Executable
Trojan
Virus
Worm
第1题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()

A.A
B.B
C.C
D.D
第2题:
You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. You have enabled Internet connection sharing. You do not want to initiate this connection automatically when a request for Internet reaches your computer. What should you do? ()
第3题:
You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()
第4题:
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()
第5题:
You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower. You need to prevent the application from auto starting without uninstalling the application. What should you do?()
第6题:
You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()
第7题:
Your network contains a computer that runs Windows XP Professional. Multiple users share the computer. You create a custom user profile on the computer. You need to ensure that all new users of the computer receive the custom user profile. What should you do?()
第8题:
Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()
第9题:
Executable
Trojan
Virus
Worm
第10题:
Network management
Network optimization
Network security
Content storage networking
第11题:
Virus
Worm
Trojan
Executable
第12题:
Use the listvc command to disable the removable storage device driver.
Use the disable command to disable the removable storage device driver.
Select debug mode from the Windows 2000 Advanced Options menu.
Select Recovery Console from the Repair menu.
Start the computer by using the Windows 2000 Professional CD-ROM.
Insert an Emergency Repair Disk.
第13题:
You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()

A.A
B.B
C.C
D.D
第14题:
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
第15题:
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
第16题:
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()
第17题:
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()
第18题:
You are the network administrator for ExamSheet.net. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()
第19题:
You want to prevent a Windows 2000 Professional computer named Payroll5 from communicating on your network with Windows NT 4.0, Windows 95, and Windows 98 computers. You want to enable the payroll5 computer to communicate on your network with other Windows 2000 computers only. What should you do?()
第20题:
You are the network administrator for ExamSheet.net. You administer ExamSheet's Windows 2000 network. You want to update the device driver for the network adapter in your Windows 2000 Professional computer. You log on the computer by using the local Administrator account. You use Device Manager to verify that the network adapter is installed on your computer. You select the Driver tab and Update Driver option, and install a new driver from the network adapter manufacturer. You restart the computer. After displaying the Windows 2000 Professional startup screen, your computer displays aCkernel stop error message. You want to configure your computer to start successfully. Which two methods can you use to resolve the problem?()
第21题:
VPN
SCSI over IP
Remote Direct Memory Access
InfiniBand
第22题:
An increased need for specialized IT silos
Protecting the business from information outages
IT systems grow fast
Optimizing the efficiency with which IT operates
第23题:
Restart the computer in the docking station.
Run the Add/Remove Hardware wizard.
Use Device Manager to scan for hardware changes.
Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.
Install the new network adapter driver.
第24题:
Perform an emergency repair of the system from the Windows 2000 Professional CD-ROM by using the Emergency Repair Disk for the computer.
Restart the computer. In the Recovery Console, use the Extract utility to reinstall the loopback driver from the Windows 2000 Professional CD-ROM.
Restart the computer by using the last know good configuration.
Restart the computer in safe mode and reinstall the original network adapter driver.
Restart the computer and disable Plug and Play in the computer BIOS.