多选题You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. Inorder to accomplish this, which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?()A083 Tunnel-PreferenceB066 Tunnel-Client-EndpointC064 Tunnel-TypeD082 Tunnel-Assignment-IDE081 Tunnel-Private-Group-IDF067 Tunnel-Server-Endpoint
多选题
You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. Inorder to accomplish this, which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?()
A
083 Tunnel-Preference
B
066 Tunnel-Client-Endpoint
C
064 Tunnel-Type
D
082 Tunnel-Assignment-ID
E
081 Tunnel-Private-Group-ID
F
067 Tunnel-Server-Endpoint
参考解析
解析:
暂无解析
相关考题:
You are creating a mobile Web Form that dynamically displays news items. You want to display news items by using an instance of a mobile TextView control named TextViewNews. You need to configure the Web Form that contains TextViewNews. The Web Form must enable pagination in casea users device does not display the full text of a news item.Which code segment should you use? ()A.B.C.D.
You are the administrator of a Windows 2000 Server computer named Ezonexam1. A printer named PrinterColor is configured on Ezonexam1.You want to allow only users in the Administrators group and users in the Managers group to print to PrinterColor. You also want to allow users in the Managers group to pause and resume their print jobs, and you want to ensure that users in the Administrators group have full control permission for PrinterColor.What should you do?To answer, click the Simulation button and then perform. the appropriate actions in the simulation of the Printers folder.
All network servers run Windows Server 2003, and all client computers run Windows XP Professional.Sandra, the manager of the human resources department, asks you to create a shared folder named HRDrop.You create a HRDrop folder on a member server. You assign the Allow - Full Control share permission to the Everyone group.Now you need to configure the NTFS permissions on HRDrop to fulfil the following requirements:1. Sandra must be able to read, modify, change permissions on, and delete all files and subfolders in HRDrop.2. All other domain users must only be able to add new files to HRDrop.What should you do?()A. Assign the Allow - Modify permission to Sandra. Assign the Allow - Read permission to the Users group.B. Assign the Allow - Full Control permission to Sandra. Assign the Allow - Write permission and the Deny - Read and Execute permission to the Users group.C. Assign the Allow - Modify permission to Sandra. Assign the Allow - List Folder permission to the Users group.D. Assign the Allow - Full Control permission to Sandra. Assign the Allow - Read permission to the Users group.E. Assign the Allow - Full Control permission to Sandra. Assign the Allow - Write permission to the Users group and remove the Read and Execute permissions to the Users group.
You are the network administrator for All network servers run Windows Server 2003. All client computers run Windows XP Professional.You create a folder on thet network and share it as TestKingDocs. You want users to be able to read, create, and modify documents that are stored in the shared folder. You also want users to be able to delete the folders and the files that they create.A user reports that another used deleted a folder that she created. You discover that the Everyone group ias assigned the Allow - Full Control NTFS permission for the folder. You remove all assigned permissions for the Everyone group.You need to configure permission for the TestKingDocs shared folder to meet your requirements. You also need to ensure that users cannot delete the folders and files that other users create.Which two actions should you perform ()(Each correct answer presents part of the solution. Choose two.)A. Assign the Authenticated Users group the Allow - Read Execute permission.B. Assign the Anonymous group the Allow - Modify permission.C. Assign the Creator Owner group the Allow - Modify permission.D. Assign the Creator Owner group the Allow - Full Control permission
Refer to the exhibit. Users complain that they intermittently lose data and connections to important servers. After investigation, you discover that the 802.1Q trunk between DSW111 and ASW1 is down.Even though the HSRP group 11 is being serviced by DSW112, you discover that the SVI for VLAN 11 is in the up state on DSW111.Which three Cisco Catalyst IOS commands should you use on DSW111 to find the source of this problem? ()(Choose three.)A. show vtp statusB. show interfaces vlan 11C. show standby vlan 11 briefD. show spanning-tree vlan 11E. show interfacesmod/port trunk
What is the purpose of the cisco Vlan Trunking protocol?() A. to provide a mechanism to dynamically assign vlan membership to switch portsB. to allow traffic to be carried from multiple vlans over a single link between switchesC. to allow native vlan information to be carried over a trunk linkD. to provide a mechanism to manually assign vlan membership to switch portsE. to allow for managing the additions,deletions,and changes of vlans between switchs
You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. In order toaccomplish this,which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?()A、064 Tunnel-TypeB、066 Tunnel-Client-EndpointC、067 Tunnel-Server-EndpointD、081 Tunnel-Private-Group-IDE、082 Tunnel-Assignment-ID
You need to share a financial spreadsheet with other employees of your company. The material is of a sensitive nature and you want to prevent the ability of users to use offline caching. How do you do this?()A、Assign Special Permissions.B、Select Shared folder properties, caching, deselect “Allow Caching”.C、Select Manual Caching for Documents.D、Select Manual Caching for Programs.
