多选题You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication.  Inorder to accomplish this, which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?()A083 Tunnel-PreferenceB066 Tunnel-Client-EndpointC0

题目
多选题
You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication.  Inorder to accomplish this, which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?()
A

083 Tunnel-Preference

B

066 Tunnel-Client-Endpoint

C

064 Tunnel-Type

D

082 Tunnel-Assignment-ID

E

081 Tunnel-Private-Group-ID

F

067 Tunnel-Server-Endpoint


相似考题
更多“You want to dynamically assign users to an 802.1Q VLAN as a ”相关问题
  • 第1题:

    Refer to the exhibit. Users complain that they intermittently lose data and connections to important servers. After investigation, you discover that the 802.1Q trunk between DSW111 and ASW1 is down.Even though the HSRP group 11 is being serviced by DSW112, you discover that the SVI for VLAN 11 is in the up state on DSW111.Which three Cisco Catalyst IOS commands should you use on DSW111 to find the source of this problem? ()(Choose three.)

    A. show vtp status

    B. show interfaces vlan 11

    C. show standby vlan 11 brief

    D. show spanning-tree vlan 11

    E. show interfacesmod/port trunk


    参考答案:B, D, E

  • 第2题:

    You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. In order toaccomplish this,which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?()

    • A、064 Tunnel-Type
    • B、066 Tunnel-Client-Endpoint
    • C、067 Tunnel-Server-Endpoint
    • D、081 Tunnel-Private-Group-ID
    • E、082 Tunnel-Assignment-ID

    正确答案:A,D

  • 第3题:

    You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()

    • A、You should assign the network 172.16.0.0/16.
    • B、You should assign the network 172.16.0.0/17.
    • C、You should assign the network 172.16.0.0/18.
    • D、You should assign the network 172.16.0.0/19.
    • E、You should assign the network 172.16.0.0/20.
    • F、You should assign the network 172.16.0.0/22.

    正确答案:F

  • 第4题:

    You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication.  Inorder to accomplish this, which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?()

    • A、083 Tunnel-Preference
    • B、066 Tunnel-Client-Endpoint
    • C、064 Tunnel-Type
    • D、082 Tunnel-Assignment-ID
    • E、081 Tunnel-Private-Group-ID
    • F、067 Tunnel-Server-Endpoint

    正确答案:C,E

  • 第5题:

    You have created a resource plan, DB_PLAN, using DBMS_RESOURCE_MANAGER.CREATE_SIMPLE_PLAN and you want to impose a restriction on utilization of resources by the database users.   Which step must be performed before you can start using the resource plan?()

    • A、assign users to consumer groups
    • B、set the resource plan for the instance
    • C、configure a simple resource plan and specify plan directives
    • D、configure a complex resource plan and specify plan directives

    正确答案:B

  • 第6题:

    TS1 is a server running Windows Server 2008 and Terminal Services. Users in your organization connectto the server TS1 to run a line-of-business application. Recently, you have noticed that user profiles arethreatening to consume the total disk capacity on TS1. You want users to be able to save their own data,but you also want to prevent profiles from exhausting the total storage capacity of the disk on TS1. Whatshould you do?()

    • A、Use Group Policy to assign mandatory profiles to users who connect to TS1.
    • B、Configure disk quotas for the disk on TS1 on which user profiles are stored.
    • C、Use Group Policy to assign Terminal Services roaming user profiles to users who connect to TS1.
    • D、Configure disk quotas for the local disk of each user who connects to TS1.

    正确答案:B

  • 第7题:

    You have Active Directory Certificate Services (AD CS) deployed.  You create a custom certificate template.   You need to ensure that all of the users in the domain automatically enroll for a certificate based on the  custom certificate template.   Which two actions should you perform()

    • A、In a Group Policy object (GPO), configure the autoenrollment settings
    • B、In a Group Policy object (GPO), configure the Automatic Certificate Request Settings.
    • C、On the certificate template, assign the Read and Autoenroll permission to the Authenticated Users  group.
    • D、On the certificate template, assign the Read, Enroll, and Autoenroll permission to the Domain Users  group.

    正确答案:A,D

  • 第8题:

    You have a computer that runs Windows XP Professional. You connect one local print device and install a printer. You share the printer. You need to give a user the ability to manage all new print jobs submitted to the printer. Your solution must prevent the user from installing additional local printers. What should you do?()

    • A、In the printer properties, assign the Manage Printers permission to the user.
    • B、In the printer properties, assign the Manage Documents permission to the user.
    • C、From the Local Users and Groups snap-in, add the user to the Power Users group.
    • D、From the Local Users and Groups snap-in, add the user to the Replicators group.

