our network contains a Network Policy Server (NPS) named Server1.You need to configure a network policy for a VLAN.Which RADIUS attributes should you add?()A、¡¤Logi-LAT-ServiceˆLogin-LAT-Node ˆLogin-LAT-Group ˆNAS-IdentifierB、¡¤Tunne-Assignment-ID ˆTunnel-Preference ˆTunnel-Client-Auth-ID ˆNAS-Port-IdC、¡¤Tunne-Client-Endpt ˆTunnel-Server-Endpt ˆNAS-Port-Type ˆTunnel-PasswordD、¡¤Tunne-Medium-Type ˆTunnel-Pvt-Group-ID ˆTunnel-Type ˆTunnel-Tag

our network contains a Network Policy Server (NPS) named Server1.You need to configure a network policy for a VLAN.Which RADIUS attributes should you add?()

  • A、¡¤Logi-LAT-Service   ˆLogin-LAT-Node  ˆLogin-LAT-Group  ˆNAS-Identifier
  • B、¡¤Tunne-Assignment-ID  ˆTunnel-Preference  ˆTunnel-Client-Auth-ID   ˆNAS-Port-Id
  • C、¡¤Tunne-Client-Endpt   ˆTunnel-Server-Endpt   ˆNAS-Port-Type   ˆTunnel-Password
  • D、¡¤Tunne-Medium-Type  ˆTunnel-Pvt-Group-ID  ˆTunnel-Type  ˆTunnel-Tag

相关考题:

● TCP/IP communication protocol contains four layers. From bottom to top, the four layers are __(71)__.(71)A.network interface layer, internet layer, transport layer and application layerB.internet layer, network interface layer, transport layer and application layerC.network interface layer, transport layer, network interface layer and application layerD.application layer, transport layer, internet layer and network interface layer

TCP/IP communication protocol contains four layers. From bottom to top, the four layers are __(71)__.A.network interface layer, internet layer, transport layer and application layerB.internet layer, network interface layer, transport layer and application layerC.network interface layer, transport layer, network interface layer and application layerD.application layer, transport layer, internet layer and network interface layer

For more information, visit our()at www.cambridge.org.A、netB、websiteC、internetD、network

For the p5 590 and p5 595 servers, the HMC must be directly attached. Why is the use of a private service network between HMC and the p5 590 required?()A、The Bulk Power Controllers are dependent upon the HMC to provide them with DHCP addresses.B、A firewall is required to isolate the private network from any of the open networks to which the HMC is attached.C、Network communications can be implemented through an open network. No private network is required but it is recommended.D、All p5 590 and 595 servers are shipped with one service processor card. A private network is required to manage DHCP addresses.

The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.

Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A、3389 and 25B、3389 and 636C、50636 and 25D、50636 and 135

Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()A、a conditional forwarderB、a GlobalNames zoneC、a secondary zoneD、a zone delegation

Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync synchronization.B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync synchronization.C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the perimeter network.D、Deploy two Hub Transport servers on the internal network.

our network contains a Network Policy Server (NPS) named NPS1 and a network access server named NAS1. NAS1 is configured to use NPS1 for authentication and accounting. A firewall separates NPS1 and NAS1.You need to ensure that NAS1 can successfully send authentication and accounting messages to NPS1.Which ports should you allow through the firewall?()A、TCP ports 80, 443, 389 and 1645B、TCP ports 88, 135, 139 and 1813C、UDP ports 53, 67, 68 and 69D、UDP ports 1812, 1813, 1645 and 1646

Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()A、Acct-Session-IdB、Acct-Status-TypeC、ClassD、NAS-Identifier

our network consists of a single Active Directory domain. All network servers run Windows Server 2003 Service Pack 2 (SP2). The network contains a single subnet. The network connects to the Internet by using a network address translation (NAT) device. You deploy a new DHCP server named Server1. You create a scope as shown in the exhibit. (Click the Exhibit button.) You need to ensure that client computers can connect to the Internet.  What should you do?()A、Add a Router scope option. B、Enable conflict detection on the DHCP server. C、Remove the WINS/NBT Node Type scope option. D、Configure the scope to respond to a BOOTP request only.

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor.  B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.

our network contains a server that runs window server 2008. The serve has the network policy server(NPS) service role installed. You need to allow only members of a global group named group1 VPN access to the network. What should you do?()A、Add group1 to the RAS and IAS servers group.B、Add group1 to the network configuration operators group..C、Create a new network policy and define a group-based connection for group1. Set the access permission of the policy to access granted. Set the processing order of the policy to 1.D、Create a new network policy and define a group-based condition for group1. Set the access permission of the policy to acces granted. Set the processing of the policy to 3.

Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()A、Join the new server to an Active Directory domain.B、Install Active? Directory Lightweight Directory Services on the new server.C、Run ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.D、Open TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.

Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

our network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). The network contains two servers named Server1 and Server2.  Server1 is configured as a DHCP server and has a scope that contains addresses 192.168.2.51 to 192.168.2.125.You have a reservation for a print device named Printer1. The reservation assigns the IP address of 192.168.2.100.You install DHCP on Server2 and create a scope that contains addresses 192.168.2.126 to 192.168.2.200.You need to ensure that Printer1’s IP address always remains the same. What should you create on Server2?()A、an exclusion range B、a reservation C、a superscope D、a user class

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()A、Port mirroringB、DHCP guardC、Router guardD、MAC address

单选题Which OSI layer header contains the address of a destination host that is another network?()AapplicationBpresentationCsessionDtransportEnetworkFdata linkGphysical

单选题You are designing a Windows Server 2008 R2 Hyper-V Virtualization environment. Your host servers must have the following elements: - A dedicated management network adapter. - A dedicated virtual network for child iSCSI network traffic. - A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()ATwo network adapters that support 802.1p, and one iSCSI host bus adapterBTwo network adapters that support 802.1p, and one network adapter that supports TCP ChimneyCTwo network adapters that support 802.lq, and one network adapter that supports Jumbo framesDThree network adapters that support 802. 1p

单选题Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A3389 and 25B3389 and 636C50636 and 25D50636 and 135

单选题Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()AAcct-Session-IdBAcct-Status-TypeCClassDNAS-Identifier

单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network  shareDUse the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection.

单选题Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()AConfigure a Windows Connect Now Group Policy.BConfigure a Wireless Network (IEEE 802.11) Policy.CDelete the rogue network from the Network and Sharing Center on each computer.DCreate a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

单选题Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()Aa conditional forwarderBa GlobalNames zoneCa secondary zoneDa zone delegation