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()A、You should assign the network 172.16.0.0/16.B、You should assign the network 172.16.0.0/17.C、You should assign the network 172.16.0.0/18.D、You should assign the network 172.16.0.0/19.E、You should assign the network 172.16.0.0/20.F、You should assign the network 172.16.0.0/22.
Which three of these statements about Dynamic Trunking Protocol are correct?()A、It supports autonegotiation for both ISL and IEEE 802.1Q trunks.B、It must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.C、It is a point-to-multipoint protocol.D、It is a point-to-point protocol.E、It is not supported on private VLAN ports or tunneling ports.
You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. Inorder to accomplish this, which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?()A、083 Tunnel-PreferenceB、066 Tunnel-Client-EndpointC、064 Tunnel-TypeD、082 Tunnel-Assignment-IDE、081 Tunnel-Private-Group-IDF、067 Tunnel-Server-Endpoint
What is the purpose of the cisco Vlan Trunking protocol?()A、to provide a mechanism to dynamically assign vlan membership to switch portsB、to allow traffic to be carried from multiple vlans over a single link between switchesC、to allow native vlan information to be carried over a trunk linkD、to provide a mechanism to manually assign vlan membership to switch portsE、to allow for managing the additions,deletions,and changes of vlans between switchs
You have created a resource plan, DB_PLAN, using DBMS_RESOURCE_MANAGER.CREATE_SIMPLE_PLAN and you want to impose a restriction on utilization of resources by the database users. Which step must be performed before you can start using the resource plan?()A、assign users to consumer groupsB、set the resource plan for the instanceC、configure a simple resource plan and specify plan directivesD、configure a complex resource plan and specify plan directives
You work as a database administrator for Supportcenter.cn. You find that users with DBA role are using more CPU resources than what is allocated in their profiles. Which action would you take to ensure that resources limits are imposed on these users?()A、Assign the DEFAULT profile to the usersB、Set the RESOURCE_LIMIT parameter to TRUE in the parameter fileC、Create a new profile with CPU restrictions and assign it to the usersD、Specify the users as members of the DEFAULT_CONSUMER_GROUPE、Revoke the DBA role and grant CONNECT and RESOURCE role to the users
TS1 is a server running Windows Server 2008 and Terminal Services. Users in your organization connectto the server TS1 to run a line-of-business application. Recently, you have noticed that user profiles arethreatening to consume the total disk capacity on TS1. You want users to be able to save their own data,but you also want to prevent profiles from exhausting the total storage capacity of the disk on TS1. Whatshould you do?()A、Use Group Policy to assign mandatory profiles to users who connect to TS1.B、Configure disk quotas for the disk on TS1 on which user profiles are stored.C、Use Group Policy to assign Terminal Services roaming user profiles to users who connect to TS1.D、Configure disk quotas for the local disk of each user who connects to TS1.
Your network consists of a single Active Directory domain. All network servers run Windows Server 2003 Service Pack 2 (SP2). You create a folder named CorporateData. You share the folder as CorpData and assign the Change permission to the Domain Users group. In the CorporateData folder, you create a folder named HumanResources. On the HumanResources folder, you assign the Modify permission to a global group named HRUsers. You share the HumanResources folder as HRData. You confirm that all users in the domain can view the files in the HRData share. You need to ensure that only HRUsers and administrators can access files in the HRData share. The solution must maintain user access to the CorpData share. What should you do? ()A、On the CorpData share, assign the Read permission to Domain Users.B、On the CorpData share, remove Domain Users and assign the Change permission to HRUsers.C、On the CorporateData folder, disable permission inheritance and remove the inherited permissions.D、On the HumanResources folder, disable permission inheritance and remove the inherited permissions.
You have Active Directory Certificate Services (AD CS) deployed. You create a custom certificate template. You need to ensure that all of the users in the domain automatically enroll for a certificate based on the custom certificate template. Which two actions should you perform()A、In a Group Policy object (GPO), configure the autoenrollment settingsB、In a Group Policy object (GPO), configure the Automatic Certificate Request Settings.C、On the certificate template, assign the Read and Autoenroll permission to the Authenticated Users group.D、On the certificate template, assign the Read, Enroll, and Autoenroll permission to the Domain Users group.
You are the administrator of an Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Filesrv1 contains confidential data that is only available to users in the human resources (HR) department. You want all computers in the HR department to connect to Filesrv1 by using an IPSec policy. You assign the Server (Request Security) IPSec policy to Filesrv1. Using Network Monitor, you notice that some computers in the HR department connect to Filesrv1 without using the IPSec policy. You need to configure Filesrv1 to ensure that all computers connect to it by using the IPSec policy. What should you do?()A、Assign the Secure Server(Require Security) IPSec policy.B、Assign the Client (Respond Only)IPSec policy.C、Unassign the Server(Request Security IPSec policy.D、Restart the IPSec Services service.
