Gateway is a device used to connect two separate network that use(2)communication protocol.A.same kind ofB.similarC.differentD.same

题目

Gateway is a device used to connect two separate network that use(2)communication protocol.

A.same kind of

B.similar

C.different

D.same


相似考题
更多“Gateway is a device used to connect two separate network that use(2)communication protocol ”相关问题
  • 第1题:

    You are the network administrator for Ezonexam.com. You configure a shared printer on a Windows 2000 Server computer. The printer connects to a Hewlett Packard JetDirect print device that uses DLC. This print device is on the same network segment as the server.

    Six months later, you relocate the print device to a different network segment. Users report that they are able to send print jobs to the printer but that their print jobs no longer print.

    You need to ensure that the printer and the print device are working properly. What should you do?

    A.Configure the JetDirect print device to use DHCP.

    B.Uninstall and reinstall the DLC protocol from the server.

    C.Configure the printer and the JetDirect print device to use the LPR printing protocol.

    D.Delete the printer. Re-create the printer by using DLC to connect to the JetDirect print device.


    正确答案:D
    解析:Explanation: In this scenario the DLC protocol has to be configured on the Printer. The print device was in use on a different network segment, but the computer that serves as a print server must be on the same segment as the printer device because DLC is not routable.

    Incorrect answers:
    A: This print device uses DLC, not TCP/IP therefore it does not require DHCP to provide it with an IP address.

    B: The server will no longer be functioning as a print server, therefore we should not reinstall the DLC protocol on the server.

    C: The LPR printing protocol is used in UNIX environments.

  • 第2题:

    is a one -way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string.

    (72) is a protocol that most USENET machines now use it to allow news articles to propagate from one machine to another over a reliable connection.

    (73) is an approach preferred by cable TV providers. In this solution the fiber terminates at an optoelectrical converter and the final segment is a shared coaxial cable.

    (74) is a device used to connect two separate network that use different communication protocol.

    (75) is a digital-to-digital polar encoding method in which the signal level is always either positive or negative.

    A.MD

    B.RSA

    C.DES

    D.MIB


    正确答案:A

  • 第3题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    A.Allow unrestricted access to the console or VTY ports

    B.Use a firewall to restrict access from the outside to the network devices

    C.Always use Telnet to access the device command line because its data is automatically encrypted

    D.Use SSH or another encrypted and authenticated transport to access device configurations

    E.Prevent the loss of passwords by disabling password encryption


    参考答案:B, D

  • 第4题:

    A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()

    • A、For the two vlans to communicate,a network statement for the trunk interface needs to be added to the  OSPF configuration.
    • B、For the two vlans to communicate, a network statement for each subinterface needs to be  added  to the OSPF configuration.
    • C、Direct inter-vlan communication does not require OSPF
    • D、OSPF cannot be used if router-on-a-stick is configured on the router

    正确答案:C

  • 第5题:

    Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()

    • A、ARP
    • B、SSH
    • C、Telnet
    • D、WEP
    • E、SNMPv1
    • F、SNMPv2

    正确答案:B

  • 第6题:

    For what two purposes does the Ethernet protocol use physical addresses?()

    • A、to uniquely identify devices at Layer 2
    • B、to allow communication with devices on a different network
    • C、to differentiate a Layer 2 frame from a Layer 3 packet
    • D、to establish a priority system to determine which device gets to transmit first
    • E、to allow communication between different devices on the same network
    • F、to allow detection of a remote device when its physical address is unknown

    正确答案:A,E

  • 第7题:

    Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS).   The Network Policy Server has a certificate installed.   Client computers are unable to connect to the wireless access points.    You need to enable client computers to connect to the wireless network.   What should you do?()

    • A、Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).
    • B、Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).
    • C、Install a certificate in the Trusted Root Certification Authorities certificate store.
    • D、Install a certificate in the Third-Party Root Certification Authorities certificate store.

