niusouti.com

The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees w

题目

The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()

  • A、802.1
  • B、Framerelay
  • C、HDLC
  • D、PPP
  • E、SLIP
  • F、PAP

相似考题
更多“The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees w”相关问题
  • 第1题:

    The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()

    A.802.1

    B.Framerelay

    C.HDLC

    D.PPP

    E.SLIP

    F.PAP


    参考答案:D

  • 第2题:

    Which technology is an example of the need for a designer to clearly define features and designedperformance when designing advanced WAN services with a service provider?()

    • A、 FHRP to remote branches.
    • B、 Layer 3 MPLS VPNs routing.
    • C、 Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.
    • D、 Intrusion prevention, QoS, and stateful firewall support network wide.

    正确答案:B

  • 第3题:

    Rate your level of proficiency with implementing, managing, and troubleshooting network protocols and services, including TCP/IP protocol, dial-up networking, Internet Information Services (IIS), remote desktop, and Internet connection firewalls.()

    • A、Very High
    • B、High
    • C、Moderate
    • D、Low
    • E、Very Low

    正确答案:A

  • 第4题:

    You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Three member servers are configured as terminal servers. All three host confidential data. Currently, all network users are full-time employees, and all network users are allowed to log on to the terminal servers. TestKing hires 25 temporary employees. You create a user account for each one. You need to ensure that only full-time employees are allowed to log on to the terminal servers. What should you do?()

    • A、Modify the Default Domain Group Policy object (GPO).Configure a computer-level policy to prevent the temporary employees from connecting to the terminal servers.
    • B、Modify the Default Domain Group Policy object (GPO). Enable the user-level Terminal Server setting Sets rules for remote control of Terminal Services user sessions.
    • C、On the Terminal Services Profile tab of the user properties for each account, disable the option to log on to terminal servers.
    • D、In the security policy for domain controllers, disable the computer-level Terminal Server setting Allow users to connect remotely using the terminal server.

    正确答案:C

  • 第5题:

    What are two reasons a network administrator would use CDP (Choose two.)()。

    • A、to verify the type of cable interconnecting two devices
    • B、to determine the status of network services on a remote device
    • C、to obtain VLAN information from directly connected switches
    • D、to verify Layer 2 connectivity between two devices when Layer 3 fails
    • E、to obtain the IP address of a connected device in order to telnet to the device
    • F、to determine the status of the routing protocols between directly connected routers

    正确答案:D,E

  • 第6题:

    What are two reasons a network administrator would use CDP?()

    • A、to verify the type of cable interconnecting two devices
    • B、to determine the status of network services on a remote device
    • C、to obtain VLAN information from directly connected switches
    • D、to verify Layer 2 connectivity between two devices when Layer 3 fails
    • E、to obtain the IP address of a connected device in order to telnet to the device
    • F、to determine the status of the routing protocols between directly connected routers

    正确答案:D,E

  • 第7题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()

    • A、 Configure the system event log to Do not overwrite.
    • B、 In IAS, in Remote Access Logging, enable the Authentication requests setting.
    • C、 Configure the Remote Access server to Log all events.
    • D、 Create a custom remote access policy and configure it for Authentication-Type.

    正确答案:B

  • 第8题:

    All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()

    • A、Configure the Network authentication (Shared mode) setting.
    • B、Apply a Wireless Network Policy to set the network type to WPA-PSK.
    • C、Apply a Wireless Network Policy to automatically connect to the company wireless network.
    • D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

    正确答案:D

  • 第9题:

    You are the network administrator for your company. The network consists of a single Active Directory domain.  The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP.   The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server.  You need to choose a secure authentication method.   What should you do? ()

    • A、 Use the authentication method of the default IPSec policies.
    • B、 Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.
    • C、 Create a custom IPSec policy and use certificate-based authentication.
    • D、 Create a custom IPSec policy and use preshared key authentication.
    • E、 Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.

    正确答案:C

  • 第10题:

    You are the network administrator for The network consists of a single Active Directory domain named A Windows Server 2003 computer named TestKing3 is configured as a member server in your domain. You install Terminal Services on TestKing3. You also install several legacy applications on TestKing3. Users report that they cannot run many of the legacy applications on TestKing3 through their Terminal Services sessions. You establish a Terminal Services session by using the Administrator account, and you verify that you can run the legacy applications. You need to ensure that users can run the legacy applications on TestKing3 while they are connected through Terminal Services. What should you do?()

    • A、Add all Terminal Services users to the domain Server Operators group.
    • B、Share the C:/Program Files folders on TestKing2. Assign the Domain Users group the Allow - Full Control share permissions.
    • C、Install Terminal Server Licensing Server on TestKing3.
    • D、Use Terminal Services Configuration to change the Permissions Compatibility setting.

    正确答案:D

  • 第11题:

    单选题
    The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()
    A

    802.1

    B

    Framerelay

    C

    HDLC

    D

    PPP

    E

    SLIP

    F

    PAP


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    You are the network administrator for TestKing. Your network consists of a single Active Directory domain. You manage a Terminal Server farm that includes five terminal servers and a Terminal Services Licensing server named testking9. All servers run Windows 2000 Server. There are 2,500 users who log on to the terminal servers to access a custom human resource (HR) application. You install Windows Server 2003 on a new server named testking10. Testking10 is configured with all default settings enabled. You install Terminal Services and the HR application on testking10. You instruct some users to access the HR application on testking10. Four months later, users report that they can no longer establish Terminal Services sessions to testking10. You verify that users can connect to the other terminal servers in your Terminal Server farm. You need to ensure that users can run the HR application on all terminal servers on the network. What should you do?()
    A

    On testking10, set the License Logging service to Automatic, and the start the service.

