单选题You are using a dialup connection. You want to ensure that your password is encrypted. What protocols from the list below would you disable? ()APAPBSPAPCMSCHAPDMSCHAP V2

单选题
You are using a dialup connection. You want to ensure that your password is encrypted. What protocols from the list below would you disable? ()
A

PAP

B

SPAP

C

MSCHAP

D

MSCHAP V2


参考解析

解析: 暂无解析

相关考题:

Certkiller.com has given you the task of serializing an object and writing it to a data file using binary serialization.You need to ensure that you meet these requirements.What should you do?() A.B.C.D.

Every morning, you inspect your company‘s development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort.Which tool should you use?()A. FTPB. XCOPYC. the Publish Web toolD. the Copy Web tool

You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedt32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears.You want to return the computer to its previous configuration. What should you do?A.Restart the computer in Safe Mode. Then restart the computer again.B.Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command.C.Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command.D.Restart the computer by using the last known good configuration.

You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?() A.Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB.Execute the PURGE BINARY LOGE NOT USED commandC.Remove all of the binary log files that have a modification date earlier than todayD.Edit the .index file to remove the files you want to deleteE.Ensure that none of the attached slaves are using any of the binary logs you want to delete

You want to upgrade 150 computers from Windows NT Workstation 4.0 to Windows 2000 Professional.You create an Unattend.txt file by using Setup Manager. You copy the file to a floppy disk.You then start the installation on a test computer by using the Windows 2000 Professional CD-ROM.You insert the floppy disk after the computer starts.Although you had set the user interaction level to full unattended mode, you are prompted for all the required parameters. You want to ensure that the unattended installation does not prompt you for input.What should you do?A.Add a [Data] section to Unattend.txt, and set the Unattendedinstall parameter to Yes.B.Add an [Unattend] section to Unattend.txt, and set the OEMPreinstall parameter to yes.C.Rename Unattend.txt on the floppy disk to Winnt.sif.D.Create a \$Oem$\$1 folder on the hard disk of the test computer, and copy Unattend.txt to the folder.

You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()A.AB.BC.CD.D

You want to implement a high availability network using two Cisco routers. You also want to  ensure that the stat of the WAN interfaces can be tracked in doing so.  Which router redundancy  protocol cannot be configured for interface tracking? ()A、 GLBPB、 HSRPC、 RPRD、 VRRPE、 SLBF、 RPR+G、 None of the other alternatives apply

you want to view the status of a frame relay connection. How to display the status of a Frame-Relay PVC?

You want to check the EMP table in the user, Scott’s schema for block corruption. You also want to fix the corrupted blocks, if any. How will you accomplish the required task?()A、by using the ANALYZE utilityB、by using the DBVERIFY utilityC、by using the DB_BLOCK_CHECKING parameterD、by using the DBMS_REPAIR package

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table

You are using the DBVERIFY utility to check the datafiles for any block corruption. You want to write the output of the dbv command to a file not to the screen.  Which parameter of the DBVERIFY utility will you use?()A、 FILEB、 PARFILEC、 LOGFILED、 FEEDBACK

You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()A、Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB、Execute the PURGE BINARY LOGE NOT USED commandC、Remove all of the binary log files that have a modification date earlier than todayD、Edit the .index file to remove the files you want to deleteE、Ensure that none of the attached slaves are using any of the binary logs you want to delete

You want to drop the TBS1 tablespace from your database.  You also want to delete the corresponding data files automatically, and not have to do it manually.  What should you do?()A、Use the DROP DATAFILE command.B、Use the DROP TABLESPACE command.C、Ensure that all database files are Oracle Managed Files before using the DROP TABLESPACE command.D、Ensure that the DB_FILE_CREATE_DEST initialization parameter is set before using the DROP TABLESPACE command.

You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()A、You should consider using the healthMonitoring enabled="true"/ configuration.B、You should consider using the deployment retail="true"/ configuration.C、You should consider using the customErrors mode="On"/ configuration.D、You should consider using the trace enabled="true"/ configuration.

