Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()
第1题:
In 8011 terminology.all communication was to go through the base station, called an(75)
A.Access Channel
B.Access System
C.Access Point
D.Network Access Point
第2题:
To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise network. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(71). Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(72) activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access has been prohibitive. Fifty-two percent of surveyed CISOs stated that they currently use a moat and castle" security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch(73) of service attacks or steal(74) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with(75) and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.
A.damageable
B.susceptible
C.vulnerable
D.changeable
第3题:
Which three of the following basic network services are provided by the Cisco IOS?()
第4题:
NAS是指()。
第5题:
How is network layer addressing accomplished in the OSI protocol suite?()
第6题:
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling. You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home. What are two possible ways to achieve this goal?()
第7题:
Your network contains a single Active Directory domain. All domain controllers run Windows Server 2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches. You need to recommend a strategy for network access that meets the following requirements: èUsers are unable to bypass network access restrictions. èOnly client computers that have up-to-date service packs installed can access the network. èOnly client computers that have up-to-date anti-malware software installed can access the network. What should you recommend?()
第8题:
“Storage Area Network”
“Near Attached Storage”
“Network Access Storage”
“Near Access Storage”
第9题:
When you configure access to the wired network at home, set the wired network adapter location type to Public.
When you configure access to the wired network at home, set the wired network adapter location type to Private.
When you configure access to the public wireless access points, set the wireless network adapter location type to Public.
When you configure access to the public wireless access points, set the wireless network adapter location type to Private.
第10题:
Junos Pulse
Java Agent
Odyssey Access Client
Native 802.1X supplicant
第11题:
Add Group1 to the RAS and IAS Servers group.
Add Group1 to the Network Configuration Operators group.
Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.
Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.
第12题:
From Credential Manager, modify the generic credentials.
From Credential Manager, modify the Windows credentials.
From Network and Sharing Center, turn on Network discovery.
From Network and Sharing Center, modify the wireless network connection settings.
第13题:
A.Allow unrestricted access to the console or VTY ports
B.Use a firewall to restrict access from the outside to the network devices
C.Always use Telnet to access the device command line because its data is automatically encrypted
D.Use SSH or another encrypted and authenticated transport to access device configurations
E.Prevent the loss of passwords by disabling password encryption
第14题:
第15题:
SAN(存储区域网络)术语的全称是()。
第16题:
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
第17题:
Service Level Agreements (SLA) typically do not address()
第18题:
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()
第19题:
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
第20题:
WEP encryption
Channel rotation
Disable SSID
WPA encryption
第21题:
Allow unrestricted access to the console or VTY ports
Use a firewall to restrict access from the outside to the network devices
Always use Telnet to access the device command line because its data is automatically encrypted
Use SSH or another encrypted and authenticated transport to access device configurations
Prevent the loss of passwords by disabling password encryption
第22题:
Add Group1 to the RAS and IAS Servers Group
Add Group1 to the Network Configuration Operators group
Create a new network policy and define a group-based connection for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1
Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access Granted. Set the processing of the policy to 3.
第23题:
ACL
RDF
RAS
ARP
第24题:
Configure the system event log to Do not overwrite.
In IAS, in Remote Access Logging, enable the Authentication requests setting.
Configure the Remote Access server to Log all events.
Create a custom remote access policy and configure it for Authentication-Type.