Which of the following are not steps in setting up aTLS session? ()A、 Client sends Hello to Server listing all of its supported cipher suitesB、 Server sends Hello to Client listing all of its supported cipher suitesC、 Client calculates and sends encryptedpre_master_secretD、 Client and Server calculate keys from pre_master_secretE、 Server sends Change Cipher Spec to indicate a shift to encrypted mode

Which of the following are not steps in setting up aTLS session? ()

  • A、 Client sends Hello to Server listing all of its supported cipher suites
  • B、 Server sends Hello to Client listing all of its supported cipher suites
  • C、 Client calculates and sends encryptedpre_master_secret
  • D、 Client and Server calculate keys from pre_master_secret
  • E、 Server sends Change Cipher Spec to indicate a shift to encrypted mode

相关考题:

Which IDP policy action closes the connection and sends an RST packet to both the client and the server?() A. close-connectionB. terminate-connectionC. close-client-and-serverD. terminate-session

Which three statements are true regarding the Network Time Protocol (NTP) in JUNOS platforms?() A.MD5 authentication is supported.B.A client always synchronizes to a server even when the difference between the server clock and the local clock differs by a large amount.C.JUNOS software can provide a primary time reference.D.The boot-server configuration allows a router to synchronize its clock when it boots up, regardless of the offset between the NTP clock source and its internal clock.E.It is useful to correlate timestamps on log files and other events for troubleshooting and forensics.

What does a router do if it has no EIGRP feasible successor route to a destination network and the successor route to that destination network is inactive status?() A. It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.B. It sends a copy of its neighbor table to all adjacent routers.C. It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.D. It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.

Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A、 The FTP server sends back an acknowledgment (ACK) to the clientB、 The FTP server allocates a port touse for the data channel and transmit that port number to the clientC、 The FTP server opens the data channel to the client using the port number indicated by the clientD、 The FTP client opens the data channel to the FTP server on Port 20E、 The FTP client opens the datachannel to the FTP server on Port 21

Which set of statements describes the correct order and process of a Company wireless user  client associating with a wireless access point in the Company network? ()A、 1. Access point sends probe request .2. Client sends probe response.3. Client initiates  association.4. Access point accepts association.5. Client adds access point MAC address to  association table.B、 1. Client sends probe request.2. Access point sends probe response.3. Client initiates  association.4. Access point accepts association.5. Access point adds client MAC address to  association table.C、 1. Client sends probe request.2. Access point sends probe response.3. Access point initiates  association.4. Client accepts association.5. Access point adds client MAC address to association  table.D、 1. Access point sends probe request .2. Client sends probe response.3. Client initiates  association.4. Access point accepts association.5. Access point adds client MAC address to  association table.E、 1. Client sends probe request.2. Access point sends probe response.3. Client initiates  association.4. Access point accepts association.5. Client adds access point MAC address to  association table.F、 None of the other alternatives apply.

How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()A、It sends the traffic through one egress port toward its destinationB、It sends the traffic through multiple egress ports to all available receiversC、It sends the traffic through an internal link to the RED、It sends the traffic to the local system for further processing

Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A、close-connectionB、terminate-connectionC、close-client-and-serverD、terminate-session

Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2008.All client computers run Windows Vista. All computers are members of the Active Directory domain. You assign the Secure Server (Require Security) IPsec policy to Server1 by using a Group Policy object(GPO). Users report that they fail to connect to Server1.You need to ensure that users can connect to Server1. All connections to Server1 must be encrypted. What should you do? ()A、Restart the IPsec Policy Agent service on Server1.B、Assign the Client (Respond Only) IPsec policy to Server1.C、Assign the Server (Request Security) IPsec policy to Server1.D、Assign the Client (Respond Only) IPsec policy to all client computers.

Your network consists of single active domain. The domain contains a serve named server1 that runs windows server 2008 all client computers run windows vista. All computers are members of the active directory domain. You assign the secure server (Require Security) IPsec policy to server1 by using a GPO. Users report that they fail to connect to server1. You need to ensure that users can connect to server1. All connections to server1 must be encrypted. What should you do?()A、Restart the IPsec policy agent service on server1.B、Assign the client (Respond only ) IPsec policy to Server1.C、Assign the server (Request Security) ipsec policy to server1.D、Assign the client (Respond Only) IPsec policy to all client computes.

