多选题All secure domain routers (SDRs) have shared attributes and resources. Which three resources areshared among all SDRs? ()ASNMP trapsBfabric cardsCexec-level configurationDprivilege-level configurationEadmin-level configuration

多选题
All secure domain routers (SDRs) have shared attributes and resources. Which three resources areshared among all SDRs? ()
A

SNMP traps

B

fabric cards

C

exec-level configuration

D

privilege-level configuration

E

admin-level configuration


参考解析

解析: 暂无解析

相关考题:

Nothing can _____________ the friendship we have shared all these years. A.be equal toB.be as equal asC.equal toD.equal

Which routers must be configured with the same authentication string when configuring OSPFauthentication?() A. all routers on a linkB. all routers in an areaC. all external OSPF peersD. all routers in an OSPF domain

if all OSPF routers on a broadcast network have the same OSPF priority, which parameter is used to determine the new BDR at the time of a DR failure?() A.AB.BC.CD.D

A network includes a RIPv2 domain, an EIGRP domain, and an OSPF domain. Each pair of routing domains has multiple routers redistributing routes between the p air of domains. The design requires that the redistribution configuration avoid matching based on prefix/length because of the trouble in maintaining such configurations.Which one of the following tools can be used in all three routing domains to attem pt to prevent domain loops?()A. Setting route tagsB. Setting the default administrative distance differently for internal and external routesC. Setting administrative distance differently per routeD. Setting metrics much higher for all ext ernal routes than for all internal routes

What are two important guidelines to follow when implementing VTP?()A、 CDPmust be enabled on all switches in theVTP management domain.B、 All switches in the VTPdomain must run the same version of VTP.C、 When using secure mode VTP, only configure management domain passwords onVTP servers.D、 EnablingVTP pruning on a server willenable the feature for the entire management domain.E、 Use of theVTPmulti-domain feature should be restricted to migration and temporary implementation.

When verifying the OSPF link state database, which type of LSAs should you expect to see within the different OS PF area types?()A、All OSPF routers in stubby areas can have type 3 LSAs in their database.B、All OSPF routers in stubby areas can have type 7 LSAs in their database.C、All OSPF routers in totally stubby areas can have type 3 LSAs in their database.D、All OSPF routers in totally stubby areas can have type 7 LSAs in their database.E、All OSPF routers in NSSA areas can have type 3 LSAs in their database.F、All OSPF routers in NSSA areas can have type 7 LSAs in their database.

All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()A、privilege-level configurationB、fabric cardsC、SNMP trapsD、admin- level configurationE、exec- level configuration

Which three statements about the secure domain router are true?()A、The logical router can span across chassis.B、The fabric and system controller module are shared by all logical routers.C、Each logical router has a distinct fabric and system controller moduleD、The logical router can share a route processorE、The logical router cannot share a route processor

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()A、Disable post scanB、Use SSH or SSLC、Enable trust levelsD、Deny echo replies on all edge routers

All secure domain routers (SDRs) have shared attributes and resources. Which three resources areshared among all SDRs? ()A、SNMP trapsB、fabric cardsC、exec-level configurationD、privilege-level configurationE、admin-level configuration

Which routers must be configured with the same authentication string when configuring OSPFauthentication?()A、all routers on a linkB、all routers in an areaC、all external OSPF peersD、all routers in an OSPF domain

Which routers must be configured with the same authentication string when configuring OSPF authentication?()A、all routers on a linkB、all routers in an areaC、all external OSPF peersD、all routers in an OSPF domain

You have an Exchange Server 2010 organization and an Active Directory Rights Management Services(AD RMS) server.  All users access their mailboxes by using Outlook Web App (OWA).  You need to plan a security solution for the organization to meet the following requirements:.Secure messages by using administrator-defined templates  .Ensure that e-mail messages sent by users can be stored in an encrypted format  What should you include in the plan?()A、a legal holdB、Domain SecurityC、Outlook Protection RulesD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

You have a single Active Directory directory service domain. All client computers run either Windows Vista or Windows XP. You create and configure a Group Policy object (GPO) named Secure Client  Computer. You need to ensure that the Secure Client Computer GPO is automatically applied to current  and future Windows XP client computers.  What should you do?()A、 Create a WMI filter that limits the scope of the Secure Client Computer GPO to the Windows XP operating system. Link the WMI filter to the GPO. Link the GPO to the domain.B、 Create a global security group that contains all of the Windows XP client computers. Edit the permissions of the Secure Client Computer GPO to allow the global security group the Read and Apply Group Policy permissions. Link the Secure Client Computer GPO to the domain.C、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Planning) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.D、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Logging) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.

