Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS).The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees.You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection.What should you do?()A、Install the Network Policy Server (NPS) server role on RAS1.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires users to authenticate by using EAP-TLS.D、Create a remote access policy that requires users to authenticate by using MS-CHAP v2.
Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS).The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees.You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection.What should you do?()
- A、Install the Network Policy Server (NPS) server role on RAS1.
- B、Create a remote access policy that requires users to authenticate by using SPAP.
- C、Create a remote access policy that requires users to authenticate by using EAP-TLS.
- D、Create a remote access policy that requires users to authenticate by using MS-CHAP v2.
相关考题:
Your network contains an Active Directory domain. The network has DirectAccess deployed.You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.You need to ensure that users can view their DirectAccess status by using the DCA.Which two group policy settings should you configure?()A. Dynamic Tunnel Endpoints (DTEs)B. Corporate Portal SiteC. Corporate ResourcesD. PortalName
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()A.AB.BC.CD.D
Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network.What should you do?()A.AB.BC.CD.D
Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN.What should you do?() A.AB.BC.CD.D
Network management helps you to(66)the strengths and weaknesses of your network, as well as determine any configuration changes that may be necessary. Any controlled changes to your network and its components-especially configurations, software and(67), can have an effect on its overall efficiency. To maintain control, you need the tools and knowledge to manage all activity that has the potential to affect your(68).A.seeB.knowC.monitorD.control
TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()A. TestKing# show eigrp entriesB. TestKing# show protocolsC. TestKing# debug eigrp routesD. TestKing# show ip route eigrpE. TestKing# show route eigrp
系统性能问题的观测和解决一般按照下面哪个顺序进行()A、MEM-IO-Network-CPUB、IO-MEM-CPU-NetworkC、CPU-IO-Network-MEMD、CPU-MEM-IO-Network
TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()A、TestKing# show eigrp entriesB、TestKing# show protocolsC、TestKing# debug eigrp routesD、TestKing# show ip route eigrpE、TestKing# show route eigrp
Your network contains an Active Directory domain. The network has DirectAccess deployed.You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.You need to ensure that users can view their DirectAccess status by using the DCA.Which two group policy settings should you configure?()A、Dynamic Tunnel Endpoints (DTEs)B、Corporate Portal SiteC、Corporate ResourcesD、PortalName
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network
You are planning to connect your three branch offices to the corporate site via Frame Relay. The first branch office has been assigned the network 10.1.0.0/16, the second 10.2.0.0/16, the third 10.3.0.0/16, and the corporate headquarters uses 10.0.0.0/16. You would like to summarize all branch and corporate networks into a single route at the corporate site. Which network address and subnet mask should you choose?() A、 10.0.0.0/24B、 10.0.0.0/16C、 10.0.0.0/14D、 10.0.0.0/15
Your network contains a computer named Computer1. Computer1 is assigned an IP address of 39 / 84 192.168.1.112/26.Your companys corporate policy states that the first usable address in each subnet is allocated to the default gateway.You need to configure the default gateway for Computer1.Which address should you choose?()A、192.168.1.1B、192.168.1.63C、192.168.1.65D、192.168.1.93
Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.
You are designing a strategy to ensure that DNS queries always take the most efficient route to get resolved. Which action or actions should you perform?()A、 Configure conditional forwarding on the corporate DNS servers to point the development DNS servers.B、 Configure conditional forwarding on the development DNS servers to point the corporate DNS servers.C、 Configure conditional forwarding on the perimeter network DNS servers to point the corporate and development DNS servers.D、 Configure forwarding on the corporate and development DNS servers to point the perimeter network DNS servers.E、 Disable root hints on the perimeter network DNS Servers.
Your network administrator has assigned you an IP address of 192.168.0.20 with subnet mask of 255.255.255.0.Your network is running in pure Windows 2000 domain. What else should know in order to join your computer to the Windows 2000 domain. ()A、 Address of DHCP server.B、 Address of WINS server.C、 Address of DNS server.D、 Address of default gateway
Your network consists of a single Active Directory forest that contains a root domain and two child domains. All servers run Windows Server 2008 R2. A corporate policy has the following requirements: èAll local guest accounts must be renamed and disabled. èAll local administrator accounts must be renamed. You need to recommend a solution that meets the requirements of the corporate policy. What should you recommend?()A、Implement a Group Policy object(GPO) for each domain.B、Implement a Group Policy object(GPO) for the root domain.C、Deploy Network Policy and Access Services(NPAS)on all domain controllers in each domain. D、Deploy Active Directory Rights Management Services(AD RMS)on the root domain controllers.
