网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()
A

are optional

B

are used to protect data beans

C

provide coarse-grained access control

D

never specify a relationship


参考答案

参考解析
解析: 暂无解析
更多 “多选题A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-grained access controlDnever specify a relationship” 相关考题
考题 An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()A. WMIB. RISC. DNSD. SNMPE. SMTP

考题 A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255D.access-list 10 permit ip 192.168.146.0 0.0.1.255E.access-list 10 permit ip 192.168.148.0 0.0.1.255F.access-list 10 permit ip 192.168.146.0 255.255.255.0

考题 Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()A、assigning a private IP address to the APB、changing the default SSID valueC、configuring a new administrator passwordD、changing the mixed mode setting to single modeE、configuring traffic filtering

考题 What is the key objective of the plan phase?()A、Identify the activities involved in installing and configuring equipment at a customer’s site or sitesB、Describe the day-to-day activities required to support, manage, and monitor a newly implemented systemC、Access current network readiness, site readiness, and operational readiness in preparation for designing a solution proposalD、Gain an understanding of high-level business and technical requirements

考题 A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255D、access-list 10 permit ip 192.168.146.0 0.0.1.255E、access-list 10 permit ip 192.168.148.0 0.0.1.255F、access-list 10 permit ip 192.168.146.0 255.255.255.0

考题 A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()A、are optionalB、are used to protect data beansC、provide coarse-grained access controlD、never specify a relationship

考题 The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

考题 Which of the following topology situations would be a qood candidate for configuring DMVPN()A、Extranet VPNB、Managed overlay VPN topologyC、Hub-and-spoke VPN topologyD、Central-site VPN topologyE、Full mesh VPN topologyF、Remote-access VPN topology

考题 An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()A、WMIB、RISC、DNSD、SNMPE、SMTP

考题 An administrator has just installed a web server for the companys Internet site. After bringing the system online, customers notify the administrator that they cannot connect to the server. The administrator tests the web server from a workstation and can access the website. The customers continue to report issues.  Which of the following is the MOST likely reason for this?()A、 The servers firewall is misconfigured.B、 The server’s timeout feature is set incorrectly.C、 The web server was not installed properly.D、 The company firewall is misconfigured.

考题 A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()A、are mandatoryB、specify action group ExecuteCommandActionGroup for Controller commandsC、specify action group ViewCommandActionGroup for View commandsD、specify resource group ControllerCommandResourceGroup for Controller commandsE、specify resource group ViewCommandResourceGroup for View commands

考题 Your network contains three Active Directory sites named Site1, Site2, and Site3. Users can only access Site1 from the Internet.  In each site, you plan to deploy a Mailbox server and a Hub Transport server.  You need to plan the deployment of Exchange servers to meet the following requirements: .Ensure that Exchange ActiveSync and Outlook Anywhere clients can connect to their Mailboxes from theInternet .Minimize hardware costs What should you include in your plan?()A、In Site1, deploy one Client Access server.B、In each site, deploy one Client Access server.C、In Site1, deploy one Client Access server and one Edge Transport server.D、In each site, deploy one Client Access server and one Edge Transport server.

考题 You are an IIS Web server administrator implementing authentication settings for a new Web site.According to the requirements for the Human Resources Web site, users should be prompted forauthentication information when they attempt to access the site. The site will be accessed only by userswho have accounts in your organization’s Active Directory domain. You have already configured the filesystem permissions for the content based on the appropriate settings. You also want to maximize securityof the site. Which two actions should you take to meet these requirements?()A、Enable Windows authentication.B、Enable basic authentication.C、Disable anonymous authentication.D、Enable anonymous authentication.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server that runs Windows Server 2008. Themember server has the Web Server (IIS) server role installed. The server hosts a Web site that is onlyaccessible to the executives of your company. According to the requirement of the company policy, theexecutives must use user certificates to access the confidential Web content. You have to make sure thatthe executives can only access the secure Web site by using their installed certificates. What action shouldyou perform to make sure of this?()A、A Certificate Trust list should be configured to include the executives certification authority (CA)certificate.B、The SSL settings should be configured to Require 128-bit SSL on the confidential Web site.C、The Client Certificates settings should be configured to Accept on the SSL settings for the confidentialWeb site.D、The Client Certificates settings should be configured to Require on the SSL settings for the confidentialWeb site.