Your network consists of a single Active Directory domain. All network servers run Windows Server2003 Service Pack 2 (SP2).Your organization has a storage area network (SAN). All shared folders on file servers are stored on theSAN.The Change permission for all shared folders is assigned to Domain Users. Different NTFS permissionsare also applied to the shared folders.You perform a daily full backup of all the files stored in the shared folders.A file server fails and requires several hours to repair.You need to provide users access to the shared folders that were on the failed file server as quickly aspossible. Existing permissions must be retained for all files.What should you do? ()A、Attach an existing file server to the SAN storage locations. Configure the shared folders on the server.B、Attach an existing file server to the SAN storage locations. Configure NTFS permissions for the folders.C、On an existing file server, restore the data from the tape backup. Configure NTFS permissions for the folders.D、On an existing file server, restore the data from the tape backup. Configure the shared folders on the server.

You are the network administrator for Testking.com. The network consists of a single Active Directory forest that contains three domains. The functional level of the forest is Windows Server 2003. The domain names are testking.com, europe.testking.com, and asia.testking.com. Each domain contains 500 user accounts. TestKing.com is in the process of acquiring several other companies whose networks will be add to the testking.com Windows Server 2003 domain. These acquisitions will entail the addition of several new offices, which will be connected to TestKing's network by means of dedicated 56-Kbps WAN connections. You create a new shared folder named NewProjects on a file server in testking.com. Several users in each existing domain need access to the NewProjects folder. These users are not in the same group in any domain. All users who need access to the NewProjects folder must be able to add, delete, and modify files and folders in the NewProjects folder. Users in the acquired companies also will require access to this folder. You need to create the required Active Directory groups and configure the required permissions for the NewProjects folder. Your solution must minimize ongoing administrative effort as you add new companies to the network. You must also minimize unnecessary traffic across the WAN connections. What should you do?()A、Create a single universal security group. Add all users that require access to the folder to the group. Create a domain local group in the testking.com domain. Add the universal group to the domain local group. Assign permissions to the shared folder by using the domain local group.B、Create a global security group in each domain. Add all users that require access to the folder to the global group in their domain. Create a domain local group in testking.com domain. Add the global groups to the domain local group. Assign permissions to the shared folder by using the domain local group.C、Create a universal security group in each domain. Add all users that require access to the folder to the group in their domain. Assign permissions to the shared folder by using the universal groups.D、Create a global security group in each domain. Add all users that require access to the folder to the group in their domain. Assign permissions to the shared folder by using the global groups.

You are designing the DNS topology to meet the business and technical requirements.   Which DNS structure should you use?()A、 one primary zoneB、 two primary zonesC、 one Active Directory-integrated zone that has the replication scope set to all DNS servers in the forest.D、 two Active Directory-integrated zones that have the replication scopes set to all DNS servers in the forest.E、 one Active Directory-integrated zone that has the replication scope set to all domain controllers in the domain.F、 two Active Directory-integrated zones that have the replication scopes set to all domain controllers in the domain.

Your network contains a Windows Server 2008 R2 server that functions as a file server. All users have laptop computers that run Windows 7.   The network is not connected to the Internet. Users save files to a shared folder on the server. You need to design a data provisioning solution that meets the following requirements:   èUsers who are not connected to the corporate network must be able to access the files and the folders in the corporate network.    èUnauthorized users must not have access to the cached files and folders. What should you do?()A、Implement a certification authority (CA). Configure IPsec domain isolation.B、Implement a certification authority (CA). Configure Encrypting File System (EFS) for the drive that hosts the files.C、Implement Microsoft SharePoint Foundation 2010. Enable Secure Socket Layer (SSL) encryption.D、Configure caching on the shared folder. Configure offline files to use encryption.

