单选题An organization hires a contractor who only needs access to email and a group calendar. They donot need administrator access to the computer. Which VPN model is the most appropriate?()AThin ModelBThick ClientCPort ForwardingDClientless AccessELayer 3 N

题目
单选题
An organization hires a contractor who only needs access to email and a group calendar. They donot need administrator access to the computer. Which VPN model is the most appropriate?()
A

 Thin Model

B

 Thick Client

C

 Port Forwarding

D

 Clientless Access

E

 Layer 3 Network Access


相似考题
参考答案和解析
正确答案: B
解析: 暂无解析
更多“单选题An organization hires a contractor who only needs access to email and a group calendar. They donot need administrator access to the computer. Which VPN model is the most appropriate?()A  Thin ModelB  Thick ClientC  Port ForwardingD  Clientless AccessE ”相关问题
  • 第1题:

    When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()

    • A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1
    • B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment
    • C、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place
    • D、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

    正确答案:A

  • 第2题:

    An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()

    • A、Thin Model
    • B、Thick Client
    • C、Port Forwarding
    • D、Clientless Access
    • E、Layer 3 Network Access

    正确答案:D

  • 第3题:

    Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()

    • A、WPA-PSK encryption
    • B、SSID broadcast
    • C、Port forwarding
    • D、MAC filtering

    正确答案:A

  • 第4题:

    Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping ruleset would result in the correct access privileges being assigned?()

    • A、username="*" -> Employee-role Stop username="con-*" -> Contractor-role
    • B、username="*" -> Employee-role username="con-*" -> Contractor-role Stop
    • C、username="con-*" -> Contractor-role Stop username="*" -> Employee-role
    • D、username="con-*" -> Contractor-role username="*" -> Employee-role Stop

    正确答案:C

  • 第5题:

    单选题
    An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()
    A

    The MAC can only be delivered to a mobile phone and is good for a single use only.

    B

    The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.

    C

    The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.

    D

    The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.


    正确答案: A
    解析: 暂无解析

  • 第6题:

    单选题
    An organization hires a contractor who only needs access to email and a group calendar. They donot need administrator access to the computer. Which VPN model is the most appropriate?()
    A

     Thin Model

    B

     Thick Client

    C

     Port Forwarding

    D

     Clientless Access

    E

     Layer 3 Network Access


    正确答案: E
    解析: 暂无解析

  • 第7题:

    单选题
    Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping ruleset would result in the correct access privileges being assigned?()
    A

    username=* -> Employee-role Stop username=con-* -> Contractor-role

    B

    username=* -> Employee-role username=con-* -> Contractor-role Stop

    C

    username=con-* -> Contractor-role Stop username=* -> Employee-role

    D

    username=con-* -> Contractor-role username=* -> Employee-role Stop


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    You are a Windows Server 2008 systems administrator responsible for configuring FTP Publishing Servicefor use by members of your organization’s engineering department. The name of the server is FTPServer01. Several users have reported that they are able to access most files through the FTP site,but they cannot access the contents of the Drawings folder. You have verified that these users. Windowsaccounts have the correct file system permissions for this folder. You want to minimize the permissionsgranted to all the users. Which of the following changes should you make to enable users to access thisfolder?()
    A

    Change the permissions for the IUSR_FTPServer01 account on the Drawings folder.

    B

    Create new TCP/IP Address Restrictions entries for the users who cannot access the Drawings folder.

    C

    Disable the Allow Only Anonymous Connections option.

    D

    Add the users to the local Administrators group on FTPServer02.


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()
    A

    tracert

    B

    msconfig

    C

    route

    D

    net use


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
    A

    Port security needs to be globally enabled.

    B

    Port security needs to be enabled on the interface.

    C

    Port security needs to be configured to shut down the interface in the event of a violation.

    D

    Port security needs to be configured to allow only one learned MAC address.

    E

    Port security interface counters need to be cleared before using the show command.

    F

    The port security configuration needs to be saved to NVRAM before it can become active.


    正确答案: E,B
    解析: 暂无解析

  • 第11题:

    单选题
    You are the administrator of your company’s network. A user named Paul in the service department has a Windows 2000 Professional computer.  Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.  What should you do? ()
    A

    Grant Paul NTFS permission so that he can access any parent folder to files in the shared   folder.

    B

    Share the Sales folder and grant Paul shared folder permission to access the shared Sales   folder.

    C

    Remove Paul from any other group that has been explicitly denied access to the Sales folder. 

    D

    Delete the Sales local group and recreate it. Add individual user accounts from the Sales   Department back into Sales local group.


