Enable BPD guard
Disable CDP on ports where it is not necessary
Place unused ports in a common unrouted VLAN
Prevent automatic trunk configuration
Implement port security
第1题:
You want to enhance the security within the LAN and prevent VLAN hopping. What two steps can be taken to help prevent this?()
第2题:
You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()
第3题:
You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT. You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()
第4题:
You want to prevent a Windows 2000 Professional computer named Payroll5 from communicating on your network with Windows NT 4.0, Windows 95, and Windows 98 computers. You want to enable the payroll5 computer to communicate on your network with other Windows 2000 computers only. What should you do?()
第5题:
You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()
第6题:
You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder. What should you do?()
第7题:
You have a computer that runs Windows 7. You need to prevent ActiveX controls from running in WindowsInternet Explorer. Which Internet Explorer settings should you modify?()
第8题:
A
B
C
D
第9题:
Enable BPD guard
Disable CDP on ports where it is not necessary
Place unused ports in a common unrouted VLAN
Prevent automatic trunk configuration
Implement port security
第10题:
From Windows Firewall, add a program.
From Windows Defender, modify the Allowed items list.
From Windows Firewall with Advanced Security, create an inbound rule.
From Windows Firewall with Advanced Security, create an outbound rule.
第11题:
when you want to restore an important table that is dropped from the Recycle Bin
when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transaction
when you want to restore a dropped user’s schema
when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period
第12题:
Which version of a view would you use if you just want a quick, easy view within your XPage?()
第13题:
In which scenario will you use the Flashback Transaction Query feature?()
第14题:
You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()
第15题:
You have a DHCP server that runs Windows Server 2008. The DHCP server has two network connections named LAN1 and LAN2. You need to prevent the DHCP server from responding to DHCP client requests on LAN2. The server must continue to respond to non-DHCP client requests on LAN2. What should you do? ()
第16题:
You have 30 NT 4.0 machines and 5 W2k Pro machines on your network. You want to share files on the W2kPro machines that only they can access. The NT 4 machines must not be able to access those shared files at all? ()
第17题:
You are the network administrator for ExamSheet. Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers. What should you do?()
第18题:
You are the network administrator for Company. A user named Marie uses a Windows 2000 Professional computer named ES1 to process payroll records. You want to prevent ES1 from being able to communicate with any Windows NT Workstation 4.0, Windows 98 and Windows 95 computers on the network. You also want ES1 to communicate only with other Windows 2000 computers. What should you do?()
第19题:
to the bottom of the expansion trunk
to within 1% to 3% of its capacity
to within 1% to 3% inches of its capacity
1 to 3 inches from top of the vent pipe
第20题:
Use Windows Explorer to receive the offline files
Using the Windows Explorer, disable the cache for the reports on the network share
Use the Windows NT explorer to grant the special access for the reports on the network share
Use the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
第21题:
Use Secedit.exe to import the security settings from the .inf file to the computers in the sales department.
Use a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.
Create an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.
Create an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.
第22题:
DAI
STP
PVLAN
port security