Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.() A. ARPB. SSHC. TelnetD. WEPE. SNMPv1F. SNMPv2

Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()

A. ARP

B. SSH

C. Telnet

D. WEP

E. SNMPv1

F. SNMPv2


相关考题:

Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?() A.VLANB.Peer to PeerC.VTPD.VPN

Your network consists of a single Active Directory domain. Remote Assistance is enabled on all computers.You need to ensure that you can establish Remote Assistance connections to all computers without a Remote Assistance invitation.Which group policy setting should you configure? ()A. Offer Remote AssistanceB. Solicited Remote AssistanceC. Allow users to connect remotely using Terminal ServicesD. Sets rules for remote control of Terminal Services user sessions

You have just configured a static default route on router TK1. What is the purpose of a default route?() A. It is a route to be used when the routing protocol fails.B. It is a route configured by an ISP that sends traffic into a corporate network.C. It is a route used when a packet is destined for a remote network that is not listed in the routing table.D. It is a route manually configured for a specific remote network for which a routing protocol is not configured.E. It is used to send traffic to a stub network.

Secure Shell (SSH) is a cryptographic network protocol for ( ) remote login and other secure network services over an(请作答此空)network.The standard( )port for SSH is 22. The best known example application is for remote login to computer systems by users.SSH provides a secure channel over an insecured network in a( ) architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.The most visible application of the protocol is for access to shell accounts on( )operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.A.secureB.insecureC.internetD.internal

Which of the following should a technician instruct a user to do to initiate Remote Assistance for a user running Windows XP Professional?()A、Network Neighborhood  navigate to the users computer  right click  select Offer Remote AssistanceB、Go to Help and Support Center  Pick a Task  Use Tools  Offer Remote AssistanceC、Run Remote Desktop Connection  Select Connect to User Enter the IP addressD、Start  Programs  Administrative Tools  Remote Assistance

Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()A、ARPB、SSHC、TelnetD、WEPE、SNMPv1F、SNMPv2

Select the three best answers which best describe Private Network-to Network Interface (PNNI) in an ATM network.()A、It is the Routing protocol used between ATM switchesB、PNNI uses the same Dijsktra algorithm for SPF calculationC、PNNI and OSPF use the same Database to make cohesive decision for packet forwardingD、PNNI measures line capacities and delays in addition to simple cost metrics

Refer to the exhibit.What is the effect of the configuration that is shown?()A、It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.B、It configures a cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.C、It allows seven failed login attempts before the VTY lines are temporarily shutdown.D、It configures the virtual terminal lines with the password 030752180500.E、It configures SSH globally for all logins.

A user reports that they are unable to print to a remote printer. Which of the following should the technician check FIRST?()A、Printer driverB、Protocol stackC、Network connectivityD、Correct patch application

The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()A、The local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/IP) installed and configured. B、The remote host must support NFS. C、The remote host must have an NFS exported directory defined such that the local host has read and write permissions to the dump file on the remote host. D、The remote host can be the same as the local host.

What is the role of route preference?()A、It is used to determine which route should become active.B、It is used to select which routing table to use for forwarding.C、It is used to determine what routes to accept into the routing table.D、It is used to select the best route between multiple equal cost paths.

You have a terminal server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Windows Firewall is disabled on Server1. Server1 has two network adapters named NIC1 and NIC2. Both network adapters are connected to the same network segment. The IP address for NIC1 is 192.168.1.11. The IP address for NIC2 is 192.168.1.12. You regularly connect to Server1 by using Remote Desktop Connection. The NIC1 network adapter fails. You attempt to establish a Remote Desktop connection to 192.168.1.12, but the connection fails. You successfully connect to 192.168.1.12 by using Windows Explorer. You verify that IP filtering is disabled and that no IPSec policies are assigned. You need to ensure that you can establish Remote Desktop connections to Server1. What should you do?()A、From Windows Firewall, enable the Remote Desktop exception.B、From Terminal Services Manager, modify the RDP-TCP settings.C、From the properties of NIC1, modify Internet Protocol (TCP/IP) settings.D、From Windows Explorer, modify the %systemroot%/system32/drivers/etc/services file.

You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?() A、From the Device Manager, open the wireless network adapter properties and click Advanced. B、From the Device Manager, right-click the wireless network adapter and click Scan for hardware changes. C、From the Wireless Network Connection Properties, select View Wireless Networks. D、From the Wireless Network Connection Properties, click Change Advanced Settings. From the Wireless Networks tab, select Add a preferred network.

Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server.  Which type of connection should you configure? ()A、IPSECB、L2TPC、PPTPD、SSTP

You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()A、You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.B、You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.C、You should recommend that Windows Remote Management (WinRM) over SSL be used.D、You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.

