Which of the following are not steps in setting up aTLS session? ()
第1题:
Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()
第2题:
How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()
第3题:
Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2008.All client computers run Windows Vista. All computers are members of the Active Directory domain. You assign the Secure Server (Require Security) IPsec policy to Server1 by using a Group Policy object(GPO). Users report that they fail to connect to Server1.You need to ensure that users can connect to Server1. All connections to Server1 must be encrypted. What should you do? ()
第4题:
You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()
第5题:
You have an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7.All client computers are configured to extend the desktop display across two monitors. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that users can extend the Remote Desktop Connection window across both monitors. What should you do?()
第6题:
Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Remote client computers are not members of the domain. Your environment includes a Remote Desktop Gateway (RD Gateway) server. You install an application on a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote users can run the application. What should you do?()
第7题:
Attacker sends multiple DHCP requests flooding DHCP server
Attacker connects rogue server initiating DHCP requests
Attacker connects rogue server replying to DHCP requests
Attacker sends DHCP jam signal causing DHCP server to crash
Attacker sends gratuitous ARP replies, thereby jamming the DHCP server
Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server
第8题:
It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.
It sends a copy of its neighbor table to all adjacent routers.
It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.
It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.
第9题:
On Server3, modify the DNS option.
On Server3, modify the DNS domain name option.
On Server2, modify the Preferred DNS server setting.
On each client computer, modify the properties of the DNS Client service.
第10题:
Which set of statements describes the correct order and process of a Company wireless user client associating with a wireless access point in the Company network? ()
第11题:
Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()
第12题:
Your network consists of single active domain. The domain contains a serve named server1 that runs windows server 2008 all client computers run windows vista. All computers are members of the active directory domain. You assign the secure server (Require Security) IPsec policy to server1 by using a GPO. Users report that they fail to connect to server1. You need to ensure that users can connect to server1. All connections to server1 must be encrypted. What should you do?()
第13题:
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).The network contains two DNS servers named Server1 and Server2. You deploy a DHCP server named Server3 and configure all client computers to receive their IP configurations automatically.You discover that all client computers use Server2 for host name resolution.You need to ensure that all client computers use Server1 for host name resolution. What should you do?()
第14题:
Your network contains an Active Directory domain. All client computers run Windows XP Service Pack 3 (SP3). The domain contains a member server named Server1 that runs Windows Server 2008 R2. On Server1, you create a connection security rule that requires authentication for inbound and outbound connections. You configure the connection security rule to use Kerberos authentication. You need to ensure that the client computers can connect to Server1. The solution must ensure that all connections to Server1 are encrypted. What should you do?()
第15题:
A client cannot mount a filesystem from an NFS server. Which of the following options is the most probable cause for the mount failure?()
第16题:
The FTP server sends back an acknowledgment (ACK) to the client
The FTP server allocates a port touse for the data channel and transmit that port number to the client
The FTP server opens the data channel to the client using the port number indicated by the client
The FTP client opens the data channel to the FTP server on Port 20
The FTP client opens the datachannel to the FTP server on Port 21
第17题:
close-connection
terminate-connection
close-client-and-server
terminate-session
第18题:
Client sends Hello to Server listing all of its supported cipher suites
Server sends Hello to Client listing all of its supported cipher suites
Client calculates and sends encryptedpre_master_secret
Client and Server calculate keys from pre_master_secret
Server sends Change Cipher Spec to indicate a shift to encrypted mode