When configuring Shared Ethernet Adapter (SEA) failover between two VIO servers,  which of the following attributes must have a different value on both VIO servers?()A、 HA ModeB、 Trunk priorityC、 Control ChannelD、 Default VLAN ID

多选题All secure domain routers (SDRs) have shared attributes and resources. Which three resources areshared among all SDRs? ()ASNMP trapsBfabric cardsCexec-level configurationDprivilege-level configurationEadmin-level configuration

单选题A network includes a RIPv2 domain, an EIGRP domain, and an OSPF domain. Each pair of routing domains has multiple routers redistributing routes between the p air of domains. The design requires that the redistribution configuration avoid matching based on prefix/length because of the trouble in maintaining such configurations. Which one of the following tools can be used in all three routing domains to attem pt to prevent domain loops?()ASetting route tagsBSetting the default administrative distance differently for internal and external routesCSetting administrative distance differently per routeDSetting metrics much higher for all ext ernal routes than for all internal routes

多选题Which three statements about the secure domain router are true?()AThe logical router can span across chassis.BThe fabric and system controller module are shared by all logical routers.CEach logical router has a distinct fabric and system controller moduleDThe logical router can share a route processorEThe logical router cannot share a route processor

单选题You are the network administrator for The network consists of a sing Active Directory domain named All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers. You need to ensure that all users are authenticated by a domain controller whenthey log on. How should you modify the local security policy?()ARequire authentication by a domain controller to unlock the client computer.BCache zero interactive logons.CCache 50 interactive logons.DGrant the Log on locally user right to the Users group.

单选题You are designing the DNS topology to meet the business and technical requirements.  Which DNS structure should you use?()Aone primary zoneBtwo primary zones  Cone Active Directory-integrated zone that has the replication scope set to all DNS servers in the forest.Dtwo Active Directory-integrated zones that have the replication scopes set to all DNS servers in the forest.Eone Active Directory-integrated zone that has the replication scope set to all domain controllers in the domain.Ftwo Active Directory-integrated zones that have the replication scopes set to all domain controllers in the domain.

单选题You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Testking32 contains a folder that is shared as ManagerData$. A global group named AllManagers has permission to access the shared folder. A user reports that he needs access to the ManagerData$ shared folder. You add his user account to the All Managers global group. When the user attempts to connect to the shared folder by typing //Testking32/ManagerData$/ , he receives the following error message: "//Testking32/ManagerData$/ is not accessible. You might not have permissions to use the network resource. Contact the administrator of this server to find out if you have access permissions. Access is denied. You need to ensure that the user can access the ManagerData$ shared folder on Testking32. What should you do?()AInstruct the user to type //Testking32/ManagerData/ when he attempts to access the folder.BAdd the Anonymous Logon group to the ACL for the ManagerData$ shared folder.CSelect the Replace permission entries on all child object with entries shown here that apply to child objects check box.DInstruct the user to log off and log on again before he accesses the folder.

多选题You are the systems engineer for your company. The network consists of three physical networks connected by hardware-based routers. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.   Each physical network contains at least one domain controller and at least one DNS server. One physical network contains a Microsoft Internet Security and Acceleration (ISA) Server array that provides Internet access for the entire company. The network also contains a certificate server.   Company management wants to ensure that all data is encrypted on the network and that all computers transmitting data on the network are authenticated.   You decide to implement IPSec on all computers on the network. You edit the Default Domain Policy Group Policy object (GPO) to apply the Secure Server (Require Security) IPSec policy.   Users immediately report that they cannot access resources located in remote networks. You investigate and discover that all packets are being dropped by the routers. You also discover that Active Directory replication is not functioning between domain controllers in different networks.   You need to revise your design and implementation to allow computers to communicate across the entire network. You also need to ensure that the authentication keys are stored encrypted.   Which two actions should you take?()AConfigure the routers to use IPSec and a preshared key for authentication.BConfigure the routers to use IPSec and a certificate for authentication.CConfigure the routers to use IPSec and Kerberos for authenticationDReconfigure the GPOs to require a preshared key for IPSec authentication.EReconfigure the GPOs to require a certificate for IPSec authentication.

多选题All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()Aprivilege-level configurationBfabric cardsCSNMP trapsDadmin- level configurationEexec- level configuration

单选题When configuring Shared Ethernet Adapter (SEA) failover between two VIO servers,  which of the following attributes must have a different value on both VIO servers?()A HA ModeB Trunk priorityC Control ChannelD Default VLAN ID