You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A、Content storage networkingB、Network optimizationC、Network managementD、Network security
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
- A、Content storage networking
- B、Network optimization
- C、Network management
- D、Network security
相关考题:
Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()A.Configure a Windows Connect Now Group Policy.B.Configure a Wireless Network (IEEE 802.11) Policy.C.Delete the rogue network from the Network and Sharing Center on each computer.D.Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D
As a Network Engineer, you have to master how to deploy Virtual Storage Area Network and what are the results of the deployment. Which two of the following are resulting from its deployment?()A、reduced backupB、increased securityC、greater storage demandD、improved availability
You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()A、EncryptionB、Bandwidth limitsC、Minimal signal lossD、No EMI
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A、Network managementB、Network optimizationC、Network securityD、Content storage networking
You are the network consultant from passguide.com. You should tell your clients Two technologies help them save much time from complex computing. ()A、VPNB、InfiniBandC、SCSI over IPD、Remote Direct Memory Access
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、detailed security device specificationsC、results from pilot network testingD、results from a network audit
Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()A、Content networkingB、Campus local-area networkingC、Network managementD、Network security
Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A、 Create an IPsec Enforcement Network policyB、 Create an 802.1X enforcement network policyC、 Create a wired network (IEEE 802.3) Group PolicyD、 Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()A、Protecting the business from information outagesB、Optimizing the efficiency with which IT operatesC、An increased need for specialized IT silosD、IT systems grow fast
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()A、ExecutableB、TrojanC、VirusD、Worm
Your network contains a server named Server1 that runs Windows Server 2003 Service Pack (SP2). You install a new network adapter on Server1. You need to view the media access control (MAC) address for the new network adapter. What should you do? ()A、At the command prompt, run Ipconfig /all.B、At the command prompt, run Net view //server1.C、From the Device Manager snap-in, view the properties of the network adapter.D、From the Services snap-in, view the properties on the Network Connections service.
You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?()A、From Network and Sharing Center, click Connect to a network.B、From Network and Sharing Center, click Set up a new connection or network.C、From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.D、From Windows Firewall with Advanced Security, click Connection Security Rules and then click NewRule.
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.
You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1. What should you do?()A、Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B、Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C、Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D、Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()A、The best option is to use port 3309 and 25 from the internal network to the perimeter network.B、The best option is to use port 3309 and 636 from the internal network to the perimeter network.C、The best option is to use port 50636 and 25 from the internal network to the perimeter network.D、The best option is to use port 50636 and 135 from the internal network to the perimeter network.
You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). You need to monitor the performance of the VPN server for one day. What should you do? ()A、From the Performance console, create a trace log.B、From the Performance console, create a counter log.C、Install Network Monitor Tools. From Network Monitor create a new capture.D、Install Network Monitor Tools. From Network Monitor create a new parser file.
You need to create a VPN connection. What should you do?()A、From Windows Explorer, right-click Computer and then click Map network drive.B、From Windows Explorer, right-click Computer and then click Add a network location.C、From Network and Sharing Center, click Set up a new connection or network and then click Set up anew network.D、From Network and Sharing Center, click Set up a new connection or network and then click Connect to aworkplace.
Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.
Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()A、From Credential Manager, modify the generic credentials.B、From Credential Manager, modify the Windows credentials.C、From Network and Sharing Center, turn on Network discovery.D、From Network and Sharing Center, modify the wireless network connection settings.
Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()A、Create an Ipsec enforcement network policy.B、Create an 802.1xenforcemen tnetwork policy.C、Createa wired network(IEEE802.3)Group policy.D、Create an extensible authentication protocol(EAP)enforcement network policy.
单选题You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()ANetwork managementBNetwork optimizationCNetwork securityDContent storage networking
多选题You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()AAn increased need for specialized IT silosBProtecting the business from information outagesCIT systems grow fastDOptimizing the efficiency with which IT operates
多选题You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()AEncryptionBBandwidth limitsCMinimal signal lossDNo EMI