网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()
- A、In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.
- B、In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.
- C、In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.
- D、In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.
参考答案
更多 “Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()A、In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.B、In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.C、In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.D、In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.” 相关考题
考题
A sensor network is ( ) of a large number of sensor nodes that are densely deployed ( ) inside the phenomenon or very close to it.A.part B.consist C.consisted D.composed A.either B.from C.at D.of
考题
Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?()
A.AB.BC.CD.DE.E
考题
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D
考题
You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D
考题
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP
考题
Which two statements about common network attacks are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.C、Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.D、Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.E、Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.F、Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.
考题
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter
考题
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network
考题
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、 core layerB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunking
考题
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.
考题
You are the network administrator for ExamSheet.net. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.
考题
Your network administrator has assigned you an IP address of 192.168.0.20 with subnet mask of 255.255.255.0.Your network is running in pure Windows 2000 domain. What else should know in order to join your computer to the Windows 2000 domain. ()A、 Address of DHCP server.B、 Address of WINS server.C、 Address of DNS server.D、 Address of default gateway
考题
A router that performs Network Address Translation (NAT) is installed between your computer and the Internet. The router fails. You connect the computer directly to the Internet. You need to ensure that the computer is connected to the Internet in the most secure manner possible. What should you do?()A、Enable the Remote Desktop feature in the System Properties dialog box.B、Configure the network category of your network connection to Public.C、Configure the network category of your network connection to Private.D、Enable the Windows Collaboration Computer Name Registration Service exception in Microsoft Windows Firewall.
考题
Your network consists of an Active Directory domain named contoso.com. You have a computer namedcomputer1.contoso.com. Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com. Which type of record should you request ?()A、AB、AAAAC、HINFOD、NAPTR
考题
单选题You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()A
Disable the Connect even if the network is not broadcasting option.B
In the Network and Sharing Center window, click the Diagnose and repair option.C
Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D
Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.
考题
单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()A
Set the driver signing option to block.B
Set the driver signing option to ignore.C
In the computer’s BIOS, reserve an unused IRQ for ISA devices.D
In the Device Manager, configure the second ISA network adapter to use an unused IRQ.
考题
单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A
STPB
GVRPC
SNMPD
VTPE
DHCP
考题
单选题As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()A
Enable the highest level of Syslogging available to ensure you log all possible event messagesB
Use SSH to access your Syslog informationC
Log all messages to the system buffer so that they can be displayed when accessing the routerD
Syncronize clocks on the network with a protocol such as Network Time Protocol
考题
单选题You are able to access a Web server from your computer by using the IP address of the Web server. You fail to access the Web server when you use its fully qualified domain name. Other users on your network can access the Web server by using both the IP address and the fully qualified domain name. You need to access the Web server by using the fully qualified domain name. What should you do? ()A
Use the Diagnose and repair feature in the Network and Sharing Center.B
At the command prompt, type ipconfig /allcompartments.C
Disable the NetBIOS feature on your network adapter.D
Configure the correct default gateway on the Alternate Configuration tab of your network connection properties dialog box.
考题
单选题You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB
detailed security device specificationsC
results from pilot network testingD
results from a network audit
考题
单选题To establish a communication channel for the telex service in the INMARSAT-Aterminal, you should first().A
establish a communication channel from the CES, via the International Telex Network to the final destinationB
set up a communication channel from your SES, via a satellite, to a CES within your ocean regionC
set up a channel directly to the addressee at the destinationD
establish a channel from your terminal , via the International Telex Network to a CES within your ocean region
考题
多选题Which two statements accurately describe a broadcast domain?()ABroadcast domains consist of devices that connect to a common switch or hub.BBroadcast domains consist of a group of devices that can be reached by sending a frame addressed to the Layer 2 broadcast address.CBroadcast domains require a gateway device such as a router.DBroadcast domains consist of devices that reside on the same sub-network.
考题
多选题You are unable to connect your computer to a wireless network projector. The wireless network projector does not appear in the list of available network projectors provided by the Connect to a Network Projector wizard. You need to connect to the network projector. What are two possible ways to achieve this goal?()AStart the Microsoft Windows Media Center Service Launcher service.BEnable the File and Printer Sharing Windows Firewall exception.CConnect your computer to the same subnet as the network projector.DType the IP address of the network projector in the Connect to a Network Projector wizard.
考题
多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()Acore layerBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunking
考题
多选题Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network. Which two actions should you perform?()ARight-click and click the Diagnose option in the Connect to a network window.BSet the security type value to No authentication in the wireless network properties dialog box.CClick the Manually connect to a wireless network option in the Set up a connection or network window.DIn the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.EConfigure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.
考题
单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network. You need to configure the wireless connection to allow your computer to discover other computers. What should you do?()A
Configure the network category of your wireless network connection to Private.B
Configure the network category of your wireless network connection to Public.C
Configure the TCP/IP packet filtering on the wireless network connection.D
Configure the wireless network connection with the appropriate authentication to the router.
热门标签
最新试卷