You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. The company has many remote users One of the servers on the network calledServer01 has the Terminal Services Gateway (TS Gateway) role installed on it. The remote users of thecompany need to connect remotely to desktop computers located in their offices through the gateway. Toensure secure connection to the gateway, you created a security group named RemoteUsersGrp1 for theremote users who need to connect to computers in their offices. Which of the following options would youchoose to enable the remote users to connect to the TS Gateway? ()A、Create a resource authorization policy.B、Create a client authorization policy.C、Create a Group Policy object enable the Set TS Gateway authentication method properties to Ask forcredentials,use Basic protocol.D、Add the RemoteUsersGrp1 security group and enable Device redirection.

You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()A、Select L2TP/IPSec on each Windows Mobilebased device.B、Obtain and install a certificate on each Windows Mobilebased device.C、Configure the appropriate pre-shared key on each Windows Mobilebased device.D、Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.

You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003, and all are members of the domain. All client computers run Windows XP Professional. Five Web servers host the content for the internal network. Each one runs IIS and has Remote Desktop connections enabled. Web developers are frequently required to update content on the Web servers. You need to ensure that the Web developers can use Remote Desktop Connection to transfer Web documents from their client computers to the five Web servers. What should you do? ()A、Install the Terminal Server option on all five Web servers. Use Terminal Services Configuration Manager to modify the session directory setting.B、Install the Terminal Server option on all five Web servers. Use Terminal Services Configuration Manager to create a new Microsoft RDP 5.2 connection.C、On each Web developer's client computer, select the Disk Drives check box in the properties of Remote Desktop Connection.D、On each Web developer's client computer, select the Allow users to connect remotely to this computer check box in the System Properties dialog box.

单选题The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()AThe local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/IP) installed and configured. BThe remote host must support NFS. CThe remote host must have an NFS exported directory defined such that the local host has read and write permissions to the dump file on the remote host. DThe remote host can be the same as the local host.

单选题Which routing method is used to determine the forwarding paths for IP traffic in a Secure Cisco Single-Site Network foundation solution with remote teleworkers?()ARIPBEIGRPCOSPFDStatic and default routes

单选题You have just configured a static default route on router TK1. What is the purpose of a default route?()AIt is a route to be used when the routing protocol fails.BIt is a route configured by an ISP that sends traffic into a corporate network.CIt is a route used when a packet is destined for a remote network that is not listed in the routing table.DIt is a route manually configured for a specific remote network for which a routing protocol is not configured.EIt is used to send traffic to a stub network.

单选题Refer to the exhibit.What is the effect of the configuration that is shown?()AIt tells the router or switch to try establish an SSH connection first and if that fail to use telnet.BIt configures a cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.CIt allows seven failed login attempts before the VTY lines are temporarily shutdown.DIt configures the virtual terminal lines with the password 030752180500.EIt configures SSH globally for all logins.

单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. Terminal Services is installed on a member server named Terminal1 with default settings. Users in the editing department are members of a group named Editors. When these users try to make a Terminal Services connection to Terminal1, they receive the following error message: "The local policy of this system does not permit you to logon interactively". You need to enable members of the Editors group to establish Terminal Services sessions on Terminal1. What should you do?()AEnable the Allow users to connect remotely to this computer option on Terminal1.BAdd the Editors group to the Remote Desktop Users group on Terminal1.CConfigure the RDP-Tcp connection properties on Terminal1 to assign the Allow - Full Control permission to the Editors group.DAdd the Editors group to the Remote Desktop Users group in Active Directory.

单选题Your network consists of a single Active Directory domain. Remote Assistance is enabled on all computers. You need to ensure that you can establish Remote Assistance connections to all computers without a Remote Assistance invitation. Which group policy setting should you configure? ()AOffer Remote AssistanceBSolicited Remote AssistanceCAllow users to connect remotely using Terminal ServicesDSets rules for remote control of Terminal Services user sessions

单选题You have a terminal server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Windows Firewall is disabled on Server1. Server1 has two network adapters named NIC1 and NIC2. Both network adapters are connected to the same network segment. The IP address for NIC1 is 192.168.1.11. The IP address for NIC2 is 192.168.1.12. You regularly connect to Server1 by using Remote Desktop Connection. The NIC1 network adapter fails. You attempt to establish a Remote Desktop connection to 192.168.1.12, but the connection fails. You successfully connect to 192.168.1.12 by using Windows Explorer. You verify that IP filtering is disabled and that no IPSec policies are assigned. You need to ensure that you can establish Remote Desktop connections to Server1. What should you do?()AFrom Windows Firewall, enable the Remote Desktop exception.BFrom Terminal Services Manager, modify the RDP-TCP settings.CFrom the properties of NIC1, modify Internet Protocol (TCP/IP) settings.DFrom Windows Explorer, modify the %systemroot%/system32/drivers/etc/services file.

单选题Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()AARPBSSHCTelnetDWEPESNMPv1FSNMPv2

单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()AVLANBPeer to PeerCVTPDVPN