VPN
InfiniBand
SCSI over IP
Remote Direct Memory Access
第1题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()
A.A
B.B
C.C
D.D
第2题:
You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()
第3题:
Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()
第4题:
You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()
第5题:
You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()
第6题:
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()
第7题:
You are the network administrator for Your network contains a single Active Directory domain named All network servers run Windows Server 2003. One of your application servers runs proprietary software. This server stops responding. After help desk technicians restart the server, it appears to run normally. Two weeks later, the same server stops responding again. You need to gather and store data to diagnose the problem. What should you do?()
第8题:
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
第9题:
You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in Paris where you are located.you are responsible for managing two exchange servers named -ex01 and -ex02.both exchange servers are configured to host the client access server role, the hub transport server role as well as the mailbox server role.terstkingex01 and -ex02 are members of a database availability group.during the course of the week you receive an instruction from management to ensure that users are able to make a connection to the client access server in the event of a single server failure. What should you do?()
第10题:
Executable
Trojan
Virus
Worm
第11题:
VPN
SCSI over IP
Remote Direct Memory Access
InfiniBand
第12题:
An increased need for specialized IT silos
Protecting the business from information outages
IT systems grow fast
Optimizing the efficiency with which IT operates
第13题:
第14题:
You are the network consultant from passguide.com. You should tell your clients Two technologies help them save much time from complex computing. ()
第15题:
You are the network consultant from passguide.com. You should tell your clients Two technologies help them save much time from complex computing.()
第16题:
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
第17题:
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()
第18题:
You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()
第19题:
Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()
第20题:
Your network contains an Active Directory domain. The domain contains a DHCP server named Server1.You create a scope named Scope1 on Server1.You need to prevent unauthorized DHCP clients from receiving addresses from Server1.What should you do?()
第21题:
VPN
InfiniBand
SCSI over IP
Remote Direct Memory Access
第22题:
第23题:
Network management
Network optimization
Network security
Content storage networking
第24题:
Encryption
Bandwidth limits
Minimal signal loss
No EMI