, to a CES within your ocean region
set up a channel directly to the addressee at the destination
establish a channel from your terminal , via the International Telex Network to a CES within your ocean region
第10题:
Start the Microsoft Windows Media Center Service Launcher service.
Enable the File and Printer Sharing Windows Firewall exception.
Connect your computer to the same subnet as the network projector.
Type the IP address of the network projector in the Connect to a Network Projector wizard.
第11题:
Right-click and click the Diagnose option in the Connect to a network window.
Set the security type value to No authentication in the wireless network properties dialog box.
Click the Manually connect to a wireless network option in the Set up a connection or network window.
In the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.
Configure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.
第12题:
Which two statements about common network attacks are true?()
第13题:
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()
第14题:
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()
第15题:
Your network administrator has assigned you an IP address of 192.168.0.20 with subnet mask of 255.255.255.0.Your network is running in pure Windows 2000 domain. What else should know in order to join your computer to the Windows 2000 domain. ()
第16题:
Your network consists of an Active Directory domain named contoso.com. You have a computer namedcomputer1.contoso.com. Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com. Which type of record should you request ?()
第17题:
Set the driver signing option to block.
Set the driver signing option to ignore.
In the computer’s BIOS, reserve an unused IRQ for ISA devices.
In the Device Manager, configure the second ISA network adapter to use an unused IRQ.
第18题:
Enable the highest level of Syslogging available to ensure you log all possible event messages
Use SSH to access your Syslog information
Log all messages to the system buffer so that they can be displayed when accessing the router
Syncronize clocks on the network with a protocol such as Network Time Protocol
第19题:
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
detailed security device specifications
results from pilot network testing
results from a network audit
第20题:
Broadcast domains consist of devices that connect to a common switch or hub.
Broadcast domains consist of a group of devices that can be reached by sending a frame addressed to the Layer 2 broadcast address.
Broadcast domains require a gateway device such as a router.
Broadcast domains consist of devices that reside on the same sub-network.
第21题:
core layer
bridging two VLANs on one switch
between two Layer 2 devices withtrunking
between two Layer 2 devices withouttrunking
第22题:
Configure the network category of your wireless network connection to Private.
Configure the network category of your wireless network connection to Public.
Configure the TCP/IP packet filtering on the wireless network connection.
Configure the wireless network connection with the appropriate authentication to the router.