网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()

  • A、Configure a Windows Connect Now Group Policy.
  • B、Configure a Wireless Network (IEEE 802.11) Policy.
  • C、Delete the rogue network from the Network and Sharing Center on each computer.
  • D、Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

参考答案

更多 “Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()A、Configure a Windows Connect Now Group Policy.B、Configure a Wireless Network (IEEE 802.11) Policy.C、Delete the rogue network from the Network and Sharing Center on each computer.D、Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.” 相关考题
考题 Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()A.AB.BC.CD.D

考题 Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()A.AB.BC.CD.D

考题 Which two statement best describes the Cisco Unified Wireless Network? ()A、 The Cisco Unified Wireless Network provides the framework to segregate wired and wireless networks to deliver the best security for companies that are deploying WLANsB、 The Cisco Unified Wireless Network provides the framework to integrate and extend wired and wireless networks to deliver the lowest-possible total cost of ownership for companies that are deploying WLANsC、 The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security for WLANs that organizations have come to expect from their VPNsD、 The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security, sociability, reliability, ease of deployment, and management for WLANs that organizations have come to expect from their wired LANs

考题 The Cisco Unified Wireless Network minimizes the TCO and maximizes woreless network uptime by optimizing which two deployment, management, and security features?()A、 unified wireless and wired infrastructure for a single point of control for all WLAN trafficB、 simplified management of central or remotely located access pointsC、 extension features to wired network services, such as denial of service prevention and ACLsD、 threat defense with a robust wired IDS

考题 Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A、3389 and 25B、3389 and 636C、50636 and 25D、50636 and 135

考题 Your network contains an Active Directory forest. The forest contains a single domain. You want  to access resources in a domain that is located in another forest.     You need to configure a trust between the domain in your forest and the domain in the other  forest.     What should you create()A、an incoming external trustB、an incoming realm trustC、an outgoing external trustD、an outgoing realm trust

考题 Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()A、a conditional forwarderB、a GlobalNames zoneC、a secondary zoneD、a zone delegation

考题 Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

考题 Your network contains an Active Directory forest. The forest schema contains a custom attribute for  user objects.   You need to modify the custom attribute value of 500 user accounts.   Which tool should you use()A、CsvdeB、DsmodC、DsrmD、Ldifde

考题 Your computer uses both wired and wireless network connections. The networks are not connected to each other.  You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder.  You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.  What should you do?()A、Turn off the Windows Firewall feature.B、Disable the Block all incoming connections option.C、Turn off the Spyware and other malware protection option.D、Enable the File and Printer Sharing exception in the firewall settings of the wireless network adapter.

考题 Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()A、Acct-Session-IdB、Acct-Status-TypeC、ClassD、NAS-Identifier

考题 You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Exchange network for Company.com.The network contains numerous Mailbox servers.During the course of the week you receive an instruction from the CIO to determine the message latency between the Mailbox servers in the organization.What should you do?()A、Your best option would be to increase the MSExchangeMailSubmission diagnostic logging level to Expert.B、Your best option would be to run the Test-Mailflow cmdlet.C、Your best option would be to increase the MSExchangeTransport diagnostic logging level to Expert.D、Your best option would be to run the Test-OutlookConnectivity cmdlet.

考题 Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

考题 Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()A、Port mirroringB、DHCP guardC、Router guardD、MAC address

考题 单选题Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files.    You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity   èMinimizes the amount of time to restore the server What should you include in your plan?()A Windows Deployment Services (WDS)B Windows Automated Installation Kit (Windows AIK) and folder redirectionC the Multipath I/O feature and Volume Shadow CopiesD the Windows Server Backup feature and System Image Recovery

考题 单选题Your network contains an Active Directory forest. The forest contains a single domain. You want  to access resources in a domain that is located in another forest.     You need to configure a trust between the domain in your forest and the domain in the other  forest.     What should you create()A an incoming external trustB an incoming realm trustC an outgoing external trustD an outgoing realm trust

考题 多选题Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()AWhen you configure access to the wired network at home, set the wired network adapter location type to Public.BWhen you configure access to the wired network at home, set the wired network adapter location type to Private.CWhen you configure access to the public wireless access points, set the wireless network adapter location type to Public.DWhen you configure access to the public wireless access points, set the wireless network adapter location type to Private.

考题 单选题Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A 3389 and 25B 3389 and 636C 50636 and 25D 50636 and 135

考题 单选题Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()A Set the security type to the No authentication (Open) option.B Configure the wired and wireless network adapters as a network bridge.C Modify the wireless network profile type to the Use all-user profiles only (recommended) option.D On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.

考题 单选题Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()A Acct-Session-IdB Acct-Status-TypeC ClassD NAS-Identifier

考题 单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A Use Windows Explorer to receive the offline filesB Using the Windows Explorer, disable the cache for the reports on the network shareC Use the Windows NT explorer to grant the special access for the reports on the network  shareD Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 单选题A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()A Persistent sessionB Dynamic evaluationC Roaming sessionD Browser request follow-through

考题 单选题Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()A Configure a Windows Connect Now Group Policy.B Configure a Wireless Network (IEEE 802.11) Policy.C Delete the rogue network from the Network and Sharing Center on each computer.D Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

考题 单选题Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()A Local Security PolicyB ScwC SeceditD Services console

考题 单选题Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()A a conditional forwarderB a GlobalNames zoneC a secondary zoneD a zone delegation