All secure domain routers (SDRs) have shared attributes and resources. Which three resources areshared among all SDRs? ()A、SNMP trapsB、fabric cardsC、exec-level configurationD、privilege-level configurationE、admin-level configuration
All secure domain routers (SDRs) have shared attributes and resources. Which three resources areshared among all SDRs? ()
- A、SNMP traps
- B、fabric cards
- C、exec-level configuration
- D、privilege-level configuration
- E、admin-level configuration
相关考题:
Before using a fixed CO2 system to fight an engine room fire, you must ______.A.secure the engine room ventilationB.secure the machinery in the engine roomC.evacuate all engine room personnelD.All of the above
What are two important guidelines to follow when implementing VTP?()A、 CDPmust be enabled on all switches in theVTP management domain.B、 All switches in the VTPdomain must run the same version of VTP.C、 When using secure mode VTP, only configure management domain passwords onVTP servers.D、 EnablingVTP pruning on a server willenable the feature for the entire management domain.E、 Use of theVTPmulti-domain feature should be restricted to migration and temporary implementation.
All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()A、privilege-level configurationB、fabric cardsC、SNMP trapsD、admin- level configurationE、exec- level configuration
Which three statements about the secure domain router are true?()A、The logical router can span across chassis.B、The fabric and system controller module are shared by all logical routers.C、Each logical router has a distinct fabric and system controller moduleD、The logical router can share a route processorE、The logical router cannot share a route processor
Which statement is true regarding an Ethernet collision domain?()A、If a router is used, the collision domain includes all devices connected to the router.B、If a hub is used, the collision domain is limited to each device and the hub.C、If a switch is used, the collision domain is limited to each device and the switch.D、If a bridge is used, the collision domain includes all devices connected to the bridge.
Which two statements are true regarding an Ethernet collision domain?()A、If a switch is used, the collision domain is limited to each device and the switchB、If a hub is used, the collision domain is limited to each device and the hubC、If a hub is used, the collision domain includes all devices connected to the hubD、If a switch is used, the collision domain includes all devices connected to the switch
Which statement is true regarding an Ethernet collision domain?()A、If a router is used, the collision domain includes all devices connected to the routerB、If a hub is used, the colision domain is limited to each device and the hubC、If a switch is used, the collision domain is limited to each device and the switchD、If a bridge is used, the collision domain includes all devices connected to the bridge
You have an Exchange Server 2010 organization and an Active Directory Rights Management Services(AD RMS) server. All users access their mailboxes by using Outlook Web App (OWA). You need to plan a security solution for the organization to meet the following requirements:.Secure messages by using administrator-defined templates .Ensure that e-mail messages sent by users can be stored in an encrypted format What should you include in the plan?()A、a legal holdB、Domain SecurityC、Outlook Protection RulesD、Secure/Multipurpose Internet Mail Extensions (S/MIME)
You have a single Active Directory directory service domain. All client computers run either Windows Vista or Windows XP. You create and configure a Group Policy object (GPO) named Secure Client Computer. You need to ensure that the Secure Client Computer GPO is automatically applied to current and future Windows XP client computers. What should you do?()A、 Create a WMI filter that limits the scope of the Secure Client Computer GPO to the Windows XP operating system. Link the WMI filter to the GPO. Link the GPO to the domain.B、 Create a global security group that contains all of the Windows XP client computers. Edit the permissions of the Secure Client Computer GPO to allow the global security group the Read and Apply Group Policy permissions. Link the Secure Client Computer GPO to the domain.C、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Planning) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.D、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Logging) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.
Your company has a single Active Directory directory service forest with multiple domains. The Schema FSMO role is held by one of the domain controllers in the forest root domain. The DomainThe safer , easier way to help you pass any IT exams. Naming Master FSMO role is held by one of the domain controllers in a child domain. All domain controllers have Windows Server 2003 installed. You need to upgrade all domain controllers to Windows Server 2003 R2. Which two actions should you perform?()A、 Run the adprep /forestprep command in the forest root domain.B、 Run the adprep /forestprep command in all the child domains.C、 Run the adprep /domainprep command in all the child domains only.D、 Run the adprep /domainprep command in all domains.
