Telnet
FTP
SIP
TLS
第1题:
Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
A.transmitting devices
B.transmitted devices
C.receiving devices
D.received devices
第2题:
A. Enable file and print share
B. FTP
C. VPN
D. Map a drive
第3题:
A、telnet
B、ftp
C、http
D、udp
第4题:
第5题:
第6题:
在TCP/IP协议中,远程登录使用的是()协议。
第7题:
Which is the main difference between host-based and network-based intrusion prevention?()
第8题:
TCP/IP协议族中包括上百个互为关联的协议,其中能够提供远程文件传输的协议为()。
第9题:
Which of the following protocols is commonly used for VoIP technology?()
第10题:
You need to evaluate whether the currently available network bandwidth is adequate to run NewApp. Which three actions should you perform?()
第11题:
Create a heartbeat network over disks
Define all boot addresses as IP aliases
Define all IP addresses in the same network subnet
Define all boot, service and persistent addresses as IP aliases when using IPAT via replacement
第12题:
Deactivate all LM and NTLM authentication methods on FSS1 server
Use IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folder
Use IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.
Use the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
Activate offline files for the confidential files that are stored on the FSS1 server. In the Folder avanced Properties box, select the Encrypt contents to secure data optiion
第13题:
A.Telnet
B.FTP
C.SIP
D.TLS
第14题:
Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
A.transmitting devices
B.transmitted devices
C.receiving devices
D.received devices
第15题:
An IP ( ) is a unique number the computer uses to identify itself, and to be identified over a network.
A.address
B.device
C.point
D.data
第16题:
第17题:
Ensuring that data is transmitted securely over an IP network is the main purpose of:()
第18题:
You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()
第19题:
Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()
第20题:
TCP/IP协议中用来访问WWW服务器上网页的是()
第21题:
You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet. The company’s written security policy includes the following requirements for VPN connections over the Internet: All data must be encrypted with end-to-end encryption. VPN connection authentication must be at the computer level. Credential information must not be transmitted over the Internet as part of the authentication process. You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy. What should you do? ()
第22题:
Encryption
Bandwidth limits
Minimal signal loss
No EMI
第23题:
Use a PPTP connection with EAP-TLS authentication.
Use a PPTP connection with MS-CHAP v2 authentication.
Use an L2TP connection with EAP-TLS authentication.
Use an L2TP connection with MS-CHAP v2 authentication.
第24题:
Telnet
FTP
SIP
TLS