    正确答案:B

  • 第9题:

    You are the network administrator for The network consists of a single Active Directory domain named Some client computers run Windows NT 4.0 Workstation. Others run Windows 2000 Professional, and the rest run Windows XP Professional. Users in the accounting department require a shared folder for their own use only. The accounting users must be able to read, edit, and delete files in the shared folder. You create the shared folder and use default share permissions. You assign the Allow - Full Control NTFS permission to members of the Administrators group. You assign the Allow - Modify NTFS permission to the accounting users. However, accounting users report that they cannot access the shared folder. How should you solve this problem?()

    • A、Change the type of setting on the folder to Documents (for any file types).
    • B、Change the NTFS permissions on the folder to assign the Allow - Delete Sub-Folders and Files permission to the accounting users.
    • C、Add the accounting users as owners of the folder.
    • D、Change the share permissions to assign the Allow - Full Control permission to the accounting users.

    正确答案:D

  • 第10题:

    单选题
    All network servers run Windows Server 2003, and all client computers run Windows XP Professional. Sandra, the manager of the human resources department, asks you to create a shared folder named HRDrop. You create a HRDrop folder on a member server. You assign the Allow - Full Control share permission to the Everyone group. Now you need to configure the NTFS permissions on HRDrop to fulfil the following requirements: 1. Sandra must be able to read, modify, change permissions on, and delete all files and subfolders in HRDrop. 2. All other domain users must only be able to add new files to HRDrop. What should you do?()
    A

    Assign the Allow - Modify permission to Sandra. Assign the Allow - Read permission to the Users group.

    B

    Assign the Allow - Full Control permission to Sandra. Assign the Allow - Write permission and the Deny - Read and Execute permission to the Users group.

    C

    Assign the Allow - Modify permission to Sandra. Assign the Allow - List Folder permission to the Users group.

    D

    Assign the Allow - Full Control permission to Sandra. Assign the Allow - Read permission to the Users group.

    E

    Assign the Allow - Full Control permission to Sandra. Assign the Allow - Write permission to the Users group and remove the Read and Execute permissions to the Users group.


    正确答案: E
    解析: 暂无解析

  • 第11题:

    单选题
    You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()
    A

    Use Windows Explorer to receive the offline files

    B

    Using the Windows Explorer, disable the cache for the reports on the network share

    C

    Use the Windows NT explorer to grant the special access for the reports on the network  share

    D

    Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. Inorder to accomplish this. Which two IETF RADIUS attributes should you configure on the CiscoSecure ACS? ()
    A

    064 Tunnel-Type

    B

    066 Tunnel-Client-Endpoint

    C

    067 Tunnel-Server-Endpoint

    D

    081 Tunnel-Private-Group-ID

    E

    082 Tunnel-Assignment-ID

    F

    083 Tunnel-Preference


    正确答案: A,D
    解析: 暂无解析

  • 第13题:

    What is the purpose of the cisco Vlan Trunking protocol?()

    A. to provide a mechanism to dynamically assign vlan membership to switch ports

    B. to allow traffic to be carried from multiple vlans over a single link between switches

    C. to allow native vlan information to be carried over a trunk link

    D. to provide a mechanism to manually assign vlan membership to switch ports

    E. to allow for managing the additions,deletions,and changes of vlans between switchs


    参考答案:E

  • 第14题:

    You need to share a financial spreadsheet with other employees of your company. The material is of a sensitive nature and you want to prevent the ability of users to use offline caching. How do you do this?()

    • A、Assign Special Permissions.
    • B、Select Shared folder properties, caching, deselect “Allow Caching”.
    • C、Select Manual Caching for Documents.
    • D、Select Manual Caching for Programs.

    正确答案:B

  • 第15题:

    Which three of these statements about Dynamic Trunking Protocol are correct?()

    • A、It supports autonegotiation for both ISL and IEEE 802.1Q trunks.
    • B、It must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.
    • C、It is a point-to-multipoint protocol.
    • D、It is a point-to-point protocol.
    • E、It is not supported on private VLAN ports or tunneling ports.

