is a mechanism used for protecting the users outside of network from accessing some non-authorized computer resources.
A.Network Card
B.protocol
C.Firewall
D.Router
第1题:
A. to associate more than one realm with an authentication server
B. to logically group network access devices and associate them with specific sign-in policies
C. to allow or prevent users from accessing resources in specific locations on the network
D. to define the URL that users of network access devices can use to access the Infranet Controller
第2题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()
A.A
B.B
C.C
D.D
第3题:
Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.
A.network B.virus C.security D.architecture
第4题:
第5题:
第6题:
Which of the following should a technician do FIRST to troubleshoot a users network connectivity problem?()
第7题:
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
第8题:
What is the primary purpose of creating a Location Group Policy? ()
第9题:
You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()
第10题:
Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer. What should you do?()
第11题:
You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()
第12题:
On Folder1, modify the share permissions.
On Folder1, modify the NTFS permissions.
Add all local user accounts to the Guests group.
Add all local user accounts to the Network Configuration Operators group.
第13题:
Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()
A.Configure a Windows Connect Now Group Policy.
B.Configure a Wireless Network (IEEE 802.11) Policy.
C.Delete the rogue network from the Network and Sharing Center on each computer.
D.Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.
第14题:
Computer( )focuses on protecting information ,hardware ,and software from unauthorized use and damage.
A.network B.virus C.security D.architecture
第15题:
A.Allow unrestricted access to the console or VTY ports
B.Use a firewall to restrict access from the outside to the network devices
C.Always use Telnet to access the device command line because its data is automatically encrypted
D.Use SSH or another encrypted and authenticated transport to access device configurations
E.Prevent the loss of passwords by disabling password encryption
第16题:
第17题:
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
第18题:
Which of the following is the correct path to add new local user accounts to a Windows 7computer?()
第19题:
The technician needs to map a network share to the user’s Windows 7 computer from thecommand prompt. Which of the following commands will the technician execute?()
第20题:
You administer a Windows 2000 network at Company's main office. You have purchased 15 new Windows 2000 Professional computers that will be used in the finance department. The new computers are equipped with a fax modem. You install the Fax service with the default values and settings on each computer. You want to prevent users from using the Control Panel to remove the fax printer. What should you do?()
第21题:
Your network contains a server named Server1. Server1 has DirectAccess deployed. A group named Group1 is enabled for DirectAccess. Users report that when they log on to their computers, the computers are not configured to use DirectAccess. You need to ensure that the users computers are configured to use DirectAccess. What should you do first?()
第22题:
Your network contains an Active Directory forest. The forest contains multiple sites. You need to enable universal group membership caching for a site. What should you do()
第23题:
IPSec VPN
SSL VPN
port security
port security with statically configured MAC addresses
private VLANs