Gateway is a device used to connect two separate network that use(2)communication protocol.
A.same kind of
B.similar
C.different
D.same
第1题:
You are the network administrator for Ezonexam.com. You configure a shared printer on a Windows 2000 Server computer. The printer connects to a Hewlett Packard JetDirect print device that uses DLC. This print device is on the same network segment as the server.
Six months later, you relocate the print device to a different network segment. Users report that they are able to send print jobs to the printer but that their print jobs no longer print.
You need to ensure that the printer and the print device are working properly. What should you do?
A.Configure the JetDirect print device to use DHCP.
B.Uninstall and reinstall the DLC protocol from the server.
C.Configure the printer and the JetDirect print device to use the LPR printing protocol.
D.Delete the printer. Re-create the printer by using DLC to connect to the JetDirect print device.
第2题:
is a one -way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string.
(72) is a protocol that most USENET machines now use it to allow news articles to propagate from one machine to another over a reliable connection.
(73) is an approach preferred by cable TV providers. In this solution the fiber terminates at an optoelectrical converter and the final segment is a shared coaxial cable.
(74) is a device used to connect two separate network that use different communication protocol.
(75) is a digital-to-digital polar encoding method in which the signal level is always either positive or negative.
A.MD
B.RSA
C.DES
D.MIB
第3题:
A.Allow unrestricted access to the console or VTY ports
B.Use a firewall to restrict access from the outside to the network devices
C.Always use Telnet to access the device command line because its data is automatically encrypted
D.Use SSH or another encrypted and authenticated transport to access device configurations
E.Prevent the loss of passwords by disabling password encryption
第4题:
A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()
第5题:
Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()
第6题:
For what two purposes does the Ethernet protocol use physical addresses?()
第7题:
Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS). The Network Policy Server has a certificate installed. Client computers are unable to connect to the wireless access points. You need to enable client computers to connect to the wireless network. What should you do?()
第8题:
You have a server that runs the Terminal Services Gateway (TS Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices. You create a security group named Remote1 for the users who need to connect to computers in their offices. You need to enable the users to connect to the TS Gateway. What should you do?()
第9题:
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()
第10题:
to uniquely identify devices at Layer 2
to allow communication with devices on a different network
to differentiate a Layer 2 frame from a Layer 3 packet
to establish a priority system to determine which device gets to transmit first
to allow communication between different devices on the same network
to allow detection of a remote device when its physical address is unknown
第11题:
Broadcast domains consist of devices that connect to a common switch or hub.
Broadcast domains consist of a group of devices that can be reached by sending a frame addressed to the Layer 2 broadcast address.
Broadcast domains require a gateway device such as a router.
Broadcast domains consist of devices that reside on the same sub-network.
第12题:
Change the Internet Connection interface type to Basic firewall only.
Change the Internet Connection interface type to Private interface connected to private network.
Add Local Area Connection as a new interface for the NAT protocol and set the interface as a Public interface connected to the Internet.
Add Local Area Connection as a new interface for the NAT protocol and set the new interface as a Private interface connected to private network.
第13题:
is a one-way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string.(67)is a protocol that most USENET machines how use it to allow news articles to propagate from one machine to another over a reliable connection.(68)is an approach preferred by cable TV providers. In this solution the fiber terminates at an optoelectrical converter and the final segment is a shared coaxial cable.(69)is a device used to connect two separate network that use different communication protocol.(70)js a digital
A.MD
B.RSA
C.DES
D.MIB
第14题:
A socket is basically an end point of a communication link between two applications. Sockets that extend over a network connect two or more applications running on(61)computers attached to the network. A socket(62)two addresses:(63). Sockets provide a(64)communication channel between one or more systems.There are(65)sockets separately using TCP and UDP.
A.unique
B.separate
C.same
D.dependent
第15题:
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
第16题:
What is a static packet-filtering firewall used for ?()
第17题:
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
第18题:
You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company’s main office is in Barcelona, and it has branch offices in Paris and London. The company has no immediate plans to expand or relocate the offices. The company wants to connect the office networks by using a frame relay WAN connection and Routing and Remote Access servers that are configured with frame relay WAN adapters. Computers in each office will be configured to use the local Routing and Remote Access server as a default gateway. You are planning the routing configuration for the Routing and Remote Access servers. You need to allow computers in Barcelona, Paris, and London to connect to computers in any office. You want to minimize routing traffic on the WAN connection. What should you do? ()
第19题:
You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. The company has many remote users One of the servers on the network calledServer01 has the Terminal Services Gateway (TS Gateway) role installed on it. The remote users of thecompany need to connect remotely to desktop computers located in their offices through the gateway. Toensure secure connection to the gateway, you created a security group named RemoteUsersGrp1 for theremote users who need to connect to computers in their offices. Which of the following options would youchoose to enable the remote users to connect to the TS Gateway? ()
第20题:
Network topology exhibit: You are the administrator at ExamSheet.net. You use TCP/IP as the only protocol on your network. The network is configured as in the network topology exhibit. All existing computers and devices use 255.255.240.0 as the subnet mask. You install Windows 2000 Professional on a computer named ExamSheet2. You configure ExamSheet2 to have a TCP/IP address of 10.10.20.234, a default gateway of 10.10.20.1, a subnet mask of 255.255.0.0 and a WINS server address of 10.10.13.10. You cannot connect to shared resources on ExamSheetB by using its UNC name. You want ExamSheet2 to be able to connect to ExamSheetB. What should you do? ()
第21题:
It validates the fact that a packet is either a connection request or a data packet belonging to a connection
It evaluates network packets for valid data at the application layer before allowing connections
It analyzes network traffic at the network and transport protocol layers
It keeps track of the actual communication process through the use of a state table
第22题:
When a single device is configured to provide differentiated services.
When multiple devices in a network are configured to use CoS to provide differentiated services.
When a device is used to connect to another autonomous system.
When CoS is used to classifiy traffic as low priority.
第23题:
ARP
SSH
Telnet
WEP
SNMPv1
SNMPv2