单选题You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()AApply the new license to the passive node of the cluster.BConfigure an external load balancer to hold the V IP.CDisable the active node in the cluster.DRemove the IF-MAP server configuration.

单选题
You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()
A

Apply the new license to the passive node of the cluster.

B

Configure an external load balancer to hold the V IP.

C

Disable the active node in the cluster.

D

Remove the IF-MAP server configuration.


参考解析

解析: 暂无解析

相关考题:

You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A. The user will be instructed to call the network administrator.B. The user will fail authentication.C. The user will be prompted to install a new device certificate on the MAG Series device.D. The user will successfully authenticate and have full network access.

You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a MAG Series device.Which statement is true?() A. Multiple Infranet Enforcer instances are created with a single serial number of an SRX Series device defined in each configuration.B. A single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series devices defined in the configuration.C. Multiple Infranet Enforcer instances are created with a single IP address of an SRX Series device defined in each configuration.D. A single Infranet enforcer instance is created with the VIP of the clustered SRX Series device defined in the configuration.

You have a domain controller named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You start Server1 in Directory Services Restore Mode and attempt to log on by using the username administrator and a password of Pa$$w0rd. The logon attempt fails.You restart Server1 normally and successfully log on to the server by using the username administrator and a password of Pa$$w0rd.You need to ensure that you can log on to Server1 in Directory Services Restore Mode.What should you do? ()A. From ntdsutil.exe, run Set DSRM Password.B. From ntdsutil.exe, run Security account management.C. From Active Directory Users and Computers, select the Account is trusted for delegation option for the Administrator account.D. From Active Directory Users and Computers, select the Store password using reversible encryption option for the Administrator account.

You have been tasked with installing two SRX 5600 platforms in a high-availability cluster. Which requirement must be met for a successful installation?()A、You must enable SPC detect within the configuration.B、You must enable active-active failover for redundancy.C、You must ensure all SPCs use the same slot placement.D、You must configure auto-negotiation on the control ports of both devices

You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()A、You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.B、No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.C、You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.D、You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()A、Apply the new license to the passive node of the cluster.B、Configure an external load balancer to hold the V IP.C、Disable the active node in the cluster.D、Remove the IF-MAP server configuration.

When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?()A、The cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.B、The cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.C、The cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.D、The cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.

Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()A、Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.B、Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.C、On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.D、On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.

Your network consists of a single Active Directory domain. You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent users from establishing multiple Remote Desktop connections to the server. What should you do? ()A、Install and configure Terminal Server Licensing.B、From Terminal Services Manager, modify the user sessions.C、From Terminal Services Configuration, modify the server settings.D、From Active Directory Users and Computers, modify the Sessions settings for each user account.

You have a domain controller named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You start Server1 in Directory Services Restore Mode and attempt to log on by using the username administrator and a password of Pa$$w0rd. The logon attempt fails.You restart Server1 normally and successfully log on to the server by using the username administrator and a password of Pa$$w0rd.You need to ensure that you can log on to Server1 in Directory Services Restore Mode.What should you do? ()A、From ntdsutil.exe, run Set DSRM Password.B、From ntdsutil.exe, run Security account management.C、From Active Directory Users and Computers, select the Account is trusted for delegation option for the Administrator account.D、From Active Directory Users and Computers, select the Store password using reversible encryption option for the Administrator account.

Your network consists of a single Active Directory domain. You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent users from establishing multiple Remote Desktop connections to the server. What should you do?()A、Install and configure Terminal Server Licensing.B、From Terminal Services Manager, modify the user sessions.C、From Terminal Services Configuration, modify the server settings.D、From Active Directory Users and Computers, modify the Sessions settings for each user account.

Your network contains a server named Server1. The Active Directory Rights Management  Services (AD RMS) server role is installed on Server1.   An administrator changes the password of the user account that is used by AD RMS.     You need to update AD RMS to use the new password.     Which console should you use()A、Active Directory Rights Management ServicesB、Active Directory Users and ComputersC、Component ServicesD、Services

Certkiller.com has a server with Active Directory Rights Management Services (AD RMS) server installed. Users have computers with Windows Vista installed on them with an Active Directory domain installed at Windows Server 2003 functional level. As an administrator at Certkiller.com, you discover that the users are unable to benefit from AD RMS to protect their documents. You need to configure AD RMS to enable users to use it and protect their documents. What should you do to achieve this functionality()A、Configure an email account in Active Directory Domain Services (AD DS) for each user.B、Add and configure ADRMSADMIN account in local administrators group on the user computersC、Add and configure the ADRMSSRVC account in AD RMS server’s local administrator groupD、Reinstall the Active Directory domain on user computersE、All of the above

