Content storage networking
Network optimization
Network management
Network security
第1题:
You are the network consultant from passguide.com. You should tell your clients Two technologies help them save much time from complex computing. ()
第2题:
Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()
第3题:
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
第4题:
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
第5题:
Your network contains a server named Server1 that runs Windows Server 2003 Service Pack (SP2). You install a new network adapter on Server1. You need to view the media access control (MAC) address for the new network adapter. What should you do? ()
第6题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1. What should you do?()
第7题:
You need to create a VPN connection. What should you do?()
第8题:
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
detailed security device specifications
results from pilot network testing
results from a network audit
第9题:
Network management
Network optimization
Network security
Content storage networking
第10题:
Encryption
Bandwidth limits
Minimal signal loss
No EMI
第11题:
Create an IPsec Enforcement Network policy
Create an 802.1X enforcement network policy
Create a wired network (IEEE 802.3) Group Policy
Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
第12题:
Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.
Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.
Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.
Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
第13题:
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()
第14题:
Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()
第15题:
You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()
第16题:
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()
第17题:
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()
第18题:
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()
第19题:
Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()
第20题:
Configure the Network authentication (Shared mode) setting.
Apply a Wireless Network Policy to set the network type to WPA-PSK.
Apply a Wireless Network Policy to automatically connect to the company wireless network.
Apply a Wireless Network Policy to set the company wireless network as the preferred network.
第21题:
An increased need for specialized IT silos
Protecting the business from information outages
IT systems grow fast
Optimizing the efficiency with which IT operates
第22题:
Repeater
Wireless router
Hub
Wireless network adapter
第23题:
Configure a Windows Connect Now Group Policy.
Configure a Wireless Network (IEEE 802.11) Policy.
Delete the rogue network from the Network and Sharing Center on each computer.
Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.
第24题:
Create an IPsec Enforcement Network policy.
Create an 802.1X Enforcement Network policy.
Create a Wired Network (IEEE 802.3) Group policy.
Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.