Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()
A.Configure a Windows Connect Now Group Policy.
B.Configure a Wireless Network (IEEE 802.11) Policy.
C.Delete the rogue network from the Network and Sharing Center on each computer.
D.Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.
第1题:
Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network.What should you do?()
A.A
B.B
C.C
D.D
第2题:
Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network. What should you do?()
第3题:
The Cisco Unified Wireless Network minimizes the TCO and maximizes woreless network uptime by optimizing which two deployment, management, and security features?()
第4题:
Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()
第5题:
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling. You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home. What are two possible ways to achieve this goal?()
第6题:
You share your computer with a co-worker by using separate user accounts to log on. Your co-worker modifies the wireless network properties. When you use the computer, the change in properties is not reflected. You need to ensure that you can view all the changes made to the wireless network properties. What should you do?()
第7题:
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()
第8题:
You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?()
第9题:
When you configure access to the wired network at home, set the wired network adapter location type to Public.
When you configure access to the wired network at home, set the wired network adapter location type to Private.
When you configure access to the public wireless access points, set the wireless network adapter location type to Public.
When you configure access to the public wireless access points, set the wireless network adapter location type to Private.
第10题:
Set the security type to the No authentication (Open) option.
Configure the wired and wireless network adapters as a network bridge.
Modify the wireless network profile type to the Use all-user profiles only (recommended) option.
On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.
第11题:
Persistent session
Dynamic evaluation
Roaming session
Browser request follow-through
第12题:
Right-click and click the Diagnose option in the Connect to a network window.
Set the security type value to No authentication in the wireless network properties dialog box.
Click the Manually connect to a wireless network option in the Set up a connection or network window.
In the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.
Configure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.
第13题:
You connect your computer to a wireless network. You discover that this new connection fails to show in the Connect to a network window.You need to view this connection in the Connect to a network window.What should you do?()
A.A
B.B
C.C
D.D
第14题:
Which two statement best describes the Cisco Unified Wireless Network? ()
第15题:
The Cisco Unified Wireless Network minimizes the TCO and maximizes wireless network uptimeby optimizing which two deployment, management, and security features?()
第16题:
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()
第17题:
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
第18题:
Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site. The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network. You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server. What should you include in the plan?()
第19题:
Your computer uses both wired and wireless network connections. The networks are not connected to each other. You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network. What should you do?()
第20题:
Disable the Connect even if the network is not broadcasting option.
In the Network and Sharing Center window, click the Diagnose and repair option.
Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.
第21题:
Execute gpupdate/target:computer command at the command prompt on laptop computers
Execute Add a network command and leave the SSID (service set identifier) blank
Execute gpupdate/boot command at the command prompt on laptops computers
Connect each laptop computer to a wired network and log off the laptop computer and then login again.
None of the above
第22题:
Use Windows Explorer to receive the offline files
Using the Windows Explorer, disable the cache for the reports on the network share
Use the Windows NT explorer to grant the special access for the reports on the network share
Use the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
第23题:
Configure a Windows Connect Now Group Policy.
Configure a Wireless Network (IEEE 802.11) Policy.
Delete the rogue network from the Network and Sharing Center on each computer.
Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.
第24题:
Configure the network category of your wireless network connection to Private.
Configure the network category of your wireless network connection to Public.
Configure the TCP/IP packet filtering on the wireless network connection.
Configure the wireless network connection with the appropriate authentication to the router.