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover.  What should you do? () A、The contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS) B、You should restore a backup to the active node C、You should get rid of the shared array from the active node D、From the active node, you have to uplug the network cable(s)

单选题Certkiller.com has a server with Active Directory Rights Management Services (AD RMS) server installed. Users have computers with Windows Vista installed on them with an Active Directory domain installed at Windows Server 2003 functional level. As an administrator at Certkiller.com, you discover that the users are unable to benefit from AD RMS to protect their documents. You need to configure AD RMS to enable users to use it and protect their documents. What should you do to achieve this functionality()AConfigure an email account in Active Directory Domain Services (AD DS) for each user.BAdd and configure ADRMSADMIN account in local administrators group on the user computersCAdd and configure the ADRMSSRVC account in AD RMS server’s local administrator groupDReinstall the Active Directory domain on user computersEAll of the above

单选题You have been tasked with installing two SRX 5600 platforms in a high-availability cluster. Which requirement must be met for a successful installation?()AYou must enable SPC detect within the configuration.BYou must enable active-active failover for redundancy.CYou must ensure all SPCs use the same slot placement.DYou must configure auto-negotiation on the control ports of both devices

单选题You have a domain controller named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You start Server1 in Directory Services Restore Mode and attempt to log on by using the username administrator and a password of Pa$$w0rd. The logon attempt fails.You restart Server1 normally and successfully log on to the server by using the username administrator and a password of Pa$$w0rd.You need to ensure that you can log on to Server1 in Directory Services Restore Mode.What should you do? ()AFrom ntdsutil.exe, run Set DSRM Password.BFrom ntdsutil.exe, run Security account management.CFrom Active Directory Users and Computers, select the Account is trusted for delegation option for the Administrator account.DFrom Active Directory Users and Computers, select the Store password using reversible encryption option for the Administrator account.

单选题You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()AYou must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.BNo security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.CYou must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.DYou must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

单选题When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?()AThe cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.BThe cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.CThe cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.DThe cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.

单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()AThe user will be instructed to call the network administrator.BThe user will fail authentication.CThe user will be prompted to install a new device certificate on the MAG Series device.DThe user will successfully authenticate and have full network access.

单选题Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()APerform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.BPerform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.COn the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.DOn the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.

单选题You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notifcation when a user stores more than 500MB of data int he shared folder. You must allow users to store more than 500MB of data in the shared folder.  What should you do()?ACreate a soft quotaBCreate a hard quotaCcreate an active screening file screenDcreate a passive screening file screen

多选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover.  What should you do? ()AThe contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS)BYou should restore a backup to the active nodeCYou should get rid of the shared array from the active nodeDFrom the active node, you have to uplug the network cable(s)

单选题You have a domain controller named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You start Server1 in Directory Services Restore Mode and attempt to log on by using the username administrator and a password of Pa$$w0rd. The logon attempt fails. You restart Server1 normally and successfully log on to the server by using the username administrator and a password of Pa$$word. You need to ensure that you can log on to Server1 in Directory Services Restore Mode. What should you do? ()AFrom ntdsutil.exe, run Set DSRM Password.BFrom ntdsutil.exe, run Security account management.CFrom Active Directory Users and Computers, select the Account is trusted for delegation option for the Administrator account.DFrom Active Directory Users and Computers, select the Store password using reversible encryption option for the Administrator account.

单选题Your network consists of a single Active Directory domain. You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent users from establishing multiple Remote Desktop connections to the server. What should you do? ()AInstall and configure Terminal Server Licensing.BFrom Terminal Services Manager, modify the user sessions.CFrom Terminal Services Configuration, modify the server settings.DFrom Active Directory Users and Computers, modify the Sessions settings for each user account.

单选题Your network consists of a single Active Directory domain. You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent users from establishing multiple Remote Desktop connections to the server. What should you do?()AInstall and configure Terminal Server Licensing.BFrom Terminal Services Manager, modify the user sessions.CFrom Terminal Services Configuration, modify the server settings.DFrom Active Directory Users and Computers, modify the Sessions settings for each user account.

单选题You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()AApply the new license to the passive node of the cluster.BConfigure an external load balancer to hold the V IP.CDisable the active node in the cluster.DRemove the IF-MAP server configuration.

单选题You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a MAG Series device.Which statement is true?()AMultiple Infranet Enforcer instances are created with a single serial number of an SRX Series device defined in each configuration.BA single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series devices defined in the configuration.CMultiple Infranet Enforcer instances are created with a single IP address of an SRX Series device defined in each configuration.DA single Infranet enforcer instance is created with the VIP of the clustered SRX Series device defined in the configuration.