You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()
A.Campus
B.Teleworker
C.Branch
D.Data center
第1题:
You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()
第2题:
Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()
第3题:
You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?()
第4题:
You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet. What must you do so that you can access the Internet?()
第5题:
Use Task Manager to review network utilization of the VPN adapter.
Use the Performance console to create a log of network utilization outside of business hours.
Use System Monitor to review network utilization of the VPN connection.
Use Task Manager to select Bytes Sent as the Network Adapter History setting.
第6题:
msi
mst
zap
zip
第7题:
Acct-Session-Id
Acct-Status-Type
Class
NAS-Identifier
第8题:
Easy VPN
IPsec GRE tunneling
Virtual Tunnel Interfaces
Dynamic Multipoint VPN
第9题:
Enable the VPN connection to use MS-CHAP.
Specify a TCP/IP address in the Network properties.
Change the data encryption setting to Optional Encryption.
Configure the Type of VPN server I am calling to be Automatic.
Configure the Type of VPN server I am calling to be PPTP.
第10题:
Stop and then start the TCP/IP NetBIOS helper service on your computer.
Stop and then start the DNS client service on your computer.
Add a HOSTS entry for server1 to your computer.
Add a LMHOSTS entry for server1 to your computer.
第11题:
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
第12题:
Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()
第13题:
Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()
第14题:
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()
第15题:
Set the VPN server to Layer 2 Tunneling Protocol.
Set the VPN server to Secure Socket Tunneling Protocol.
Set the VPN server to Internet Key Exchange version 2.
Configure the Direct Access feature on the VPN server.
第16题:
AES
Cisco IPS
Cisco Network Assistant
Cisco VAM2+
第17题:
Create a network policy for VPN connections. Modify the Day and time restrictions.
Create a network policy for VPN connections. Apply an IP filter to deny access to the corporate network.
Modify the Logon hours for all user objects to specify only the VPN server on the Computer restrictions option.
Modify the Logon Hours for the default domain policy to enable the Force logoff when logon hours expire option.
第18题:
Accounting
Analog and digital voice
Mobility
Security
Routing and switching
VLAN and QoS
第19题:
Configure the system event log to Do not overwrite.
In IAS, in Remote Access Logging, enable the Authentication requests setting.
Configure the Remote Access server to Log all events.
Create a custom remote access policy and configure it for Authentication-Type.
第20题:
Use a PPTP connection with EAP-TLS authentication.
Use a PPTP connection with MS-CHAP v2 authentication.
Use an L2TP connection with EAP-TLS authentication.
Use an L2TP connection with MS-CHAP v2 authentication.