As a network administrator,you have been instructed to prevent all traffic or iginating on the LAN from entering the R2 router.Which the following command would implement the access list on the interface of theR2 router?()
A.access-list 101 in
B.access-list 101 out
C.ipaccess-group 101 in
D.ipaccess-group 101 out
第1题:
You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()
第2题:
A System p administrator has been instructed to verify that all filesets have all required requisitesand are completely installed. Which of the following commands will provide this information()
第3题:
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. You have been instructed to make sure that a server, named ABC-SR07, is configured to be managed remotely from ABC-SR01 using Server Manager.Which of the following is not a valid option to take?()
第4题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster. The nodes have a single network adapter and are connected to the same switching hub device. Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers. You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device. You do not want to move the cluster to another switching hub device. What should you do? ()
第5题:
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed and all client computers have Windows 8 installed. The ABC.com network contains a domain controller named ABC_DC01. You want to run the ping ABC_dc01.ABC.com command from a client computer named ABC_WS27.How would you accomplish this?()
第6题:
It provides host-based,two-way network traffic filtering for a computer.
It provides host-based,one-way network traffic filtering for a computer.
It blocks unauthorized network traffic flowing into or out of the local computer.
It only blocks unauthorized network traffic flowing into the local computer.
It only blocks unauthorized network traffic flowing out of the local computer.
第7题:
It allows for traffic failover to prevent connectivity loss if a network component fails.
It prevents bandwidth aggregation.
The Windows Server 2012 R2 implementation of NIC Teaming supports a maximum of 5 NICs in a team.
The Windows Server 2012 R2 implementation of NIC Teaming supports a maximum of 32 NICs in a team.
第8题:
You should consider configuring the Security Options settings via the Group Policy Management Console (GPMC).
You should consider configuring the Security Options settings via Server Manager.
You should consider configuring the replication settings.
You should consider navigating to Local Users and Groups via Computer Management on each workstation.
第9题:
Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.
Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.
Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.
Create a Pattern Match capture trigger for the 131.107.0.1 IP address.
第10题:
lslpp
lppchk
instfix
installp
第11题:
configure a hard-to-guess VTP domain name
use a hard-to-guess VTP password
use VTP transparent mode
implement VTP version 3
第12题:
Upgrade the switches
Configure BPDU guard
Configure VLAN access lists
Configure port security
Configure Dynamic ARP inspection
第13题:
As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()
第14题:
You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()
第15题:
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to add a new domain controller to ABC.com’s existing environment. Which of the following actions should you take?()
第16题:
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to modify the name of the local Administrator account on all ABC.com workstations. You want to achieve this using as little administrative effort as possible. Which of the following actions should you take?()
第17题:
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to make sure that ABC.com users are not able to install a Windows Store application. You then create a rule for packaged apps. Which of the following is the rule based on?()
第18题:
Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.
Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.
Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.
Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
第19题:
Disable NetBIOS over TCP/IP on the accounting department computers.
Apply the Hisecws.inf security template to the local security policy on the accounting department computers.
Enable the Encrypting File System (EFS) on all files used by the financial and credit application on the accounting department computers.
Configure port filters for each port used by the financial and credit application on the accounting department computers.
第20题:
The publisher of the package.
The publisher of the application.
The name of the package
The name of the application
The package version.
The application version.
第21题:
You should consider making use of Server Manager.
You should consider making use of Authorization Manager.
You should consider making use of Remote Desktop Gateway Manager.
You should consider making use of Network Load Balancing Manager.
第22题:
It resembles a Layer 2 bridge.
Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
Inline interfaces which have no IP addresses cannot be detected.
Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
第23题:
The SetupUser profile
The Default User profile
The Administrator profile
The System profile
The All Users profile