Configure roles based on departments and assign access based on source IP address.
Configure roles based on the user's manager and assign access based on the user's MAC address
Configure roles based on group memberships and assign a specific VLAN to the role.
Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.
第1题:
A.The network administrator can apply port security to dynamic access ports
B.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D.The network administrator can apply port security to EtherChannels.
E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
第2题:
You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()
第3题:
A network administrator needs to configure port security on a switch.which two statements are true?()
第4题:
A WebSphere Commerce administrator is attempting to invalidate a cached servlet. Which course of action would NOT accomplish this goal?()
第5题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
第6题:
You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication. What supported authentication server should be chosen?()
第7题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第8题:
You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()
第9题:
You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals: • Enable users in both departments to access their own files from the network • Enable users in the Accounting department to view the Legal department’s documents • Prevent users in the Legal department from being able to view the Accounting department’s documents • Enable managers within the company to access and modify both the Accounting and the Legal department’s files You take the following actions: • Create two shared folders named Accounting and Legal • Create three groups named Accounting, Legal, and Management • Allow the Accounting group Modify permission on the Accounting folder • Allow the Accounting group Read permissions on the Legal folders. • Allow the Management group Modify permission on both the Accounting and Legal folders. Which result or results do these actions produce?()
第10题:
Default gateway
The ports on the switch
Port security on the servers switch port
Ethernet cable
第11题:
Configure roles based on departments and assign access based on source IP address.
Configure roles based on the user's manager and assign access based on the user's MAC address
Configure roles based on group memberships and assign a specific VLAN to the role.
Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.
第12题:
Use any Windows 2000 to graphically access the HMC
Load, install, and configure WebSM on the workstation
Telnet to the HMC using Exceed or a GUI emulator product from the workstation
Load, install, and configure OpenSSH or SSH on the workstation and access the HMC through the GUI interface
第13题:
A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge()。
A.Establish a direct link from the switch to all other switches in the network.
B.Assign the switch a higher MAC address than the other switches in the network have.
C.Configure the switch so that it has a lower priority than other switches in the network.
D.Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.
E.Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.
第14题:
Why would a network administrator configure port security on a switch?()
第15题:
You are preparing to install an operating system on virtual machines (VMs) in a Hyper-V environment. You need to configure each VM so that you can perform a network-based operating system installation. What should you do for each VM?()
第16题:
A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()
第17题:
The network administrator wants to enable an EtherChannel between two switches in "on" mode. The administrator connects the cables and enables the interfaces, but while configuring the EtherChannel in the first switch,a spanning-tree loop was detected. Which two of these procedures can avoid this problem?()
第18题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第19题:
A system administrator wants to control the HMC from their workstation. Microsoft Windows 2000 is running and the HMC graphical user interface is being used remotely. Which of the following actions will accomplish this task?()
第20题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You create and share a folder named Sales on a member server. You apply the default share permission and NTFS permissions to Sales. Then you create a folder named SalesForecast in Sales. You apply the default NTFS permissions to SalesForecast. Managers in the sales department are members of a domain user group named SalesManagers. When members of SalesManagers try to add files to SalesForecast,they receive the "Access is denied" error message. You need to configure permissions on these folders to fulfil the following requirements: 1. Members of SalesManagers must be able to create, modify, and delete files in both folders. 2. All other domain users must only be able to read files in both folders. What should you do?()
第21题:
TACACS with LEAP extensions
RADIUS with EAP extensions
TACACS+
LDAP
第22题:
BPDU
Port security
RSTP
STP
VTP
Blocking mode
第23题:
Create a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
Configure a wired adapter and assign the required SSID under User Roles > Agent > Odyssey Settings.
Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
Create a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
第24题:
Create a duplicate of the User certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Configure the Default Domain Policy Group Policy object (GPO) to autoenroll users for certificates.
Create a duplicate of the Computer certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Configure the Default Domain Policy Group Policy object (GPO) to autoenroll computers for certificates.
Create a duplicate of the User certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Create a new Group Policy object (GPO) and link it to the Sales OU. Configure the GPO to autoenroll sales users for certificates.
Create a duplicate of the Computer certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Create a new Group Policy object (GPO) and link it to the Sales OU. Configure the GPO to autoenroll sales client computers for certificates.