    正确答案:C

  • 第8题:

    You have a server that runs the Terminal Services Gateway (TS Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices.  You create a security group named Remote1 for the users who need to connect to computers in their offices.  You need to enable the users to connect to the TS Gateway. What should you do?()

    • A、Add the Remote1 security group to the local remote desktop users group on the TS Gateway server.
    • B、Create a client authorization policy. Add the Remote1 security group and enable Device redirection.
    • C、Create a resource authorization policy. Add the Remote1 security group and enable Users to connect to any resource.
    • D、Create a Group Policy object and enable the Set TS Gateway authentication method properties to Ask for credentials, use Basic protocol. Apply the policy to the TS Gateway server.

    正确答案:B

  • 第9题:

    You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()

    • A、Configure the DSL connection to use PPTP instead of L2TP. 
    • B、Enable Internet Connection Sharing for the DSL connection properties. 
    • C、CLEAR THE Use default gateway on remote network check box. 
    • D、Clear the Require data encryption check box. 

    正确答案:C

  • 第10题:

    多选题
    For what two purposes does the Ethernet protocol use physical addresses?()
    A

    to uniquely identify devices at Layer 2

    B

    to allow communication with devices on a different network

    C

    to differentiate a Layer 2 frame from a Layer 3 packet

    D

    to establish a priority system to determine which device gets to transmit first

    E

    to allow communication between different devices on the same network

    F

    to allow detection of a remote device when its physical address is unknown


    正确答案: E,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements accurately describe a broadcast domain?()
    A

    Broadcast domains consist of devices that connect to a common switch or hub.

    B

    Broadcast domains consist of a group of devices that can be reached by sending a frame addressed to the Layer 2 broadcast address.

    C

    Broadcast domains require a gateway device such as a router.

    D

    Broadcast domains consist of devices that reside on the same sub-network.


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    单选题
    You have a server named Server2 that runs Windows Server 2003 Service Pack 2 (SP2). The server has two network connections named Local Area Connection and Internet Connection.You configure network address translation (NAT) on Server2 as shown in the exhibit. (Click the Exhibit button.) You configure all client computers to use Server2 as their default gateway.Users report that they cannot connect to the Internet. You successfully connect to the Internet from Server2.You need to ensure that client computers can access Internet resources.  What should you do?()
    A

    Change the Internet Connection interface type to Basic firewall only. 

    B

    Change the Internet Connection interface type to Private interface connected to private network. 

    C

    Add Local Area Connection as a new interface for the NAT protocol and set the interface as a Public interface connected to the Internet. 

    D

    Add Local Area Connection as a new interface for the NAT protocol and set the new interface as a Private interface connected to private network.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    is a one-way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string.(67)is a protocol that most USENET machines how use it to allow news articles to propagate from one machine to another over a reliable connection.(68)is an approach preferred by cable TV providers. In this solution the fiber terminates at an optoelectrical converter and the final segment is a shared coaxial cable.(69)is a device used to connect two separate network that use different communication protocol.(70)js a digital

    A.MD

    B.RSA

    C.DES

    D.MIB


    正确答案:A
    解析:本题主要考查加密理论中的消息摘要(messagedigest)的简写MD。答案为A。

  • 第14题:

    A socket is basically an end point of a communication link between two applications. Sockets that extend over a network connect two or more applications running on(61)computers attached to the network. A socket(62)two addresses:(63). Sockets provide a(64)communication channel between one or more systems.There are(65)sockets separately using TCP and UDP.

    A.unique

    B.separate

    C.same

    D.dependent


    正确答案:B

  • 第15题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    • A、Allow unrestricted access to the console or VTY ports
    • B、Use a firewall to restrict access from the outside to the network devices
    • C、Always use Telnet to access the device command line because its data is automatically encrypted
    • D、Use SSH or another encrypted and authenticated transport to access device configurations
    • E、Prevent the loss of passwords by disabling password encryption

    正确答案:B,D

  • 第16题:

    What is a static packet-filtering firewall used for ?()

    • A、It validates the fact that a packet is either a connection request or a data packet belonging to a connection
    • B、It evaluates network packets for valid data at the application layer before allowing connections
    • C、It analyzes network traffic at the network and transport protocol layers
    • D、It keeps track of the actual communication process through the use of a state table

    正确答案:C

  • 第17题:

    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

    • A、Allow unrestricted access to the console or VTY ports.
    • B、Use a firewall to restrict access from the outside to the network devices.
    • C、Always use Telnet to access the device command line because its data is automatically encrypted.
    • D、Use SSH or another encrypted and authenticated transport to access device configurations.
    • E、Prevent the loss of passwords by disabling password encryption. 