    B

    On testking10, install Terminal Service Licensing. Activate the Terminal Services Licensing server.

    C

    Install Windows Server 2003 on all domain controllers on the network.

    D

    Deactivate and activate Terminal Service Licensing on Testking9.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()

    • A、TestKing# show eigrp entries
    • B、TestKing# show protocols
    • C、TestKing# debug eigrp routes
    • D、TestKing# show ip route eigrp
    • E、TestKing# show route eigrp

    正确答案:D

  • 第14题:

    Company uses layer 3 switches in the Core of their network. Which method of Layer 3 switching  uses a forwarding information base (FIB)?()

    • A、Topology-based switching
    • B、Demand-based switching
    • C、Route caching
    • D、Flow-based switching
    • E、None of the other alternatives apply

    正确答案:A

  • 第15题:

    Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()

    • A、 Create an IPsec Enforcement Network policy
    • B、 Create an 802.1X enforcement network policy
    • C、 Create a wired network (IEEE 802.3) Group Policy
    • D、 Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy

    正确答案:A

  • 第16题:

    All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()

    • A、show CHAP authentication
    • B、show interface serial 0
    • C、debug PPP authentication
    • D、debug CHAP authentication
    • E、show PPP authentication CHAP

    正确答案:C

  • 第17题:

    pany is implementing 802.1X in order to increase network security. In the use of 802.1X   access control,  which three protocols are allowed through the switch port before authentication  takes place? ()

    • A、 EAP-over-LAN
    • B、 EAP MD5
    • C、 STP
    • D、 protocols not filtered by an ACL
    • E、 CDP
    • F、 TACACS+

    正确答案:A,C,E

  • 第18题:

    Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft   Online Responder on the internal network.   You need to recommend a secure method for Internet users to verify the validity of individual certificates.   The solution must minimize network bandwidth. What should you recommend?()

    • A、Deploy a subordinate CA on the perimeter network.
    • B、Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.
    • C、Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication  requests to a server on the internal network.
    • D、Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS  to redirect requests to the Online Responder on the internal network.

    正确答案:D

  • 第19题:

    You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TestKing17 hosts several shared folders. Users report that they receive an error message when they try to connect to the shared folders. The error message states: "No more connections can be made to this remote computer at this time because there are already as many connections as the computer can accept." How should you solve the problem?()

    • A、Add an additional network adapter to TestKing17. Configure a network bridge between the new network adapter and the original network adapter.
    • B、Purchase additional per-seat licenses for TestKing17. In Control Panel on TestKing17, run the Licensing application. Add the additional licenses to TestKing17.
    • C、Disable quota management on TestKing17.
    • D、In Active Directory Sites and Services, select the site that contains TestKing17. Add an additional Active Directory connection object to the domain controller for the site.

    正确答案:B

  • 第20题:

    Your network contains a single Active Directory domain. All domain controllers run Windows Server   2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches.   You need to recommend a strategy for network access that meets the following requirements:   èUsers are unable to bypass network access restrictions.   èOnly client computers that have up-to-date service packs installed can access the network.   èOnly client computers that have up-to-date anti-malware software installed can access the network.   What should you recommend?()

    • A、Implement Network Access Protection (NAP) that uses DHCP enforcement.
    • B、Implement Network Access Protection (NAP) that uses 802.1x enforcement.
    • C、Implement a Network Policy Server (NPS), and enable IPsec on the domain controllers.
    • D、Implement a Network Policy Server (NPS), and enable Remote Authentication Dial-In User Service  (RADIUS) authentication on the managed switches.

    正确答案:B

  • 第21题:

    You are the administrator of a Windows Server 2003 computer named TestKing3. TestKing3 has Terminal Services installed. TestKing3 connects to the Internet through a proxy server on the company network. Help desk employees periodically access custom web applications on the company network. You install IIS on TestKing3 with all the default settings. You need to ensure that help desk employees can access Terminal Services on TestKing3 from Internet Explorer 6.0. What should you do?()

    • A、Uninstall IIS and Terminal Services. Reinstall IIS, and then reinstall Terminal Services.
    • B、Configure the Internet Connection Firewall (ICF) to allow incoming ports 80 and 3389.
    • C、Create a new virtual directory named Tsweb.
    • D、Create a new web site named Tsweb.
    • E、Install Remote Desktop Web Connection

    正确答案:E

  • 第22题:

    多选题
    pany is implementing 802.1X in order to increase network security. In the use of 802.1X   access control,  which three protocols are allowed through the switch port before authentication  takes place? ()
    A

    EAP-over-LAN

    B

    EAP MD5

    C

    STP

    D

    protocols not filtered by an ACL

    E

    CDP

    F

    TACACS+


    正确答案: B,E
    解析: 暂无解析

  • 第23题:

    单选题
    Rate your level of proficiency with implementing, managing, and troubleshooting network protocols and services, including TCP/IP protocol, dial-up networking, Internet Information Services (IIS), remote desktop, and Internet connection firewalls.()
    A

    Very High

    B

    High

    C

    Moderate

    D

    Low

    E

    Very Low


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    Company uses layer 3 switches in the Core of their network. Which method of Layer 3 switching  uses a forwarding information base (FIB)?()
    A

    Topology-based switching

    B

    Demand-based switching

    C

    Route caching

    D

    Flow-based switching

    E

    None of the other alternatives apply


    正确答案: D
    解析: 暂无解析