What are two rules for compacting IPv6 addresses?()A、Every 16 - bit segment segment that consists of all zeroes can be represented with a single colon.B、The trailing zeroes in any 16 - bit segment do not have to be written.C、The leading zeroes in any 16 - bit segment do not have to be written.D、Any single, continuous string of one or more 16 - bit segments that consists of all zeroes can be represented with a double colon.E、The maximum number of times a double colon can replace a 16 - bit segment that consists of all zeroes is two.F、Two zeroes in the middle of any 16 -bit segment do not have to be written.
What are two rules for compacting IPv6 addresses?()
- A、Every 16 - bit segment segment that consists of all zeroes can be represented with a single colon.
- B、The trailing zeroes in any 16 - bit segment do not have to be written.
- C、The leading zeroes in any 16 - bit segment do not have to be written.
- D、Any single, continuous string of one or more 16 - bit segments that consists of all zeroes can be represented with a double colon.
- E、The maximum number of times a double colon can replace a 16 - bit segment that consists of all zeroes is two.
- F、Two zeroes in the middle of any 16 -bit segment do not have to be written.
相关考题:
Which two actions are available in the GUI for creating location awareness rules?() A. WINS serverB. DNS serverC. IP reachabilityD. Resolve address
In which situation do the Rules require both vessels to change course ?______.A.Two power-driven vessels meeting head-onB.Two power-driven vessels crossing when it is apparent to the stand-on vessel that the give-way vessel is not taking appropriate actionC.Two sailing vessels crossing with the wind on the same sideD.All of the above
Before a Diffie-Hellman exchange may begin, the two parties involved must agree on what?()A、Two secret keysB、Two nonsecret keysC、Two secret numbersD、Two nonsecret numbers
Which two statements about static NAT are true? ()(Choose two.)A、Static NAT can only be used with destination NAT.B、Static NAT rules take precedence over overlapping dynamic NAT rules.C、NAT rules take precedence over overlapping static NAT rules.D、A reverse mapping is automatically created.
---“()” ---“Two degrees on starboard.” A、What rudder?B、How is the heading?C、How answer?D、What course?
What are two security appliances that can be installed in a network? (Choose two.)() A、ATMB、IDSC、IOSD、IOXE、IPSF、SDM
Which two statements about static NAT are true?()A、Static NAT can only be used with destination NAT.B、Static NAT rules take precedence over overlapping dynamic NAT rules.C、Dynamic NAT rules take precedence over overlapping static NAT rules.D、A reverse mapping is automatically created.
What are three configuration objects used to build JUNOS IDP rules?()A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects
You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing connection security rules.Which of the following is TRUE with regards to connection security rules?()A、Connection security rules allows for traffic to be secured via IPsec.B、Connection security rules do not allow the traffic through the firewall.C、Connection security rules are applied to programs or servicesD、Connection security rules are applied between two computers.
You have an Exchange Server 2010 organization for a company named Contoso, Ltd. Contoso has the following security policy: .Messages that contain the word budget cannot be sent to external recipients .Messages that contain the name Northwind Traders must be sent to the legal department automaticallyYou need to recommend a solution to meet the security policy. What should you recommend?()A、Create two transport rules.B、Create two message classifications.C、Create one transport rule and configure a legal hold.D、Create one message classification and configure a legal hold.
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.Due to company growth, TestKing.com has bought two other comapnies named Courseware Publishersand Stanford Finance. Youz have received instructions from the CIO to make sure that the users fromboth of these companies have their own respective e-mail address that correspond to their company. What should you do?()A、The best option is to create and configure two Receive connectors and two address lists.B、The best option is to create and configure two transport rules and two address remote entries.C、The best option is to create and configure two accepted domains and two e-mail address policies.D、The best option is to create and configure two remote domains and two accepted domains.
单选题When vessel enters thick fog, she should sound()every two minutes in accordance with the rules.Aone short blastBone prolonged blastCtwo short blasts
单选题The Rules state that vessels may depart from the Rules when().Athere are other vessels in the vicinityBoperating in a traffic separation schemeCengaged in a situation involving more than two vesselsDnecessary to avoid immediate danger
单选题All client computers in your network run Windows 7 with default firewall settings. You have a server-based application that requires an agent to be installed on all client computers. You need to use Group Policy to allow the application to initiate installation of the agent on all client computers. What should you do?()ACreate inbound port rules.BCreate inbound program rules.CCreate connection security rules.DCreate Windows service hardening rules.
单选题—What are the rules at your school?—Don’t run in the hallways and ______ arrive late for class.Anot toBwon’tCdon’tDno
多选题Which two actions are available in the GUI for creating location awareness rules?()AWINS serverBDNS serverCIP reachabilityDResolve address
多选题What are three configuration objects used to build JUNOS IDP rules?()Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects
多选题Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)AAddresses used for NAT pools should never overlap.BIf more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.CIf traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.DDynamic source NAT rules take precedence over static source NAT rules.
单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.Due to company growth, TestKing.com has bought two other comapnies named Courseware Publishersand Stanford Finance. Youz have received instructions from the CIO to make sure that the users fromboth of these companies have their own respective e-mail address that correspond to their company. What should you do?()AThe best option is to create and configure two Receive connectors and two address lists.BThe best option is to create and configure two transport rules and two address remote entries.CThe best option is to create and configure two accepted domains and two e-mail address policies.DThe best option is to create and configure two remote domains and two accepted domains.
单选题You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1. What should you do on Computer1?()ARun Winrm.exe quickconfig.BFrom Windows Firewall with Advanced Security, select Export Policy.CFrom Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.DOpen Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.
单选题Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2.Server1 has several custom inbound rules and connection security rules.You need to duplicate the Windows Firewall rules from Server1 to Server2.What should you do on Server1?()AAt the Command Prompt, run netsh.exe firewall dump.BAt the Command Prompt, run netsh.exe firewall show firewall.txt.CFrom the Windows Firewall with Advanced Security console, click Export policy.DFrom the Windows Firewall with Advanced Security console, click the Connection Security Rules node, and then click Export List.
多选题Which two statements about static NAT are true? ()(Choose two.)AStatic NAT can only be used with destination NAT.BStatic NAT rules take precedence over overlapping dynamic NAT rules.CNAT rules take precedence over overlapping static NAT rules.DA reverse mapping is automatically created.
多选题What are two characteristics of Telnet (Choose two.)()。AItsendsdataincleartextformat.BItisnolongersupportedonCisconetworkdevices.CItismoresecurethanSSHDItrequiresanenterpriselicenseinordertobeimplemented.EItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.
多选题What are two security appliances that can be installed in a network (Choose two.)()。AATMBIDSCIOSDIOXEIPSFSDM
多选题Which two statements about static NAT are true?()AStatic NAT can only be used with destination NAT.BStatic NAT rules take precedence over overlapping dynamic NAT rules.CDynamic NAT rules take precedence over overlapping static NAT rules.DA reverse mapping is automatically created.