A. reflexive
B. extended
C. standard
D. dynamic
第1题:
A network engineer wants to allow a temporary entry for a remote user with a specific usename andpassword so that the user can access the entire network over the internet.which ACL can be used?()
第2题:
Your company consists of a single Active Directory domain that is configured in Windows 2000 native mode. All servers run Windows Server 2003 Service Pack 2 (SP2). You deploy a Routing and Remote Access server to provide VPN access to the network.You need to ensure that only members of a group named Sales can access the network through the VPN. The solution must minimize the administrative effort required to manage remote access. What should you do?()
第3题:
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()
第4题:
You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()
第5题:
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
第6题:
The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()
第7题:
The switch name must match the workgroup name of the local network.
The switch must be configured with an IP address and default gateway.
The remote workstations must have access to the management VLAN of the switch.
CDP must be enabled on the switch so that it can be located by other devices on the network.
第8题:
Remotely connect to the user's laptop and review the network configuration settings
Ping the web server from inside the network to ensure it is still up and running.
Check to make sure the company's website is accessible from the Internet.
Ensure the Ethernet cable is securely plugged into the user's laptop
第9题:
Allow dial-in access for the user accounts of all Sales group members.
Deny dial-in access for the user accounts of all users except the Sales group members.
Create a remote access policy and assign the Allow - Remote Access permission. Add the Windows-Groups condition and specify the Sales group.
Create a remote access policy and assign the Deny - Remote Access permission. Add the Windows-Groups condition and specify all Active Directory groups except for Sales.
第10题:
No account. They can use the built-in guest account.
No Account. They can use the built-in Administrator account.
Local user account
Domain user account
第11题:
Configure roles based on departments and assign access based on source IP address.
Configure roles based on the user's manager and assign access based on the user's MAC address
Configure roles based on group memberships and assign a specific VLAN to the role.
Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.
第12题:
It can be used to allow the access privilege settings for users but not roles.
It can be used to allow the access privilege settings for users as well as roles.
It can be used to control the time interval for which the access privilege is available to a user.
It can be used to selectively restrict the access for each user in a database to different host computers.
It can be used to selectively restrict a user's access to different applications in a specific host computer.
第13题:
Which of the following is NOT a security feature relating to user accounts?()
第14题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
第15题:
Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()
第16题:
What is the primary purpose of creating a Location Group Policy? ()
第17题:
Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()
第18题:
to associate more than one realm with an authentication server
to logically group network access devices and associate them with specific sign-in policies
to allow or prevent users from accessing resources in specific locations on the network
to define the URL that users of network access devices can use to access the Infranet Controller
第19题:
Edit the /etc/hosts file and add an alias to the correct entry
Set up an alias in his .kshrc file to alias the hostname to the fully qualified hostname
Add an alias to /etc/aliases
Add mars.net to the search path of the resolv.conf file
第20题:
Some commands can be password protected requiring logged in customers to re-enter their password.
A user account can be disabled automatically, after a specified number of invalid login attempts.
An account can have multiple valid passwords at the same time, any of which can be used to access the account.
The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.
Logged in customers can be logged off of the system after a specified period of inactivity.
第21题:
the Netsh tool
the Network Policy Server console
the Registry Editor
the Routing and Remote Access console
第22题:
BPDU
Port security
RSTP
STP
VTP
Blocking mode
第23题:
VPN tunnel authentication is part of the IKE specification.
VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization.
802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.