Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?()A、Edge traversalB、Authorized computersC、Interface typesD、Remote IP address

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?()

  • A、Edge traversal
  • B、Authorized computers
  • C、Interface types
  • D、Remote IP address

相关考题:

Which of the following would contain information regarding network device alerts using SNMP?() A. SyslogB. Audit logC. History logD. Ping sweep reports

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E

You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

To provide quality of service (QoS) for voice traffic in an IEEE 802.1 q network, which class of service (CoS) value should be used in the 3-bit, user priority bits (PRI) field? ()A、The PRI field should contain the Cos value of 010B、The PRI field should contain the Cos value of 011C、The PRI field should contain the Cos value of 100D、The PRI field should contain the Cos value of 101E、The PRI field should contain the Cos value of 110F、The PRI field should contain the CoS value of 111

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、 core layerB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunking

Your network contains an Exchange Server 2010 server.You need to prevent e-mail messages that contain specific words from being sent between users in the organization. What should you do?()A、Create a transport rule.B、Create an Outlook Protection Rule.C、Configure the content filtering feature.D、Configure the sender reputation feature.

You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.

You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.

A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.  The router fails. You connect the computer directly to the Internet.  You need to ensure that the computer is connected to the Internet in the most secure manner possible.  What should you do?()A、Enable the Remote Desktop feature in the System Properties dialog box.B、Configure the network category of your network connection to Public.C、Configure the network category of your network connection to Private.D、Enable the Windows Collaboration Computer Name Registration Service exception in Microsoft Windows Firewall.

单选题You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()ADisable the Connect even if the network is not broadcasting option.BIn the Network and Sharing Center window, click the Diagnose and repair option.CSet the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.DSet the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

单选题Your network contain 10 domain controller that run Windows Server    R2.   The network contain a member server that is configured to collect all of events that occur on the  domain controllers.   Your need to ensure that administrators are notified when a specific event occurs on any of the  domain controllers. You want to achive the goal by using the minimum amount effort.   What should you do()AFrom Event Viewer on the member server, create a subscription.BFrom Event Viewer on each domain controller, create a subscription.CFrom Event Viewer on the member server, run the Create Basic Task Wizard.DFrom Event Viewer on each domain controller,run the Create Basic Task Wizard.

单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()ASet the driver signing option to block.BSet the driver signing option to ignore.CIn the computer’s BIOS, reserve an unused IRQ for ISA devices.DIn the Device Manager, configure the second ISA network adapter to use an unused IRQ.

单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP

单选题According to the “Vessel Bridge-to-Bridge Radiotelephone Act”,your radiotelephone log must contain().Aa record of all routine callsBa record of your transmissions onlyCthe home address of the vessel's Master or ownerDa summary of all distress calls and messages

单选题As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()AEnable the highest level of Syslogging available to ensure you log all possible event messagesBUse SSH to access your Syslog informationCLog all messages to the system buffer so that they can be displayed when accessing the routerDSyncronize clocks on the network with a protocol such as Network Time Protocol

多选题Your network consists of three Active Directory forests. Forest trust relationships exist between all forests. Each forest contains one domain. All domain controllers run Windows Server 2008 R2. Your company has three network administrators. Each network administrator manages a forest and the Group Policy objects (GPOs) within that forest.   You need to create standard GPOs that the network administrators in each forest will use. The GPOs must meet the following requirements:   èThe GPOs must only contain settings for either user configurations or computer configurations. èThe number of GPOs must be minimized.   Which two actions should you perform?()AExport the new GPOs to .cab files. Ensure that the .cab files are available to the network administrator  in each forest.BCreate two new GPOs. Configure both GPOs to use the required user configurations and the required  computer configurations.CCreate two new GPOs. Configure one GPO to use the required user configuration. Configure the other GPO to use the required computer configuration.DBack up the Sysvol folder that is located on the domain controller where the new GPOs were created. Provide the backup to the network administrator in each forest.

问答题Directions: In this part of the test, you will write an essay in response to a question that asks you to state, explain, and support your opinion on an issue. Typically, an effective essay will contain a minimum of 300 words. Your response will be scored on:·whether your opinion is supported with reasons and/or examples·grammar,·vocabulary, and·organization.Practice 1Directions: Read the question below. You have 30 minutes to plan, write, and revise your essay. Typically, an effective response will contain a minimum of 300 words.Some people believe that hard work is the only way to be successful. Other people believe that success comes from luck. Which do you agree with and why?

单选题To provide quality of service (QoS) for voice traffic in an IEEE 802.1 q network, which class of service (CoS) value should be used in the 3-bit, user priority bits (PRI) field? ()AThe PRI field should contain the Cos value of 010BThe PRI field should contain the Cos value of 011CThe PRI field should contain the Cos value of 100DThe PRI field should contain the Cos value of 101EThe PRI field should contain the Cos value of 110FThe PRI field should contain the CoS value of 111

单选题Which of the following would contain information regarding network device alerts using SNMP?()ASyslogBAudit logCHistory logDPing sweep reports

多选题You are unable to connect your computer to a wireless network projector. The wireless network projector does not appear in the list of available network projectors provided by the Connect to a Network Projector wizard.  You need to connect to the network projector.  What are two possible ways to achieve this goal?()AStart the Microsoft Windows Media Center Service Launcher service.BEnable the File and Printer Sharing Windows Firewall exception.CConnect your computer to the same subnet as the network projector.DType the IP address of the network projector in the Connect to a Network Projector wizard.

单选题The shipping papers for the products being carried in your tanker are NOT required to contain the().Aexact quantity of the cargoesBgrades of the cargoesClocation of the delivery point(s)Dname of the consignee(s)

多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()Acore layerBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunking

多选题Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.  Which two actions should you perform?()ARight-click and click the Diagnose option in the Connect to a network window.BSet the security type value to No authentication in the wireless network properties dialog box.CClick the Manually connect to a wireless network option in the Set up a connection or network window.DIn the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.EConfigure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.

单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()AConfigure the network category of your wireless network connection to Private.BConfigure the network category of your wireless network connection to Public.CConfigure the TCP/IP packet filtering on the wireless network connection.DConfigure the wireless network connection with the appropriate authentication to the router.