You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()A、Ensure that all client computers have a graphical Telnet client installedB、Ensure that all client computers have the Remote Desktop Connection client software installedC、Ensure that all server computers have RCONSOLE installed and that it is configured to start automaticallyD、Ensure that all server computers have Remote Administration (HTML) installed

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).The network contains two DNS servers named Server1 and Server2.  You deploy a DHCP server named Server3 and configure all client computers to receive their IP configurations automatically.You discover that all client computers use Server2 for host name resolution.You need to ensure that all client computers use Server1 for host name resolution.  What should you do?()A、On Server3, modify the DNS option.B、On Server3, modify the DNS domain name option.C、On Server2, modify the Preferred DNS server setting.D、On each client computer, modify the properties of the DNS Client service.

You have an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7.All client computers are configured to extend the desktop display across two monitors. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that users can extend the Remote Desktop Connection window across both monitors. What should you do?()A、Configure the screen resolution of the RD Session Hos t server.B、Configure the Ease of Access options on the RD Session Host server.C、Configure the display configuration settings of the Remote Desktop Connection client to use all monitors.D、Configure the display configuration settings of the Remote Desktop Connection client to set the size of the remote desktop to Full Screen.

Your network contains an Active Directory domain. All client computers run Windows XP Service Pack 3 (SP3). The domain contains a member server named Server1 that runs Windows Server 2008 R2. On Server1, you create a connection security rule that requires authentication for inbound and outbound connections. You configure the connection security rule to use Kerberos authentication. You need to ensure that the client computers can connect to Server1. The solution must ensure that all connections to Server1 are encrypted. What should you do?()A、From the Windows Firewall with Advanced Security console, create an inbound rule on Server1.B、From the Windows Firewall with Advanced Security console, create an outbound rule on Server1.C、From a Group Policy object (GPO), enable the Client (Respond Only) IPSec policy on all client computers.D、From a Group Policy object (GPO), configure the Network Security: LDAP client signing requirements policy setting for all client computers.

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Remote client computers are not members of the domain. Your environment includes a Remote Desktop Gateway (RD Gateway) server. You install an application on a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote users can run the application. What should you do?()A、On each remote client computer, configure the Remote Desktop Connection client to connect to the RD Gateway server.B、On each remote client computer, configure the Remote Desktop Connection client to connect without warning if server authentication fails.C、On the RD Session Host server, configure the Remote Desktop Connection client to connect to the RD Gateway server.D、On the RD Gateway server, add the Guests local group to the Remote Desktop Users local group.

A client cannot mount a filesystem from an NFS server.  Which of the following options is the most probable cause for the mount failure?()A、Server is not running  rpc.lockdB、Client is not running the rpc.statdC、Filesystem not exported by the serverD、Client nfsd daemons are all inoperative

多选题Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()AAttacker sends multiple DHCP requests flooding DHCP serverBAttacker connects rogue server initiating DHCP requestsCAttacker connects rogue server replying to DHCP requestsDAttacker sends DHCP jam signal causing DHCP server to crashEAttacker sends gratuitous ARP replies, thereby jamming the DHCP serverFAttacker sends unsolicited DHCP replies, thereby jamming the DHCP server

单选题Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A The FTP server sends back an acknowledgment (ACK) to the clientB The FTP server allocates a port touse for the data channel and transmit that port number to the clientC The FTP server opens the data channel to the client using the port number indicated by the clientD The FTP client opens the data channel to the FTP server on Port 20E The FTP client opens the datachannel to the FTP server on Port 21

单选题What does a router do if it has no EIGRP feasible successor route to a destination network and the successor route to that destination network is inactive status?()AIt routes all traffic that is addresses to the destination network to the interface indicates in the routing table.BIt sends a copy of its neighbor table to all adjacent routers.CIt sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.DIt broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.

单选题Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()Aclose-connectionBterminate-connectionCclose-client-and-serverDterminate-session

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).The network contains two DNS servers named Server1 and Server2.  You deploy a DHCP server named Server3 and configure all client computers to receive their IP configurations automatically.You discover that all client computers use Server2 for host name resolution.You need to ensure that all client computers use Server1 for host name resolution.  What should you do?()AOn Server3, modify the DNS option.BOn Server3, modify the DNS domain name option.COn Server2, modify the Preferred DNS server setting.DOn each client computer, modify the properties of the DNS Client service.

单选题Which of the following are not steps in setting up aTLS session? ()A Client sends Hello to Server listing all of its supported cipher suitesB Server sends Hello to Client listing all of its supported cipher suitesC Client calculates and sends encryptedpre_master_secretD Client and Server calculate keys from pre_master_secretE Server sends Change Cipher Spec to indicate a shift to encrypted mode