考题 Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joinedcomputers that are connected to the internal network  What should you do?()A、Modify the Exchange virtual directory on the Client Access server in Site1.B、Modify the Exchange virtual directory on the Client Access server in Site2.C、Modify the OWA virtual directory on the Client Access server in Site1.D、Modify the OWA virtual directory on the Client Access server in Site2.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server that runs Windows Server 2008. Themember server has the Web Server (IIS) server role installed. The server hosts a Web site that is onlyaccessible to the executives of your company. According to the requirement of the company policy, theexecutives must use user certificates to access the confidential Web content. You have to make sure thatthe executives can only access the secure Web site by using their installed certificates. What action shouldyou perform to make sure of this?()A A Certificate Trust list should be configured to include the executives certification authority (CA)certificate.B The SSL settings should be configured to Require 128-bit SSL on the confidential Web site.C The Client Certificates settings should be configured to Accept on the SSL settings for the confidentialWeb site.D The Client Certificates settings should be configured to Require on the SSL settings for the confidentialWeb site.

考题 多选题An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()AWMIBRISCDNSDSNMPESMTP

考题 单选题You are a systems administrator who is attempting to troubleshoot a problem with accessing a Web site ona computer running Windows Server 2008. In the past, users have been able to access the Web site byusing http://hr.contoso.com. However, when they attempt to access the site now, they receive the errormessage "Internet Explorer Cannot Display The Web page." Which of the following steps should you taketo resolve the error?()A Using Server Manager, add the HTTP Errors server role.B Using Server Manager, verify that the World Wide Web Publishing Service has been started.C Verify the configuration of the usersWeb browsers.D Using Server Manager, add the HTTP Logging server role.

考题 单选题You are a Windows Server 2008 systems administrator responsible for configuring FTP Publishing Servicefor use by members of your organization’s engineering department. The name of the server is FTPServer01. Several users have reported that they are able to access most files through the FTP site,but they cannot access the contents of the Drawings folder. You have verified that these users. Windowsaccounts have the correct file system permissions for this folder. You want to minimize the permissionsgranted to all the users. Which of the following changes should you make to enable users to access thisfolder?()A Change the permissions for the IUSR_FTPServer01 account on the Drawings folder.B Create new TCP/IP Address Restrictions entries for the users who cannot access the Drawings folder.C Disable the Allow Only Anonymous Connections option.D Add the users to the local Administrators group on FTPServer02.

考题 单选题Rate your level of proficiency with configuring and troubleshooting access to files and shared folders,configuring file system permissions, and troubleshooting Terminal Services. ()A Very HighB HighC ModerateD LowE Very Low

考题 单选题Your network consists of an Active Directory forest that contains two sites named Site1 and Site2. From the Internet, users can only access servers in Site1. You have an Exchange Server 2007 organization.  Each site contains servers that run the Client Access server role, the Mailbox server role, and the HubTransport server role.  You plan to transition the organization to Exchange Server 2010.  You need to recommend the server role that you must transition first to Exchange Server 2010. Your solution must provide the least amount of downtime for users in the organization.  Which servers should you transition first?()A the Client Access servers in Site1B the Client Access servers in Site2C the Hub Transport servers in Site1D the Hub Transport servers in Site2

考题 单选题An administrator is configuring cross-site LVM and wants to ensure that logical volume copies are always onseparate disks. When creating a new logical volume, how could the administrator ensure that this requirement is achieved?()A Set the allocation policy to strictB Set the allocation policy to superstrictC Set the Maximum Number of Physical Volumes to 2D Set the Number of Copies for each logical partition to 2

考题 多选题A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-grained access controlDnever specify a relationship

考题 单选题Which of the following topology situations would be a qood candidate for configuring DMVPN?()A Extranet VPNB Managed overlay VPN topologyC Hub-and-spoke VPN topologyD Central-site VPN topologyE Full mesh VPN topologyF Remote-access VPN topology

考题 单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()A Run ipconfig /flushdns at the command prompt. B Reset the password for the local administrator user account. C From the Internet Options in Internet Explorer, clear the AutoComplete history.D From the Internet Options in Internet Explorer, delete the Temporary Internet Files. 

考题 单选题You are a systems administrator troubleshooting a problem with accessing a Web server running WindowsServer 2008. Previously, another administrator created and installed a server certificate on the computer.Users report that they are able to connect to the site using HTTP but that they receive a warning in InternetExplorer when trying to connect by HTTPS. You want to enable users to connect using both HTTP andHTTPS. You attempt to access the site by using an instance of Internet Explorer on the server itself, andyou receive the same warning message for HTTPS connections. How can you resolve this issue?()A Change the site binding for the Web site to enable connections on port 443.B Change the SSL settings for the Web site to enable the Require SSL option.C Obtain and install an Internet Certificate on the Web server.D Export and re import the existing security certificate.

考题 单选题Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joined computers that are connected to the internal network  What should you do?()A Modify the Exchange virtual directory on the Client Access server in Site1.B Modify the Exchange virtual directory on the Client Access server in Site2.C Modify the OWA virtual directory on the Client Access server in Site1.D Modify the OWA virtual directory on the Client Access server in Site2.