You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.Teleworke

题目

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()

A.Campus

B.Teleworker

C.Branch

D.Data center


相似考题
参考答案和解析
参考答案:C
更多“You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is”相关问题
  • 第1题:

    You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()

    • A、 Easy VPN
    • B、 IPsec GRE tunneling
    • C、 Virtual Tunnel Interfaces
    • D、 Dynamic Multipoint VPN

    正确答案:D

  • 第2题:

    Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()

    • A、Apply an IPsec NAP policy.
    • B、Configure a NAP policy for 802.1X wireless connections.
    • C、Configure VPN connections to use MS-CHAP v2 authentication.
    • D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.

    正确答案:A

  • 第3题:

    You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?() 

    • A、Configure the wireless network connection on Pro1 so that it has an IP address of 192. 168. 0. 2.
    • B、Disable and then re-enable Internet Connection Sharing (ICS) on Pro1.
    • C、Create a network bridge between the wired and wireless connections on Pro1.  
    • D、Clear the Allow other network users to control or disable the shared Internet connection check box in the advanced properties of the VPN connection.

    正确答案:C

  • 第4题:

    You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.   What must you do so that you can access the Internet?()

    • A、Configure the ISDN connection to use SLIP instead of PPP.
    • B、Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.
    • C、Clear the Use default gateway on remote network check box.
    • D、Install and configure the SAP Agent service.

    正确答案:C

  • 第5题:

    单选题
    You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only. A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company's VPN. They must have 24-hour access to the files on Server1. You need to be able to identify the source of the recurring slowdowns in VPN access. First, you log on to Server1. What should you do next?()
    A

    Use Task Manager to review network utilization of the VPN adapter.

    B

    Use the Performance console to create a log of network utilization outside of business hours.

    C

    Use System Monitor to review network utilization of the VPN connection.

    D

    Use Task Manager to select Bytes Sent as the Network Adapter History setting.


    正确答案: B
    解析: 暂无解析

  • 第6题:

    单选题
    You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()
    A

    msi

    B

    mst

    C

    zap

    D

    zip


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()
    A

    Acct-Session-Id

    B

    Acct-Status-Type

    C

    Class

    D

    NAS-Identifier


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()
    A

     Easy VPN

    B

     IPsec GRE tunneling

    C

     Virtual Tunnel Interfaces

    D

     Dynamic Multipoint VPN


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    You are the network administrator for Company.  You configure an L2TP virtual private network (VPN) connection on your Windows 2000 Professional computer to remotely access Company’s Windows 2000 Routing and Remote Access server. The server is configured to accept a limited number of both PPTP and L2TP connections. You configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically. Many times when you try to connect, you are unable to because all of the ports are in use. Other times you are able to connect successfully.   You want to increase your chances of being able to connect to the server while ensuring that the most secure connection type available is used.   What should you do? ()
    A

    Enable the VPN connection to use MS-CHAP.

    B

    Specify a TCP/IP address in the Network properties.

    C

    Change the data encryption setting to Optional Encryption.

    D

    Configure the Type of VPN server I am calling to be Automatic.

    E

    Configure the Type of VPN server I am calling to be PPTP.


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You use a Windows 2000 Professional computer at home. You need to access shared files on a server named server1. This server is on your company’s network and is not accessible from the internet. Your company’s network also includes a third party VPN server that is accessible from the internet. You dial in to your internet service provider and then create a VPN connection to your company’s VPN server. After the connection is successfully established, you run the net view//server1 command and receive the following error ‘the server is inaccessible or could not be found’. You need to access the shared files on server 1. What should you do? ()
    A

    Stop and then start the TCP/IP NetBIOS helper service on your computer.

    B

    Stop and then start the DNS client service on your computer.

    C

    Add a HOSTS entry for server1 to your computer.

    D

    Add a LMHOSTS entry for server1 to your computer.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()

    • A、Campus
    • B、Teleworker
    • C、Branch
    • D、Data center

    正确答案:C

  • 第12题:

    Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()

    • A、Acct-Session-Id
    • B、Acct-Status-Type
    • C、Class
    • D、NAS-Identifier

    正确答案:C

  • 第13题:

    Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()

    • A、Open port 1423 on the firewall.
    • B、Open port 1723 on the firewall.
    • C、Open port 3389 on the firewall.
    • D、Open port 6000 on the firewall.

    正确答案:B

  • 第14题:

    You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()

    • A、Configure the DSL connection to use PPTP instead of L2TP. 
    • B、Enable Internet Connection Sharing for the DSL connection properties. 
    • C、CLEAR THE Use default gateway on remote network check box. 
    • D、Clear the Require data encryption check box. 

    正确答案:C

  • 第15题:

    单选题
    All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows 7. What should you do?()
    A

    Set the VPN server to Layer 2 Tunneling Protocol.

    B

    Set the VPN server to Secure Socket Tunneling Protocol.

    C

    Set the VPN server to Internet Key Exchange version 2.

    D

    Configure the Direct Access feature on the VPN server.


    正确答案: C
    解析: 暂无解析

  • 第16题:

    单选题
    As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you which Cisco VPN Acceleration Module for Cisco 7200 Series routers and the Cisco 7301 provides high-performance encryption/compression and supports the latest encryption standard. Which of the following will answer his question?()
    A

    AES

    B

    Cisco IPS

    C

    Cisco Network Assistant

    D

    Cisco VAM2+


    正确答案: B
    解析: 暂无解析

  • 第17题:

    单选题
    Your company has users who connect remotely to the main office through a Windows Server 2008 VPN server.You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do?()
    A

    Create a network policy for VPN connections. Modify the Day and time restrictions.

    B

    Create a network policy for VPN connections. Apply an IP filter to deny access to the corporate network.

    C

    Modify the Logon hours for all user objects to specify only the VPN server on the Computer restrictions option.

    D

    Modify the Logon Hours for the default domain policy to enable the Force logoff when logon hours expire option.


    正确答案: A
    解析: 暂无解析

  • 第18题:

    多选题
    You work as a network technician at Company. Your boss, Mrs., is interested in  the Cisco Compatible Extensions program.  What are three features of this program? ()
    A

    Accounting

    B

    Analog and digital voice

    C

    Mobility

    D

    Security

    E

    Routing and switching

    F

    VLAN and QoS


    正确答案: B,A
    解析: 暂无解析

  • 第19题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()
    A

     Configure the system event log to Do not overwrite.

    B

     In IAS, in Remote Access Logging, enable the Authentication requests setting.

    C

     Configure the Remote Access server to Log all events.

    D

     Create a custom remote access policy and configure it for Authentication-Type.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet.   The company’s written security policy includes the following requirements for VPN connections over the Internet:  All data must be encrypted with end-to-end encryption.  VPN connection authentication must be at the computer level.   Credential information must not be transmitted over the Internet as part of the authentication process.   You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy.   What should you do?  ()
    A

     Use a PPTP connection with EAP-TLS authentication.

    B

     Use a PPTP connection with MS-CHAP v2 authentication.

    C

     Use an L2TP connection with EAP-TLS authentication.

    D

     Use an L2TP connection with MS-CHAP v2 authentication.


    正确答案: D
    解析: 暂无解析