VPN connections allow users working at home or on the road to connect in a secure fashion to a ( ) corporate server using the routing infrastructure provided by a public internetwork (such as the Internet). From the user&39;s perspective, the VPN connecti

题目

VPN connections allow users working at home or on the road to connect in a secure fashion to a ( ) corporate server using the routing infrastructure provided by a public internetwork (such as the Internet). From the user&39;s perspective, the VPN connection is a point-to-point connection between the user&39;s computer and a corporate ( ). The nature of the ( ) internetwork is irrelevant to the user because it appears as if the data is being sent over a dedicated ( ) link. VPN technology also allows a corporation to connect to branch offices or to other companies over a public internetwork, while maintaining secure ( ). The VPN connection across the Internet logically operates as a wide area network link between the sites.

A.customer B.network C.remote D.local A.router B.client C.host D.server A.medium B.intermediate C.remote D.local A.network B.private C.public D.local A.technology B.server C.host D.communications


相似考题
参考答案和解析
正确答案:C,D,B,B,D
更多“VPN connections allow users working at home or on the road to connect in a secure fashion ”相关问题
  • 第1题:

    You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet.  What should you do?()

    • A、On the VPN server, enable LAN routing.
    • B、On the VPN server, create a demand-dial interface.
    • C、On the firewall, allow inbound connections that use TCP port 1701.
    • D、On the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.

    正确答案:D

  • 第2题:

    You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()

    • A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
    • B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.
    • C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
    • D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

    正确答案:B

  • 第3题:

    单选题
    You deploy a Windows Server 2008 R2 VPN server behind a firewall. Remote users connect to theVPN by using portable computers that run Windows 7. The firewall is configured to allow only secured Web communications.You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall. What should you do?()
    A

    Create an IPsec tunnel.

    B

    Create an SSTP VPN connection.

    C

    Create a PPTP VPN connection.

    D

    Create an L2TP VPN connection.


    正确答案: A
    解析: 暂无解析

  • 第4题:

    多选题
    Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()
    A

    MAC address

    B

    DNS server

    C

    DHCP server

    D

    resolve address

    E

    endpoint address


    正确答案: D,E
    解析: 暂无解析

  • 第5题:

    单选题
    You deploy a Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack.  The firewall is configured to allow only secured Web communications. You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall.What should you do?()
    A

    Create an IPsec tunnel.

    B

    Create an SSTP VPN connection.

    C

    Create a PPTP VPN connection.

    D

    Create an L2TP VPN connection.


    正确答案: B
    解析: 暂无解析

  • 第6题:

    单选题
    Your company hires 10 new employees. You want the new employees to connect to the main office through a VPN connection. You create new user accounts and grant the new employees the Allow Read and Allow Execute permissions to shared resources in the main office. The new employees are unable to access shared resources in the main office. You need to ensure that users are able to establish a VPN connection to the main office What should you do()
    A

    Grant the new employees the Allow Full control permission.

    B

    Grant the new employees the Allow Access Dial-in permission.

    C

    Add the new employees to the Remote Desktop Users security group.

    D

    Add the new employees to the Windows Authorization Access security group.


    正确答案: C
    解析: 暂无解析

  • 第7题:

    多选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet.   What are two possible ways to achieve this goal?()
    A

    Monitor the events in the application log on Server1.

    B

    Monitor the events in the security log on Server1.

    C

    Monitor the Web server connections on Server1 by using a performance log.

    D

    Monitor network traffic to Server1 by using Network Monitor.

    E

    Monitor the IIS logs on Server1.


    正确答案: C,D
    解析: 暂无解析

  • 第8题:

    单选题
    You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet.  What should you do?()
    A

    On the VPN server, enable LAN routing.

    B

    On the VPN server, create a demand-dial interface.

    C

    On the firewall, allow inbound connections that use TCP port 1701.

    D

    On the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()

    • A、Select L2TP/IPSec on each Windows Mobilebased device.
    • B、Obtain and install a certificate on each Windows Mobilebased device.
    • C、Configure the appropriate pre-shared key on each Windows Mobilebased device.
    • D、Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.

    正确答案:A,B

  • 第10题:

    Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible.  What should you do()? 

    • A、Apply an IPsec NAP policy.
    • B、Configure a NAP Policy for 802.1x Wireless connections
    • C、Configure VPN connections to use MS-CHAP v2 authentication
    • D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP

    正确答案:A

  • 第11题:

    单选题
    An employee cannot access the company database. You check the connection variables: What is a valid explanation for why one of the users is unable to connect to the database?()
    A

    Bob has max_user_connections set to zero, which blocks all his connections

    B

    Joe has exceeded the max_user_connections global limit

    C

    All users are blocked because max_user_connections is accumulated over the host account information

    D

    Kay is already connected elsewhere and attempting to log in again

    E

    Connect_timeout is too small to allow a connection to occur


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall.  What should you do ( )?
    A

    Create an IPsec tunnel

    B

    Create an SSTP VPN connection

    C

    Create a PPTP VPN connection

    D

    Create an L2TP VPN connection


    正确答案: D
    解析: 暂无解析

  • 第13题:

    单选题
    Your company has users who connect remotely to the main office through a Windows Server 2008 VPN server.You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do?()
    A

    Create a network policy for VPN connections. Modify the Day and time restrictions.

    B

    Create a network policy for VPN connections. Apply an IP filter to deny access to the corporate network.

    C

    Modify the Logon hours for all user objects to specify only the VPN server on the Computer restrictions option.

    D

    Modify the Logon Hours for the default domain policy to enable the Force logoff when logon hours expire option.


    正确答案: A
    解析: 暂无解析

  • 第14题:

    单选题
    You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains three member servers named Server1,Server2,and Server3.    The three member servers are connected to the Internet. You plan to implement remote access to the company network for users that work from home. You configure and enable Routing and Remote Access on Server1 and Server2. An assistant,who is an administrator on all member servers, configures and enables Routing and Remote Access on Server3. Users from the domain can successfully establish VPN connections from the lnternet to Server1 and Server2. However,users cannot establish a VPN connection to Server3. You discover that Server3 can only authenticate Internet VPN connections from local user accounts.    You need to ensure that users from the domain can successfully establish a VPN connection to Server3.  What should you do?()
    A

     Enable the Server3 computer account in Active Directory as trusted for delegation.

    B

     Assign the Authenticated Users group the Allow - Allowed to Authenticate permission for the Server3 computer acc

    C

     Assign the Server3 computer account the Allow. Read permission on the RAS and IAS Servers access Check cont

    D

     Add the Server3 computer account to the RAS and IAS Servers security group.

    E

     Add the Server3 computer account to the Windows Authorization Access Group security group.


    正确答案: C
    解析: 暂无解析

  • 第15题:

    单选题
    You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()
    A

     Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.

    B

     Allow all inbound VPN traffic to pass through the perimeter firewall only.

    C

     Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.

    D

     Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.


    正确答案: B
    解析: 暂无解析