niusouti.com

As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()A.access-list 101 inB.access-li

题目

As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()

A.access-list 101 in

B.access-list 101 out

C.ip access-group 101 in

D.ip access-group 101 out


相似考题
更多“As a network administrator, you have been instructed to prevent all traffic originating on ”相关问题
  • 第1题:

    You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()

    • A、It resembles a Layer 2 bridge.
    • B、Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
    • C、Inline interfaces which have no IP addresses cannot be detected.
    • D、Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

    正确答案:A,C

  • 第2题:

    A System p administrator has been instructed to verify that all filesets have all required requisitesand are completely installed. Which of the following commands will provide this information()

    • A、lslpp
    • B、lppchk
    • C、geninstall
    • D、installp

    正确答案:B

  • 第3题:

    You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. You have been instructed to make sure that a server, named ABC-SR07, is configured to be managed remotely from ABC-SR01 using Server Manager.Which of the following is not a valid option to take?()

    • A、You could access the server manager on ABC-SR01.
    • B、You could access the server manager on ABC-SR13.
    • C、You could run the %windir%/system32/Configure-SMRemoting.exe from n elevated command prompt on ABC-SR13.
    • D、You could run the Configure-SMRemoting.exe –enable cmdlet on ABC-SR01.

    正确答案:A,D

  • 第4题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()

    • A、 On one node, run the nlb.exe reload command.
    • B、 On each node, run the wlbs.exe drainstop command.
    • C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.
    • D、 Use Network Load Balancing Manager to add a second cluster IP address.

    正确答案:C

  • 第5题:

    You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com.  All servers on the ABC.com network have Windows Server 2012 R2 installed and all client computers have Windows 8 installed. The ABC.com network contains a domain controller named ABC_DC01. You want to run the ping ABC_dc01.ABC.com command from a client computer named ABC_WS27.How would you accomplish this?()

    • A、You should configure the firewall on ABC_DC01 to allow inbound ICMP traffic.
    • B、You should run the dcdiag /v command on ABC_DC01.
    • C、You should run the netdiag /v command on ABC_WS27.
    • D、You should configure the firewall on ABC_Ws27 to allow inbound ICMP traffic.

    正确答案:A

  • 第6题:

    多选题
    You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.  You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature.  Which of the following is TRUE with regards to Windows Firewall with Advanced Security?()
    A

    It provides host-based,two-way network traffic filtering for a computer.

    B

    It provides host-based,one-way network traffic filtering for a computer.

    C

    It blocks unauthorized network traffic flowing into or out of the local computer.

    D

    It only blocks unauthorized network traffic flowing into the local computer.

    E

    It only blocks unauthorized network traffic flowing out of the local computer.


    正确答案: C,D
    解析: 暂无解析

  • 第7题:

    多选题
    You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing NIC Teaming.Which of the following is TRUE with regards to NIC Teaming?()
    A

    It allows for traffic failover to prevent connectivity loss if a network component fails.

    B

    It prevents bandwidth aggregation.

    C

    The Windows Server 2012 R2 implementation of NIC Teaming supports a maximum of 5 NICs in a team.

    D

    The Windows Server 2012 R2 implementation of NIC Teaming supports a maximum of 32 NICs in a team.


    正确答案: C,B
    解析: 暂无解析

  • 第8题:

    单选题
    You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to modify the name of the local Administrator account on all ABC.com workstations. You want to achieve this using as little administrative effort as possible. Which of the following actions should you take?()
    A

    You should consider configuring the Security Options settings via the Group Policy Management Console (GPMC).

    B

    You should consider configuring the Security Options settings via Server Manager.

    C

    You should consider configuring the replication settings.

    D

    You should consider navigating to Local Users and Groups via Computer Management on each workstation.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()
    A

    Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.

    B

    Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.

    C

    Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.

