In an enterprise setting, access switches providing network connectivity placed throughout abuilding are typically connected to a backbone called the:()A、MDFB、ProxyC、Demarcation pointD、Smart jack
In an enterprise setting, access switches providing network connectivity placed throughout abuilding are typically connected to a backbone called the:()
- A、MDF
- B、Proxy
- C、Demarcation point
- D、Smart jack
相关考题:
Which setting enables the baselines by default in Oracle Database 11g?() A. setting the STATISTICS_LEVEL parameter to TYPICALB. adding filters to the Automatic Database Diagnostic Monitor (ADDM)C. enabling Automated Maintenance Task using Oracle Enterprise ManagerD. setting the OPTIMIZER_USE_PENDING_STATISTICS parameter to TRUE
In an enterprise setting, access switches providing network connectivity placed throughout abuilding are typically connected to a backbone called the:() A. MDFB. ProxyC. Demarcation pointD. Smart jack
When you design QoS on CE for an MPLS Layer 2 VPN, which three things should be considered?()A、Layer 2 access link QoS designB、enterprise-to-service-provider mapping modelsC、Layer 3 link access QoS designD、service provider service level agreementsE、Layer 2 link access load balancing
Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()A、assigning a private IP address to the APB、changing the default SSID valueC、configuring a new administrator passwordD、changing the mixed mode setting to single modeE、configuring traffic filtering
When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
Why are consumer-grade access points and routers not the best choice for SMBs?()A、They are not designed for multi-access-point networks.B、They do not scale well.C、They have higher total cost of ownership than some enterprise products.D、Their upgrade paths compete directly against Cisco upgrade paths.
Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、to add second factor based authentication to a Web applicationB、to pre-populate user wallets with all their application credentials in one goC、to enhance out-of-the-box audit logging by creating custom audit log eventsD、to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnE、to configure automatic password change on expiry for an application so that the new password is a random string of specified strength
Which setting enables the baselines by default in Oracle Database 11g?()A、setting the STATISTICS_LEVEL parameter to TYPICALB、adding filters to the Automatic Database Diagnostic Monitor (ADDM)C、enabling Automated Maintenance Task using Oracle Enterprise ManagerD、setting the OPTIMIZER_USE_PENDING_STATISTICS parameter to TRUE
Which series of Cisco routers is suitable for small businesses and for connecting small offices to enterprise networks?()A、 Cisco 800 Series routersB、 Cisco 830 Series routersC、 Cisco 1700 Series Modular Access RoutersD、 Cisco 3700 Series Modular Access Routers
What is required to utilize Dojo Wigits?()A、Setting the dojo widget properties on anxpageB、A server notes.ini parameterC、Client side library installationD、Access to www.dojocampus.org
Your company has 300 portable computers that run Microsoft Office Enterprise 2007. The company participates in the Microsoft Software Assurance program. You are designing a solution that enables remote employees to use Office and to access their Home folders. You plan to implement a Remote Desktop Services (RDS) infrastructure, and you plan to deploy Office Enterprise 2007 as a virtual application on the RDS servers. You need to choose the appropriate licenses. Which licensing solution should you choose?()A、1 Office Enterprise 2007 license and 300 App-V for Terminal Services licensesB、300 Office Enterprise 2007 licenses and 300 App-V for Terminal Services licensesC、300 Office Enterprise 2007 licenses and 300 Microsoft Desktop Optimization Pack (MDOP)licensesD、300 Windows Server 2008 R2 RDS client access licenses (CALs)
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. The Audit account management policy setting and Audit directory services access setting are enabled for the entire domain. You need to ensure that changes made to Active Directory objects can be logged. The logged changes must include the old and new values of any attributes. What should you do()A、Enable the Audit account management policy in the Default Domain Controller Policy.B、Run auditpol.exe and then configure the Security settings of the Domain Controllers OU.C、Run auditpol.exe and then enable the Audit directory service access setting in the Default Domain policy.D、From the Default Domain Controllers policy, enable the Audit directory service access setting and enable directory
You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do?()A、Start the Problem Steps Recorder.B、From Event Viewer, modify the properties of the Security log.C、From the local Group Policy, configure the Audit object access setting.D、From the local Group Policy, configure the Audit directory service Access setting.
All consultants belong to a global group named TempWorkers. You place three file servers in a new organizational unit named SecureServers. The three file servers contain confidential data located in shared folders. You need to record any failed attempts made by the consultants to access the confidential data. Which two actions should you perform()A、Create and link a new GPO to the SecureServers organizational unit. Configure the Audit privilege use Failure audit policy setting.B、Create and link a new GPO to the SecureServers organizational unit. Configure the Audit object access Failure audit policy setting.C、Create and link a new GPO to the SecureServers organizational unit. Configure the Deny access to this computer from the network user rights setting for the TempWorkers global group.D、On each shared folder on the three file servers, add the three servers to the Auditing tab. Configure the Failed Full control setting in the Auditing Entry dialog box.E、On each shared folder on the three file servers, add the TempWorkers global group to the Auditing tab. Configure the Failed Full control setting in the Auditing Entry dialog box.
