A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()
第1题:
How do you ping from configuration mode?()
第2题:
A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()
第3题:
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()
第4题:
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()
第5题:
Which two commands will successfully create ping traffic?()
第6题:
Your network contains a server named Server1 that runs Windows Server 2008 R2. You have a user named User1. You need to ensure that User1 can schedule Data Collector Sets (DCSs) on Server1. The solution must minimize the number of rights assigned to User1. What should you do?()
第7题:
You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()
第8题:
The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()
第9题:
The user cannot access some Internet websites, but can connect to resources inside the local network. The technician successfully uses the ping command to test the user’s connectivity. Which of the following commands can the technician run NEXT to troubleshoot the issue?()
第10题:
From System in Control Panel, select the Change Type option, and then select the Roaming profile option.
From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location.
Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account.
Connect the portable computer to the network, and configure the user accounts for a roaming user profile.
第11题:
Remotely connect to the user's laptop and review the network configuration settings
Ping the web server from inside the network to ensure it is still up and running.
Check to make sure the company's website is accessible from the Internet.
Ensure the Ethernet cable is securely plugged into the user's laptop
第12题:
[edit interfaces] user@router# run ping 1.1.1.1
[edit interfaces] user@router# ping 1.1.1.1
[edit interfaces] user@router# up ping 1.1.1.1
[edit interfaces] user@router# exit ping 1.1.1.1
第13题:
You can successfully ping a Bridged 1483 customer's workstation from the local ERX. However, a remote ERX router in your network cannot ping that same device. What could be causing this problem?()
第14题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
第15题:
In a TCP/IP network, which of the following protocols is involved when a user issues a ping command?()
第16题:
A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()
第17题:
You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department. You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection. You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button) You want to be able to configure each user account to use a roaming user profile. What should you do?( )
第18题:
You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()
第19题:
A user named User1 uses a computer that runs Windows XP Professional. You need to enable User1 to create local user accounts. You must minimize the rights assigned to the User1 account. Which group should you add User1 to?()
第20题:
You have a computer that runs Windows 7. The computer contains a folder named C:/data. You use Advanced Sharing to share C:/data by using the default share permissions. When a user tries to access theshare over the network, he gets an Access is Denied error message. You need to ensure that the user canaccess the share. What should you do?()
第21题:
You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()
第22题:
BPDU
Port security
RSTP
STP
VTP
Blocking mode
第23题:
On Folder1, modify the share permissions.
On Folder1, modify the NTFS permissions.
Add all local user accounts to the Guests group.
Add all local user accounts to the Network Configuration Operators group.