You are a network administrator for your company. All domain controllers run Windows Server 2003. The network contains 50 Windows 98 client computers, 300 Windows 2000 Professional computers, and 150 Windows XP Professional computers. According to the network design specification, the Kerberos version 5 authentication protocol must be used for all client computers on the internal network. You need to ensure that Kerberos version 5 authentication is used for all client computers on the internal network. What should you do? ()A、 On each domain controller, disable Server Message Block (SMB) signing and encryption of the secure channel traffic.B、 Replace all Windows 98 computers with new Windows XP Professional computers.C、 Install the Active Directory Client Extensions software on the Windows 98 computers.D、 Upgrade all Windows 98 computers to Windows NT Workstation 4.0.
Your network consists of single active domain. The domain contains a serve named server1 that runs windows server 2008 all client computers run windows vista. All computers are members of the active directory domain. You assign the secure server (Require Security) IPsec policy to server1 by using a GPO. Users report that they fail to connect to server1. You need to ensure that users can connect to server1. All connections to server1 must be encrypted. What should you do?()A、Restart the IPsec policy agent service on server1.B、Assign the client (Respond only ) IPsec policy to Server1.C、Assign the server (Request Security) ipsec policy to server1.D、Assign the client (Respond Only) IPsec policy to all client computes.
You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2003 You upgrade all domain controllers to Windows Server 2008 You need to configure the Active Directory environment to support the application of multiple password policies What should you do()A、Create multiple Active Directory sites.B、On all domain controllers, run dcpromo /adv.C、On one domain controller, run dcpromo /adv.D、Raise the functional level of the domain to Windows Server 2008.
多选题All secure domain routers (SDRs) have shared attributes and resources. Which three resources areshared among all SDRs? ()ASNMP trapsBfabric cardsCexec-level configurationDprivilege-level configurationEadmin-level configuration
多选题Which three statements about the secure domain router are true?()AThe logical router can span across chassis.BThe fabric and system controller module are shared by all logical routers.CEach logical router has a distinct fabric and system controller moduleDThe logical router can share a route processorEThe logical router cannot share a route processor
单选题All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows 7. What should you do?()ASet the VPN server to Layer 2 Tunneling Protocol.BSet the VPN server to Secure Socket Tunneling Protocol.CSet the VPN server to Internet Key Exchange version 2.DConfigure the Direct Access feature on the VPN server.
多选题What are two important guidelines to follow when implementing VTP?()ACDPmust be enabled on all switches in theVTP management domain.BAll switches in the VTPdomain must run the same version of VTP.CWhen using secure mode VTP, only configure management domain passwords onVTP servers.DEnablingVTP pruning on a server willenable the feature for the entire management domain.EUse of theVTPmulti-domain feature should be restricted to migration and temporary implementation.
单选题Which statement is true regarding an Ethernet collision domain?()AIf a router is used, the collision domain includes all devices connected to the routerBIf a hub is used, the colision domain is limited to each device and the hubCIf a switch is used, the collision domain is limited to each device and the switchDIf a bridge is used, the collision domain includes all devices connected to the bridge
单选题You are designing a DNS strategy to meet the business and technical requirements. What should you do?()AInstall the DNS Server service on all domain controllers. Create Active Directory-integrated zones. Replicate the zones to all DNS servers in the forest.BInstall the DNS Server service on all domain controllers. Create Active Directory-integrated zones. Replicate the zones to all DNS servers in the domain.CInstall the DNS Server service on all domain controllers. Create primary zones and secondary zones. DCreate application partitions for the different zones on one domain controller. Configure replication to occur on all DNS servers.
多选题Which two statements are true regarding an Ethernet collision domain?()AIf a switch is used, the collision domain is limited to each device and the switchBIf a hub is used, the collision domain is limited to each device and the hubCIf a hub is used, the collision domain includes all devices connected to the hubDIf a switch is used, the collision domain includes all devices connected to the switch
多选题All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()Aprivilege-level configurationBfabric cardsCSNMP trapsDadmin- level configurationEexec- level configuration
单选题Your company has a single Active Directory domain named intranet.adatum.com. The domain controllers run Windows Server 2008 and the DNS server role. All computers, including non-domain members, dynamically register their DNS records. You need to configure the intranet.adatum.com zone to allow only domain members to dynamically register DNS records. What should you do()ASet dynamic updates to Secure Only.BEnable zone transfers to Name Servers.CRemove the Authenticated Users group.DDeny the Everyone group the Create All Child Objects permission.
多选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet. What are two possible ways to achieve this goal?()AMonitor the events in the application log on Server1.BMonitor the events in the security log on Server1.CMonitor the Web server connections on Server1 by using a performance log.DMonitor network traffic to Server1 by using Network Monitor.EMonitor the IIS logs on Server1.