    正确答案: D
    解析: The Sales group, which Paul is a member of, has permission to access the files. However, Paul still cannot access the files. It would seem that Paul has a permissions conflict. A user can be granted file permissions in a number of contexts: as a user or as a member of a user group. When a user has different file permissions in a multiple contexts, the most restrictive permission is applied. Furthermore, the deny permission overrides all other permissions. As Paul does not have access to the file you must therefore assume Paul has explicitly been denied access to the file in some context, as member of one or more groups that have been denied access to the file. You would thus have to remove Paul from such a group so that the restriction is not applied to Paul.

  • 第12题:

    单选题
    When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()
    A

     It is recommended to place the VPN termination device in line with the Enterprise Edge 1

    B

     Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment

    C

     VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place

    D

     Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7


    正确答案: A
    解析: 暂无解析

  • 第13题:

    An organization hires a contractor who only needs access to email and a group calendar. They donot need administrator access to the computer. Which VPN model is the most appropriate?()

    • A、 Thin Model
    • B、 Thick Client
    • C、 Port Forwarding
    • D、 Clientless Access
    • E、 Layer 3 Network Access

    正确答案:D

  • 第14题:

    A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()

    • A、Request the user to logoff and log back on.
    • B、Add the user as an administrator on their local machine.
    • C、Add the user as an administrator on the server.
    • D、Run an ipconfig /renew on the user’s machine.

    正确答案:A

  • 第15题:

    An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()

    • A、The MAC can only be delivered to a mobile phone and is good for a single use only.
    • B、The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.
    • C、The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.
    • D、The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

    正确答案:B

  • 第16题:

    You are the administrator of your company’s network. A user named Paul in the service department has a Windows 2000 Professional computer.  Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.  What should you do? ()

    • A、Grant Paul NTFS permission so that he can access any parent folder to files in the shared   folder.
    • B、Share the Sales folder and grant Paul shared folder permission to access the shared Sales   folder.
    • C、Remove Paul from any other group that has been explicitly denied access to the Sales folder. 
    • D、Delete the Sales local group and recreate it. Add individual user accounts from the Sales   Department back into Sales local group.

    正确答案:C

  • 第17题:

    单选题
    An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
    A

    Thin Model

    B

    Thick Client

    C

    Port Forwarding

    D

    Clientless Access

    E

    Layer 3 Network Access


    正确答案: A
    解析: 暂无解析

  • 第18题:

    单选题
    A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()
    A

    Request the user to logoff and log back on.

    B

    Add the user as an administrator on their local machine.

    C

    Add the user as an administrator on the server.

    D

    Run an ipconfig /renew on the user’s machine.


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    Your network contains a server that runs Windows Server 2008 R2. The server has the Network Policy and Access Services server role installed. You need to allow only members of a global group named Group1 VPN access to the network. What should you do? ()
    A

    Add Group1 to the RAS and IAS Servers group.

    B

    Add Group1 to the Network Configuration Operators group.

    C

    Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.

    D

    Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    What is the benefit of using the Cisco Easy VPN Server feature along with the Cisco software VPN client for implementing remote-access VPNs? ()
    A

     The Cisco Easy VPN Server feature and the Cisco software VPN client use the same GUI configuration tool to simplify remote-access VPN configurations.

    B

     The Cisco Easy VPN Server feature allows the Cisco software VPN client to receive its security policies from the central site VPN device. This minimizes the configuration requirements at the remote location for large remote access VPN deployments.

    C

     The Cisco Easy VPN Server feature and the Cisco software VPN client use hardware-based encryption to reduce the CPU overhead of the central site VPN router.

    D

     The Cisco Easy VPN Server feature and the Cisco software VPN client enable scalable remote-access VPNs deployment by using a thick client/thin server model where the central site VPN router can handle thousands of incoming VPN connections.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which remote access VPN addressing technique supports a static IP address to support a specific application?()
    A

    Use a staticip addresses based on incoming user policies.

    B

    Use DHCP to assign addresses based on incoming user policies.

    C

    Deploy a clientless model to assign a unique address to the user.

    D

    Deploy RADIUS or LDAP to assign the address to the user.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()
    A

    The laptop is missing the software supplicant

    B

    The access point SSID is hidden.

    C

    The laptop only supports TKIP and AES encryption,

    D

    The access point is on the wrong channel.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()
    A

    Implement preventative measures.

    B

    Close the issue.

    C

    Document the outcome.

    D

    Question other users to make sure they are not having the same issue


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    An enterprise has plans to start adding IPv6 support. The initial deployment requires support from some IPv6 - only device s that need to access servers that support only IPv4. Which of the following tools would be most appropriate?()
    A

    Native IPv6

    B

    Point - to -point tunnels

    C

    Multipoint tunnels

    D

    NAT - PT


    正确答案: D
    解析: 暂无解析