    正确答案:B,D

  • 第18题:

    You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company’s main office is in Barcelona, and it has branch offices in Paris and London. The company has no immediate plans to expand or relocate the offices.   The company wants to connect the office networks by using a frame relay WAN connection and Routing and Remote Access servers that are configured with frame relay WAN adapters. Computers in each office will be configured to use the local Routing and Remote Access server as a default gateway. You are planning the routing configuration for the Routing and Remote Access servers.   You need to allow computers in Barcelona, Paris, and London to connect to computers in any office. You want to minimize routing traffic on the WAN connection.   What should you do?  ()

    • A、 At each office, add the OSPF routing protocol to Routing and Remote Access, add the WAN adapter to the OSPF routing protocol, and deploy OSPF as a single-area internetwork.
    • B、 At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 broadcast and the incoming packet protocol as RIP version 1 and 2.
    • C、 At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 multicast and the incoming packet protocol as RIP version 2 only.
    • D、 At each office, configure the Routing and Remote Access server with static routes to the local networks at the other two offices.

    正确答案:D

  • 第19题:

    You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. The company has many remote users One of the servers on the network calledServer01 has the Terminal Services Gateway (TS Gateway) role installed on it. The remote users of thecompany need to connect remotely to desktop computers located in their offices through the gateway. Toensure secure connection to the gateway, you created a security group named RemoteUsersGrp1 for theremote users who need to connect to computers in their offices. Which of the following options would youchoose to enable the remote users to connect to the TS Gateway? ()

    • A、Create a resource authorization policy.
    • B、Create a client authorization policy.
    • C、Create a Group Policy object enable the Set TS Gateway authentication method properties to Ask forcredentials,use Basic protocol.
    • D、Add the RemoteUsersGrp1 security group and enable Device redirection.

    正确答案:B,D

  • 第20题:

    Network topology exhibit: You are the administrator at ExamSheet.net.  You use TCP/IP as the only protocol on your network. The network is configured as in the network topology exhibit. All existing computers and devices use 255.255.240.0 as the subnet mask. You install Windows 2000 Professional on a computer named ExamSheet2. You configure ExamSheet2 to have a TCP/IP address of 10.10.20.234, a default gateway of 10.10.20.1, a subnet mask of 255.255.0.0 and a WINS server address of 10.10.13.10. You cannot connect to  shared resources on ExamSheetB by using its UNC name. You want ExamSheet2 to be able to connect to ExamSheetB. What should you do? ()

    • A、Install a WINS server on the same segment as Company2
    • B、Install and configure a DNS server and configure Company2 to use the DNS Server service.
    • C、Configure Company2 with a default gateway address 10.10.13.1.
    • D、Configure Company2 with a default gateway address of 10.10.30.1.
    • E、Configure Company2 with a TCP/IP address of 10.10.20.234.

    正确答案:E

  • 第21题:

    单选题
    What is a static packet-filtering firewall used for ?()
    A

    It validates the fact that a packet is either a connection request or a data packet belonging to a connection

    B

    It evaluates network packets for valid data at the application layer before allowing connections

    C

    It analyzes network traffic at the network and transport protocol layers

    D

    It keeps track of the actual communication process through the use of a state table


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Rewrite rules are used in which CoS scenario?()
    A

    When a single device is configured to provide differentiated services.

    B

    When multiple devices in a network are configured to use CoS to provide differentiated services.

    C

    When a device is used to connect to another autonomous system.

    D

    When CoS is used to classifiy traffic as low priority.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()
    A

    ARP

    B

    SSH

    C

    Telnet

    D

    WEP

    E

    SNMPv1

    F

    SNMPv2


    正确答案: C
    解析: 暂无解析