The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()
第1题:
The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()
A.802.1
B.Framerelay
C.HDLC
D.PPP
E.SLIP
F.PAP
第2题:
Which technology is an example of the need for a designer to clearly define features and designedperformance when designing advanced WAN services with a service provider?()
第3题:
Rate your level of proficiency with implementing, managing, and troubleshooting network protocols and services, including TCP/IP protocol, dial-up networking, Internet Information Services (IIS), remote desktop, and Internet connection firewalls.()
第4题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Three member servers are configured as terminal servers. All three host confidential data. Currently, all network users are full-time employees, and all network users are allowed to log on to the terminal servers. TestKing hires 25 temporary employees. You create a user account for each one. You need to ensure that only full-time employees are allowed to log on to the terminal servers. What should you do?()
第5题:
What are two reasons a network administrator would use CDP (Choose two.)()。
第6题:
What are two reasons a network administrator would use CDP?()
第7题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()
第8题:
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()
第9题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP. The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server. You need to choose a secure authentication method. What should you do? ()
第10题:
You are the network administrator for The network consists of a single Active Directory domain named A Windows Server 2003 computer named TestKing3 is configured as a member server in your domain. You install Terminal Services on TestKing3. You also install several legacy applications on TestKing3. Users report that they cannot run many of the legacy applications on TestKing3 through their Terminal Services sessions. You establish a Terminal Services session by using the Administrator account, and you verify that you can run the legacy applications. You need to ensure that users can run the legacy applications on TestKing3 while they are connected through Terminal Services. What should you do?()
第11题:
802.1
Framerelay
HDLC
PPP
SLIP
PAP
第12题:
On testking10, set the License Logging service to Automatic, and the start the service.
On testking10, install Terminal Service Licensing. Activate the Terminal Services Licensing server.
Install Windows Server 2003 on all domain controllers on the network.
Deactivate and activate Terminal Service Licensing on Testking9.
第13题:
TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()
第14题:
Company uses layer 3 switches in the Core of their network. Which method of Layer 3 switching uses a forwarding information base (FIB)?()
第15题:
Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()
第16题:
All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()
第17题:
pany is implementing 802.1X in order to increase network security. In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? ()
第18题:
Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft Online Responder on the internal network. You need to recommend a secure method for Internet users to verify the validity of individual certificates. The solution must minimize network bandwidth. What should you recommend?()
第19题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TestKing17 hosts several shared folders. Users report that they receive an error message when they try to connect to the shared folders. The error message states: "No more connections can be made to this remote computer at this time because there are already as many connections as the computer can accept." How should you solve the problem?()
第20题:
Your network contains a single Active Directory domain. All domain controllers run Windows Server 2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches. You need to recommend a strategy for network access that meets the following requirements: èUsers are unable to bypass network access restrictions. èOnly client computers that have up-to-date service packs installed can access the network. èOnly client computers that have up-to-date anti-malware software installed can access the network. What should you recommend?()
第21题:
You are the administrator of a Windows Server 2003 computer named TestKing3. TestKing3 has Terminal Services installed. TestKing3 connects to the Internet through a proxy server on the company network. Help desk employees periodically access custom web applications on the company network. You install IIS on TestKing3 with all the default settings. You need to ensure that help desk employees can access Terminal Services on TestKing3 from Internet Explorer 6.0. What should you do?()
第22题:
EAP-over-LAN
EAP MD5
STP
protocols not filtered by an ACL
CDP
TACACS+
第23题:
Very High
High
Moderate
Low
Very Low
第24题:
Topology-based switching
Demand-based switching
Route caching
Flow-based switching
None of the other alternatives apply