Citrix workstation
personal workstation
shared workstation, private desktop
shared workstation, shared desktop
第1题:
Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment. However,employees there have been experiencing problems when tracking objects using active RFIDtags. The RFID beacon rate is 10 seconds and you have discovered an issue with the RFID timeout value. Where and how should the RFID value be changed?()
第2题:
You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()
第3题:
A new floor has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, a few desktop PCs have limited corporate access but not Internet access. Most other desktop PCs, all laptops, and IP phones are working correctly. Additional information indicates that the desktop PCs are obtaining IP host addresses from the DHCP server, which is intended for only the IP phones. Where should troubleshooting about this connectivity issue be focused?()
第4题:
Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment. However,employees there have been experiencing problems when tracking objects using active RFIDtags. The RFID tag data is not being collected. On which device would you verify that RFIDs have beenenabled?()
第5题:
In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()
第6题:
A customer wants to have employees work from remote locations as well as in the office. All communications must be secure and files must be protected from access by unauthorized people. The employee’s applications (database inserts and reads) are only accessed with a web browser. Which of the following capabilities is necessary?()
第7题:
ensure channels are deployed such that they do not overlap
allow for the automatic containment of rogue access points
ensure each area is covered by a minimum of three access points
ensure a minimum RSSI value of -50
第8题:
on the cisco wcs, to 95 seconds
on the wireless controller, to 45 seconds
on the wireless controller, to 95 seconds
on the cisco wcs, to 45 seconds
第9题:
Cisco WCS
access point
location manager
wireless controller
第10题:
DNS
first-hop redundancy protocol
DHCP server and options
VLAN mapping
client network configuration
routing protocols
第11题:
access point
location manager
wireless controller
Cisco WCS
第12题:
Require employees to access e-mail only over connections that use SSL
Place Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the stores
Use the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mail
Use the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them
第13题:
When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?()
第14题:
You are the network administrator for Company. Five of Company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity. You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building. You need to configure the portable computers to always allow the employees to choose which network environment to use when they start their portable computers. What should you do?()
第15题:
Your customer has deployed a cisco wireless location appliance within its warehouse environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. you use an access point scan to determine if the location appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct the problem?()
第16题:
Yours truly,customer has deployed a cisco wireless location appliance within its warehouse environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. the rfid tag data is not being collected. On which device would you verify that rfids have been enabled?()
第17题:
An architectural design company with 45 employees has their office located within 5 kilometers oftheir disaster recovery center. They have an IBM System Storage N6040 installed at bothlocations. In this customer environment what protocol would be used for disaster recovery?()
第18题:
Five of your company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network-enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity. You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building. You need to configure the portable computers for optimum performance in all of the working environments. What should you do? ()
第19题:
NFS
CIFS
iFCP
iSCSI
第20题:
allow for the automatic containment of rogue access points
ensure each area is covered by a minimum of three access points
ensure channels are deployed such that they do not overlap
ensure a minimum RSSI value of -50
第21题:
access point
location manager
wireless controller
cisco wcs
第22题:
SSL
PGP
File encryption program
Public key encryption
第23题:
Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.
Configure three different hardware profiles on each portable computer.
Configure the wireless PC Card network adapters to use Automatic Private IP Addressing (APIPA) when they cannot detect a DHCP server.
Instruct each employee to unplug the wireless PC Card network adapter whenever the portable computer is attached to a network-enabled.