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()? A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connectionsC、Configure VPN connections to use MS-CHAP v2 authenticationD、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP
单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()ASet the driver signing option to block.BSet the driver signing option to ignore.CIn the computer’s BIOS, reserve an unused IRQ for ISA devices.DIn the Device Manager, configure the second ISA network adapter to use an unused IRQ.
问答题Practice 3 ● Your company has put an advertisement on a local newspaper to recruit a manager for an overseas subsidiary, an applicant has written to show interest in it. ● Write a letter to the applicant: ● introducing your corporate culture to him, ● defining the job responsibilities, ● terms and conditions of employment, etc.
单选题Your company has an Active Directory forest. The corporate network uses DHCP to configure client computer IP addresses. The DHCP server has a DHCP client reservation for a portable computer named WKS1. You install asecond DHCP server on the network. You need to ensure that WKS1 receives the DHCP reservation from the DHCP service. What should you do?()ARun the ipconfig /renew command on WKS1.BRun the netsh add helper command on WKS1.CAdd the DHCP reservation for WKS1 to the second DHCP server.DAdd both DHCP servers to the RAS and IAS Servers group in the Active Directory domain.
单选题Your company has an IPv6 Ethernet network. A router named R1 connects your segment to the internet. A router named R2 joins your subnet with a segment named Private1. The Private1 segment has a network address of 10.128.4.0/26. Your computer named WKS2 required access to servers on the Private1 network. The WKS1 computer configuration in shown in the following table. (again table missing). The routers are configured as shown in the following table. (missing too)WKS1 is unable to connect to the Private1 network by using the current configuration. You need to add a persistent route for the Private1 network to the routing table on WKS1.()ARout add -p 10.128.4.0/22 10.128.4.1BRoute add Cp 10.128.4.0/26 10.128.64.10CRoute add Cp 10.128.4.0 mask 255.255.255.192 10.12.64.1DRoute add Cp 10.128.64.10 mask 255.255.255.192 10.128.4.0
单选题Your network administrator has assigned you an IP address of 192.168.0.20 with subnet mask of 255.255.255.0.Your network is running in pure Windows 2000 domain. What else should know in order to join your computer to the Windows 2000 domain. ()A Address of DHCP server.B Address of WINS server.C Address of DNS server.D Address of default gateway
单选题TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()ATestKing# show eigrp entriesBTestKing# show protocolsCTestKing# debug eigrp routesDTestKing# show ip route eigrpETestKing# show route eigrp
单选题You are the network administrator for your company. The Denver office is currently connected to the corporate WAN by using a Windows Server 2003 computer named Server23.Server23 is configured as a dial-up router. Server23 has two network adapters. One network adapter connects to the Ethernet LAN. The other network adapter is a broadband networking device.The company plans to increase the number of employees in the Denver office by at least 25 percent. You need to confirm that the current network bandwidth of the broadband connection will be sufficient for the future expansion of the Denver office.You want to use System Monitor on Server23 to find out the current utilization of the broadband network connection. What should you do?()AMonitor the Bytes Total/sec counter on the Network Interface object.BMonitor the Bytes Total/sec counter on the Server object.CMonitor the Server//Packets/sec counter on the Server object.DMonitor the Current Bandwidth counter on the Network Interface object.
单选题Your company has users who connect remotely to the main office through a Windows Server 2008 VPN server.You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do?()ACreate a network policy for VPN connections. Modify the Day and time restrictions.BCreate a network policy for VPN connections. Apply an IP filter to deny access to the corporate network.CModify the Logon hours for all user objects to specify only the VPN server on the Computer restrictions option.DModify the Logon Hours for the default domain policy to enable the Force logoff when logon hours expire option.
单选题One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()AVirtual GatewayBReal-IP GatewayCNAT GatewayDCentral Gateway
单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A Create an IPsec Enforcement Network policyB Create an 802.1X enforcement network policyC Create a wired network (IEEE 802.3) Group PolicyD Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
单选题You are planning to connect your three branch offices to the corporate site via Frame Relay. The first branch office has been assigned the network 10.1.0.0/16, the second 10.2.0.0/16, the third 10.3.0.0/16, and the corporate headquarters uses 10.0.0.0/16. You would like to summarize all branch and corporate networks into a single route at the corporate site. Which network address and subnet mask should you choose?()A 10.0.0.0/24B 10.0.0.0/16C 10.0.0.0/14D 10.0.0.0/15