VPN
FTP
POP3
DNS
第1题:
A user would like to ensure that only their family and their laptops can access a newly installed wireless router. Which of the following BEST accomplishes this?()
第2题:
Which of the following groups is BEST to assign to a home user to prevent software installation?()
第3题:
Which of the following is the access level of a user that belongs to both the Administrators andUsers groups?()
第4题:
Which of the following would an administrator use to configure a server’s BIOS settings even if the OS crashes?()
第5题:
Which of the following is a secure method of remote access via command line?()
第6题:
Which of the following protocols would BEST grant the user secure access to a remote location?()
第7题:
VPN
KVM over IP
Telnet
Remote Desktop
第8题:
RCP
Telnet
RSH
SSH
第9题:
Remote management software
Rack diagrams
OEM documentation
Pre-installation plans
第10题:
Modify
Full control
Write
Read
第11题:
WEP encryption
Channel rotation
Disable SSID
WPA encryption
第12题:
Configuring the Windows Firewall exceptions.
Using Windows Messenger.
Configuring My Network Places.
Using Internet Explorer.
第13题:
Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()
第14题:
A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?()
第15题:
Which of the following topology situations would be a qood candidate for configuring DMVPN()
第16题:
Which of the following protocols would a multilayer switch use to learn the IP address of a directly connected device?()
第17题:
Which of the following would be the BEST location to research current physical layout?()
第18题:
You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()
第19题:
In the supply closet so anyone can access them if needed
Near the server for easy access to restore files
Locked in a cabinet in the IT Manager’s office
At a secure off-site storage facility
第20题:
VLAN
KVM
IP KVM
RAID
第21题:
registration error
authentication failures threshold
http disabled
telnet disabled
第22题:
The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication
The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.
The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,
The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.
第23题:
MAC filtering
Disable DHCP
Static IP addresses
Port forwarding
第24题:
VPN
FTP
POP3
DNS