    D

    Create a Pattern Match capture trigger for the 131.107.0.1 IP address.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    A system administrator has been instructed to verify that all filesets have all required requisites and are completely installed. Which command will provide this information?()
    A

    lslpp

    B

    lppchk

    C

    instfix

    D

    installp


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    You are using VTP version 2 in your network to transport VLAN information between switches. When adding a switch to the network that has been used in the lab previously, you notice that a lot of the existingVLANs have been deleted or replaced with other names. What can you do to prevent this from happeningin the future, without losing all VTP features that you are using today?()
    A

    configure a hard-to-guess VTP domain name

    B

    use a hard-to-guess VTP password

    C

    use VTP transparent mode

    D

    implement VTP version 3


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()
    A

    Upgrade the switches

    B

    Configure BPDU guard

    C

    Configure VLAN access lists

    D

    Configure port security

    E

    Configure Dynamic ARP inspection


    正确答案: D
    解析: 暂无解析

  • 第13题:

    As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()

    • A、access-list 101 in
    • B、access-list 101 out
    • C、ip access-group 101 in
    • D、ip access-group 101 out

    正确答案:C

  • 第14题:

    You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()

    • A、/24
    • B、/26
    • C、/27
    • D、/28

    正确答案:C

  • 第15题:

    You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to add a new domain controller to ABC.com’s existing environment. Which of the following actions should you take?()

    • A、You should consider making use of Server Manager.
    • B、You should consider making use of Authorization Manager.
    • C、You should consider making use of Remote Desktop Gateway Manager.
    • D、You should consider making use of Network Load Balancing Manager.

    正确答案:A

  • 第16题:

    You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to modify the name of the local Administrator account on all ABC.com workstations. You want to achieve this using as little administrative effort as possible. Which of the following actions should you take?()

    • A、You should consider configuring the Security Options settings via the Group Policy Management Console (GPMC).
    • B、You should consider configuring the Security Options settings via Server Manager.
    • C、You should consider configuring the replication settings.
    • D、You should consider navigating to Local Users and Groups via Computer Management on each workstation.

    正确答案:A

  • 第17题:

    You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to make sure that ABC.com users are not able to install a Windows Store application. You then create a rule for packaged apps.  Which of the following is the rule based on?()

    • A、The publisher of the package.
    • B、The publisher of the application.
    • C、The name of the package
    • D、The name of the application
    • E、The package version.
    • F、The application version.

    正确答案:A,C,E

  • 第18题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()
    A

    Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.

    B

    Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.

    C

    Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.

    D

    Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    You are the network administrator for Company.  You have been assigned the task to upgrade the 23 Windows NT Workstation 4.0 computers in the accounting department to Windows 2000 Professional. Users in the accounting department run a peer-to-peer financial and credit application on their computers. The application requires that information is passed between the accounting department computers over the network. You upgrade all the computers and configure them to have the default security settings. You want to ensure that network traffic between accounting computers is secure. What should you do? ()
    A

    Disable NetBIOS over TCP/IP on the accounting department computers.

    B

    Apply the Hisecws.inf security template to the local security policy on the accounting department computers.

    C

    Enable the Encrypting File System (EFS) on all files used by the financial and credit application on the accounting department computers.

    D

    Configure port filters for each port used by the financial and credit application on the accounting department computers.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    多选题
    You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to make sure that ABC.com users are not able to install a Windows Store application. You then create a rule for packaged apps.  Which of the following is the rule based on?()
    A

    The publisher of the package.

    B

    The publisher of the application.

    C

    The name of the package

    D

    The name of the application

    E

    The package version.

    F

    The application version.


    正确答案: A,D
    解析: 暂无解析

  • 第21题:

    单选题
    You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to add a new domain controller to ABC.com’s existing environment. Which of the following actions should you take?()
    A

    You should consider making use of Server Manager.

    B

    You should consider making use of Authorization Manager.

    C

    You should consider making use of Remote Desktop Gateway Manager.

    D

    You should consider making use of Network Load Balancing Manager.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()
    A

    It resembles a Layer 2 bridge.

    B

    Traffic flow through the IPS resembles traffic flow through a Layer 3 router.

    C

    Inline interfaces which have no IP addresses cannot be detected.

    D

    Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    单选题
    You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()
    A

    The SetupUser profile

    B

    The Default User profile

    C

    The Administrator profile

    D

    The System profile

    E

    The All Users profile


    正确答案: C
    解析: 暂无解析