You want to configure your Windows 2000 Professional portable computer to use offline files. The files that you want to access offline include a large project file and some smaller personal files. Your portable computer is configured to connect to the network by using the dial up connection at scheduled times during day to automatically download your e-mail messages. You do not want to synchronize the project file when you connect to the network using the dial-up connection. What you should do?()A、Configure the Synchronization Settings to perform a quick synchronization. B、Configure the Synchronization Settings to ask you before synchronizing items. C、Configure the Synchronization Settings to synchronize the project file only when using the LAN connection. Set synchronization for the personal files for both the LAN connection and your dial-up connection. D、Set the synchronization settings to synchronize the project file only when you log off the network. Set synchronization for the personnel files for both the LAN and dialup connection for logging on and logging off.

You are the administrator of your company’s network. The software department is preparing to rewrite an accounting application so that it will run on Windows 2000 Professional computers. All of the computers in the software department currently use Windows 98.  You want to configure the computers in the software department so that the users can use both Windows 98 and Windows 2000 Professional during the project. You also want to ensure that the computers are configured for optimal disk performance. In addition you want to ensure that users in the software department can access all of the files on their computers by using either operating system.  What should you do? ()A、 Create and format a FAT 32 partition.B、 Create and format an NTFS volume.C、 Configure Windows 2000 Professional to enable disk compression.D、 Configure Windows 2000 Professional to enable dynamic volume

You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A、Use Windows Explorer to receive the offline filesB、Using the Windows Explorer, disable the cache for the reports on the network shareC、Use the Windows NT explorer to grant the special access for the reports on the network  shareD、Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection.

单选题You are the administrator of Red Lington Enterprises. You want to upgrade 125 computers from Windows NT Workstation 4.0 to Windows 2000 Professional. You create an unattend.txt file by using the setup manager.  You copy the file to a floppy disk. You then start the installation on a computer in the test lab using the Windows 2000 Professional CD-ROM.  After the computer starts you insert the floppy disk. Even though you set the user interaction level to full-unattended mode you are prompted for all the configuration parameters. You want to ensure that the unattended installation does not prompt you for input.  What should you do? ()AAdd a [data] section to unattend.txt, and set the unattended install Parameter to YES.BAdd an [Unattended] section to unattend.txt, and set the OemPreinstall parameter to Yes.CRename unattend.txt on the floppy disk to winnt.sifDCreate a /$oem$/$1 folder on the hard disk of the test computer, and copy unattend.txt to thefolder.

单选题Every morning, you inspect your company's development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort. Which tool should you use?()AFTPBXCOPYCthe Publish Web toolDthe Copy Web tool

单选题A policy-based IPsec VPN is ideal for which scenario?()Awhen you want to conserve tunnel resourcesBwhen the remote peer is a dialup or remote access clientCwhen you want to configure a tunnel policy with an action of denyDwhen a dynamic routing protocol such as OSPF must be sent across the VPN

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You enable and configure Terminal Server on a server named Server1. A firewall separates Server1 from the internal network. Internal users report that they cannot connect to Server1 by using Remote Desktop Connection. You need to ensure that the users can connect to Server1 by using Remote Desktop Connection. Which port should you open on the firewall? ()A389B3268C3389D5900

单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()Aby using triggersBby using external tablesCby using anonymous PL/SQL blocksDby auditing all DML operations on the table

单选题You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )AFrom System in Control Panel, select the Change Type option, and then select the Roaming profile option. BFrom Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. CUse the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. DConnect the portable computer to the network, and configure the user accounts for a roaming user profile.

单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network  shareDUse the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection.

单选题You want to check the EMP table in the user, Scott’s schema for block corruption. You also want to fix the corrupted blocks, if any. How will you accomplish the required task?()Aby using the ANALYZE utilityBby using the DBVERIFY utilityCby using the DB_BLOCK_CHECKING parameterDby using the DBMS_REPAIR package

单选题You want to implement a high availability network using two Cisco routers. You also want to  ensure that the stat of the WAN interfaces can be tracked in doing so.  Which router redundancy  protocol cannot be configured for interface tracking? ()A GLBPB HSRPC RPRD VRRPE SLBF RPR+G None of the other alternatives apply

问答题you want to view the status of a frame relay connection. How to display the status of a Frame-Relay PVC?