第1题:
Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
A.transmitting devices
B.transmitted devices
C.receiving devices
D.received devices
第2题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()
A.A
B.B
C.C
D.D
第3题:
VPN connections allow users working at home or on the road to connect in a secure fashion to a ( ) corporate server using the routing infrastructure provided by a public internetwork (such as the Internet). From the user&39;s perspective, the VPN connection is a point-to-point connection between the user&39;s computer and a corporate ( ). The nature of the ( ) internetwork is irrelevant to the user because it appears as if the data is being sent over a dedicated ( ) link. VPN technology also allows a corporation to connect to branch offices or to other companies over a public internetwork, while maintaining secure ( ). The VPN connection across the Internet logically operates as a wide area network link between the sites.
A.customer B.network C.remote D.local A.router B.client C.host D.server A.medium B.intermediate C.remote D.local A.network B.private C.public D.local A.technology B.server C.host D.communications
第4题:
You have a computer that runs Windows 7. You connect to your company s network by using a VPNconnection. You discover that when you establish the VPN connection, you are unable to access InternetWeb sites. When you disconnect the VPN connection, you can access Internet Web sites. You need toaccess Internet Web sites while you are connected to the VPN. What should you do?()
第5题:
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
第6题:
You need to design a solution so that users in the retail outlets can access their e-mail on the Exchange 2003 servers. What should you do?()
第7题:
You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet. What must you do so that you can access the Internet?()
第8题:
Select the Internal only connection type.
Select the Private virtual machine network connection type.
Select the Allow management operating system to share this network adapter check box.
Clear the Allow management operating system to share this network adapter check box.
第9题:
Reconfigure the dial-up connection to dial-up to a private network.
Create another connection that uses a virtual private network (VPN) to connect to a privatenetwork though the Internet.
Configure Internet Explorer to automatically detect proxy settings.
Configure Internet Explorer to dial whenever a network connection is not present.
第10题:
Reconfigure the dial-up connection to dial-up to a private network.
Create another connection that uses a virtual private network (VPN) to connect a private network though the Internet.
Configure Internet Explorer to automatically detect proxy settings.
Configure Internet Explorer to dial whenever a network connection is not present.
第11题:
Change the Internet Connection interface type to Basic firewall only.
Change the Internet Connection interface type to Private interface connected to private network.
Add Local Area Connection as a new interface for the NAT protocol and set the interface as a Public interface connected to the Internet.
Add Local Area Connection as a new interface for the NAT protocol and set the new interface as a Private interface connected to private network.
第12题:
The encrypted file will automatically be decrypted.
Encrypted files and folders cannot be moved or copied, decrypt it first then move or copy thefile or folder.
The encrypted file will remain encrypted in the Windows 2000 folder.
The encrypted file will inherit the encryption state of the remote NTFS folder.
第13题:
Network managers have long awaited practical voice-over-IP(VOIP)solutions. VOIP promises(71)network management and decreases costs by(72)a company's telephony and data infrastructures into one network. And a VOIP solution implemented at a company' s head -quarters with far -reaching branch offices can(73)tremendous amounts of(74)in long distance phone bills, provided that solution delivers POTS -like voice(75)over the Internet.
A.complicated
B.useful
C.ease
D.orderly
第14题:
You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()
A.A
B.B
C.C
D.D
第15题:
第16题:
Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network. What should you do?()
第17题:
As the administrator of your company’s network, you have implemented encryption for extra security of data on your network. A user moves an encrypted file from an NTFS partition on her Windows 2000 Workstation to an NTFS folder on a remote Windows 2000 Server. What effect will this have on the encrypted file?()
第18题:
You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?()
第19题:
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()
第20题:
Configure the dial-up connection to disable shared access.
Configure the dial-up connection to disable on-demand dialing.
Disable data encryption in the new dial-up connection.
Use the ipconfig command to release and renew your network TCP/P address.
第21题:
PAP
SPAP
MSCHAP
MSCHAP V2
第22题:
Deploy one Microsoft SharePoint Foundation 2010 site. Require users to access the SharePoint site by using a Secure Socket Transmission Protocol (SSTP) connection.
Deploy two Microsoft SharePoint Foundation 2010 sites.Configure one site for internal users. Configure the other site for remote users. Publish the SharePoint sites by using HTTPS.
Configure a Network Policy and Access Services (NPAS) server to act as a VPN server. Require remote users to access the files by using an IPsec connection to the VPN server.
Store all sensitive files in folders that are encrypted by using Encrypting File System (EFS). Require remote users to access the files by using Secure Socket Transmission Protocol (SSTP).
第23题:
Use a PPTP connection with EAP-TLS authentication.
Use a PPTP connection with MS-CHAP v2 authentication.
Use an L2TP connection with EAP-TLS authentication.
Use an L2TP connection with MS-CHAP v2 authentication.