You have a computer that runs Windows XP Professional. You connect one local print device and install a printer. You share the printer. You need to give a user the ability to manage all new print jobs submitted to the printer. Your solution must prevent the user from installing additional local printers. What should you do?()A、In the printer properties, assign the Manage Printers permission to the user.B、In the printer properties, assign the Manage Documents permission to the user.C、From the Local Users and Groups snap-in, add the user to the Power Users group.D、From the Local Users and Groups snap-in, add the user to the Replicators group.
You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant users Special access for the reports on the network share.C、Use Windows Explorer to disable caching for the reports on the network share.D、Use Windows Explorer to disable Offline files.
You are the network administrator for The network consists of a single Active Directory domain named Some client computers run Windows NT 4.0 Workstation. Others run Windows 2000 Professional, and the rest run Windows XP Professional. Users in the accounting department require a shared folder for their own use only. The accounting users must be able to read, edit, and delete files in the shared folder. You create the shared folder and use default share permissions. You assign the Allow - Full Control NTFS permission to members of the Administrators group. You assign the Allow - Modify NTFS permission to the accounting users. However, accounting users report that they cannot access the shared folder. How should you solve this problem?()A、Change the type of setting on the folder to Documents (for any file types).B、Change the NTFS permissions on the folder to assign the Allow - Delete Sub-Folders and Files permission to the accounting users.C、Add the accounting users as owners of the folder.D、Change the share permissions to assign the Allow - Full Control permission to the accounting users.
单选题You are designing a Windows Server 2008 R2 Hyper-V environment. You need to be able to dynamically assign new storage to Windows virtual machines (VMs). What should you do?()AUse fixed virtual hard disks (VHDs)BInstall Hyper-V Integration Services on the VMsCInstall the VMs in Cluster Shared Volumes (CSVs)DUse dynamically expanding virtual hard disks (VHDs)
单选题All network servers run Windows Server 2003, and all client computers run Windows XP Professional. Sandra, the manager of the human resources department, asks you to create a shared folder named HRDrop. You create a HRDrop folder on a member server. You assign the Allow - Full Control share permission to the Everyone group. Now you need to configure the NTFS permissions on HRDrop to fulfil the following requirements: 1. Sandra must be able to read, modify, change permissions on, and delete all files and subfolders in HRDrop. 2. All other domain users must only be able to add new files to HRDrop. What should you do?()AAssign the Allow - Modify permission to Sandra. Assign the Allow - Read permission to the Users group.BAssign the Allow - Full Control permission to Sandra. Assign the Allow - Write permission and the Deny - Read and Execute permission to the Users group.CAssign the Allow - Modify permission to Sandra. Assign the Allow - List Folder permission to the Users group.DAssign the Allow - Full Control permission to Sandra. Assign the Allow - Read permission to the Users group.EAssign the Allow - Full Control permission to Sandra. Assign the Allow - Write permission to the Users group and remove the Read and Execute permissions to the Users group.
多选题You have Active Directory Certificate Services (AD CS) deployed. You create a custom certificate template. You need to ensure that all of the users in the domain automatically enroll for a certificate based on the custom certificate template. Which two actions should you perform()AIn a Group Policy object (GPO), configure the autoenrollment settingsBIn a Group Policy object (GPO), configure the Automatic Certificate Request Settings.COn the certificate template, assign the Read and Autoenroll permission to the Authenticated Users group.DOn the certificate template, assign the Read, Enroll, and Autoenroll permission to the Domain Users group.
单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network shareDUse the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
单选题You have created a resource plan, DB_PLAN, using DBMS_RESOURCE_MANAGER.CREATE_SIMPLE_PLAN and you want to impose a restriction on utilization of resources by the database users. Which step must be performed before you can start using the resource plan?()A assign users to consumer groupsB set the resource plan for the instanceC configure a simple resource plan and specify plan directivesD configure a complex resource plan and specify plan directives
多选题You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. Inorder to accomplish this. Which two IETF RADIUS attributes should you configure on the CiscoSecure ACS? ()A064 Tunnel-TypeB066 Tunnel-Client-EndpointC067 Tunnel-Server-EndpointD081 Tunnel-Private-Group-IDE082 Tunnel-Assignment-IDF083 Tunnel-Preference
单选题What is the purpose of the cisco Vlan Trunking protocol?()Ato provide a mechanism to dynamically assign vlan membership to switch portsBto allow traffic to be carried from multiple vlans over a single link between switchesCto allow native vlan information to be carried over a trunk linkDto provide a mechanism to manually assign vlan membership to switch portsEto allow for managing the additions,deletions,and changes of vlans between switchs