单选题Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()AWindows NT ConnectorBGeneric (LDAP) ConnectorCNetwork Information Service ConnectorDActive Directory Service Interfaces Connector
多选题What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()AABBCCDDEE
多选题Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()Ato add second factor based authentication to a Web applicationBto pre-populate user wallets with all their application credentials in one goCto enhance out-of-the-box audit logging by creating custom audit log eventsDto create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnEto configure automatic password change on expiry for an application so that the new password is a random string of specified strength
单选题Your company has 300 portable computers that run Microsoft Office Enterprise 2007. The company participates in the Microsoft Software Assurance program. You are designing a solution that enables remote employees to use Office and to access their Home folders. You plan to implement a Remote Desktop Services (RDS) infrastructure, and you plan to deploy Office Enterprise 2007 as a virtual application on the RDS servers. You need to choose the appropriate licenses. Which licensing solution should you choose?()A1 Office Enterprise 2007 license and 300 App-V for Terminal Services licensesB300 Office Enterprise 2007 licenses and 300 App-V for Terminal Services licensesC300 Office Enterprise 2007 licenses and 300 Microsoft Desktop Optimization Pack (MDOP)licensesD300 Windows Server 2008 R2 RDS client access licenses (CALs)
单选题You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. Apre-shared key is not configured on the wireless access point. You need to connect a computer that runsWindows 7 to the wireless access point. Which security setting should you select for the wirelessconnection?()A802.1xBWPA-PersonalCWPA2-EnterpriseDWPA2-Personal
单选题You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has fiveremovable devices. You need to ensure that users can only access removable devices that have beenpreviously installed on the computer. What should you modify in the Local Group Policy ?()AEnable the Prevent redirection of USB devices setting.BEnable the Prevent installation of removable devices setting.CDisable the WPD Devices: Deny read access setting.DDisable the Allow administrators to override Device Installation Restriction policies setting.
多选题All consultants belong to a global group named TempWorkers. You place three file servers in a new organizational unit named SecureServers. The three file servers contain confidential data located in shared folders. You need to record any failed attempts made by the consultants to access the confidential data. Which two actions should you perform()ACreate and link a new GPO to the SecureServers organizational unit. Configure the Audit privilege use Failure audit policy setting.BCreate and link a new GPO to the SecureServers organizational unit. Configure the Audit object access Failure audit policy setting.CCreate and link a new GPO to the SecureServers organizational unit. Configure the Deny access to this computer from the network user rights setting for the TempWorkers global group.DOn each shared folder on the three file servers, add the three servers to the Auditing tab. Configure the Failed Full control setting in the Auditing Entry dialog box.EOn each shared folder on the three file servers, add the TempWorkers global group to the Auditing tab. Configure the Failed Full control setting in the Auditing Entry dialog box.
多选题You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.A SMTP server on the Internet has rejected some email sent from Xxx .What actions must you take to determine why this happened?()AYou must use the Windows Remote Management (WinRM) over SSL.BYou must access the Send connectors and use the Verbose setting in the Protocol logging.CYou must configure EdgeSync synchronization.DYou must check the protocol log files.EYou must implement a new managed content setting.
单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A It is recommended to place the VPN termination device in line with the Enterprise Edge 1B Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
单选题Which setting enables the baselines by default in Oracle Database 11g?()A setting the STATISTICS_LEVEL parameter to TYPICALB adding filters to the Automatic Database Diagnostic Monitor (ADDM)C enabling Automated Maintenance Task using Oracle Enterprise ManagerD setting the OPTIMIZER_USE_PENDING_STATISTICS parameter to TRUE
单选题Which series of Cisco routers is suitable for small businesses and for connecting small offices to enterprise networks?()A Cisco 800 Series routersB Cisco 830 Series routersC Cisco 1700 Series Modular Access RoutersD Cisco 3700 Series Modular Access Routers
多选题Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()Aassigning a private IP address to the APBchanging the default SSID valueCconfiguring a new administrator passwordDchanging the mixed mode setting to single modeEconfiguring traffic filtering
单选题Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You have a Remote Desktop Session Host (RD Session Host) server an d a Remote Desktop Web Access (RD Web Access) server.You enable several RemoteApp applications on the RD Session Host server.You need to configure access to RemoteApp applications so that RD Web Access users see only applications to which they have been granted access. What should you do?()AUse the RemoteApp Wizard to add to the RemoteApp Programs list setting.BAssign domain users and domain security groups to each RemoteApp application.CUse the RemoteApp Wizard to configure the RemoteApp program is a vailable through RD Web Access setting.DSpecify custom menu locations on the RD Session Host server for each domain security group by using a Group Policy object (GPO).