    正确答案:A,B,D

  • 第16题:

    What is the purpose of the cisco Vlan Trunking protocol?()

    • A、to provide a mechanism to dynamically assign vlan membership to switch ports
    • B、to allow traffic to be carried from multiple vlans over a single link between switches
    • C、to allow native vlan information to be carried over a trunk link
    • D、to provide a mechanism to manually assign vlan membership to switch ports
    • E、to allow for managing the additions,deletions,and changes of vlans between switchs

    正确答案:E

  • 第17题:

    You work as a database administrator for Supportcenter.cn. You find that users with DBA role are using more CPU resources than what is allocated in their profiles. Which action would you take to ensure that resources limits are imposed on these users?()

    • A、Assign the DEFAULT profile to the users
    • B、Set the RESOURCE_LIMIT parameter to TRUE in the parameter file
    • C、Create a new profile with CPU restrictions and assign it to the users
    • D、Specify the users as members of the DEFAULT_CONSUMER_GROUP
    • E、Revoke the DBA role and grant CONNECT and RESOURCE role to the users

    正确答案:B

  • 第18题:

    Your network consists of a single Active Directory domain. All network servers run Windows Server 2003 Service Pack 2 (SP2). You create a folder named CorporateData. You share the folder as CorpData and assign the Change permission to the Domain Users group. In the CorporateData folder, you create a folder named HumanResources. On the HumanResources folder, you assign the Modify permission to a global group named HRUsers. You share the HumanResources folder as HRData. You confirm that all users in the domain can view the files in the HRData share. You need to ensure that only HRUsers and administrators can access files in the HRData share. The solution must maintain user access to the CorpData share. What should you do? ()

    • A、On the CorpData share, assign the Read permission to Domain Users.
    • B、On the CorpData share, remove Domain Users and assign the Change permission to HRUsers.
    • C、On the CorporateData folder, disable permission inheritance and remove the inherited permissions.
    • D、On the HumanResources folder, disable permission inheritance and remove the inherited permissions.

    正确答案:D

  • 第19题:

    You are the administrator of an Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Filesrv1 contains confidential data that is only available to users in the human resources (HR) department.  You want all computers in the HR department to connect to Filesrv1 by using an IPSec policy. You assign the Server (Request Security) IPSec policy to Filesrv1. Using Network Monitor, you notice that some computers in the HR department connect to Filesrv1 without using the IPSec policy.   You need to configure Filesrv1 to ensure that all computers connect to it by using the IPSec policy.   What should you do?()

    • A、Assign the Secure Server(Require Security) IPSec policy.
    • B、Assign the Client (Respond Only)IPSec policy.
    • C、Unassign the Server(Request Security IPSec policy.
    • D、Restart the IPSec Services service.

    正确答案:A

  • 第20题:

    You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()

    • A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.
    • B、Use Windows Explorer to grant users Special access for the reports on the network share.
    • C、Use Windows Explorer to disable caching for the reports on the network share.
    • D、Use Windows Explorer to disable Offline files.

    正确答案:C

  • 第21题:

    单选题
    You are designing a Windows Server 2008 R2 Hyper-V environment. You need to be able to dynamically assign new storage to Windows virtual machines (VMs).  What should you do?()
    A

    Use fixed virtual hard disks (VHDs)

    B

    Install Hyper-V Integration Services on the VMs

    C

    Install the VMs in Cluster Shared Volumes (CSVs)

    D

    Use dynamically expanding virtual hard disks (VHDs)


    正确答案: C
    解析: 暂无解析

  • 第22题:

    多选题
    You have Active Directory Certificate Services (AD CS) deployed.  You create a custom certificate template.   You need to ensure that all of the users in the domain automatically enroll for a certificate based on the  custom certificate template.   Which two actions should you perform()
    A

    In a Group Policy object (GPO), configure the autoenrollment settings

    B

    In a Group Policy object (GPO), configure the Automatic Certificate Request Settings.

    C

    On the certificate template, assign the Read and Autoenroll permission to the Authenticated Users  group.

    D

    On the certificate template, assign the Read, Enroll, and Autoenroll permission to the Domain Users  group.


    正确答案: D,C
    解析: 暂无解析

  • 第23题:

    单选题
    You have created a resource plan, DB_PLAN, using DBMS_RESOURCE_MANAGER.CREATE_SIMPLE_PLAN and you want to impose a restriction on utilization of resources by the database users. Which step must be performed before you can start using the resource plan?()
    A

     assign users to consumer groups

    B

     set the resource plan for the instance

    C

     configure a simple resource plan and specify plan directives

    D

     configure a complex resource plan and specify plan directives


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    What is the purpose of the cisco Vlan Trunking protocol?()
    A

    to provide a mechanism to dynamically assign vlan membership to switch ports

    B

    to allow traffic to be carried from multiple vlans over a single link between switches

    C

    to allow native vlan information to be carried over a trunk link

    D

    to provide a mechanism to manually assign vlan membership to switch ports

    E

    to allow for managing the additions,deletions,and changes of vlans between switchs


    正确答案: A
    解析: 暂无解析