网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
pany is implementing 802.1X in order to increase network security. In the use of 802.1X   access control,  which three protocols are allowed through the switch port before authentication  takes place? ()
A

EAP-over-LAN

B

EAP MD5

C

STP

D

protocols not filtered by an ACL

E

CDP

F

TACACS+


参考答案

参考解析
解析: 暂无解析
更多 “多选题pany is implementing 802.1X in order to increase network security. In the use of 802.1X   access control,  which three protocols are allowed through the switch port before authentication  takes place? ()AEAP-over-LANBEAP MD5CSTPDprotocols not filtered by an ACLECDPFTACACS+” 相关考题
考题 In order to increase our output, duction____.A: facilitiesB: hensC: votesD: artists

考题 You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()A. Junos PulseB. Java AgentC. Odyssey Access ClientD. Native 802.1X supplicant

考题 An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA

考题 While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop.Which of these can you implement to prevent future occurrences of this issue?()A.RSTPB.root guardC.BPDU guardD.GLBP

考题 Which one of the following actions would actually increase congestion on an Ethernet network?() A. Increasing the number of collision domains.B. Micro-segmenting the network.C. Adding hubs for connectivity to the network.D. Putting additional switches in the network.E. Implementing VLANs in the network.

考题 Which three best describe the customer benefits of the Cisco Lifecycle Services approach?()A、improve the skill sets of its staff membersB、increase the value of and return on investment for its networksC、increase network staff productivityD、increase the amount of server room rack spaceE、improve network availability, resiliency, security, and scalabilityF、increase the amount of time required to integrate network changes

考题 What is a benefit of implementing a Cisco End-to-End Solution?()A、It maximizes the network securityB、It increase the cost of the equipmentC、It enables the network to work as a unified wholeD、It reduces the Cost of equipment

考题 What is the benefit of implementing a Cisco end-to-end solution?()A、It enables the network to work as a unified wholeB、It maximizes the network securityC、It increases the cost of the equipmentD、It reduces the cost of the equipment

考题 In multicast network how to select DR? and what is the order?

考题 Which one of the following actions would actually increase congestion on an Ethernet network?()A、Increasing the number of collision domains.B、Micro-segmenting the network.C、Adding hubs for connectivity to the network.D、Putting additional switches in the network.E、Implementing VLANs in the network.

考题 pany is implementing 802.1X in order to increase network security. In the use of 802.1X   access control,  which three protocols are allowed through the switch port before authentication  takes place? ()A、 EAP-over-LANB、 EAP MD5C、 STPD、 protocols not filtered by an ACLE、 CDPF、 TACACS+

考题 When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()A、Access Lists between the inside interface and loopback interfaceB、Context Based Access ControlC、Dynamic Host Configuration ProtocolD、Network Address translation

考题 Which two statements are true about the implementation of QoS? ()A、 Implementing DiffServ involves the configuration of RSVP.B、 Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.C、 Implementing IntServ involves the utilization of RSVP.D、 Traffic should be classified and marked by the core network devices.E、 Traffic should be classified and marked as close to the edge of the network as possible.

考题 A customer wants to increase the performance of an existing server. They are running a very network intensive application and feel that increasing the bandwidth to the network will fix their problem.  They are running two 24-port autosensing 10/100 hubs, tied together with a standard Ethernet crossover cable in port 24.  The server is running IPX. After adding a second network card and plugging one card into each hub, they have not seen any performance improvement.  Which two are likely reasons why implementing network adapter teaming has not improved performance?()A、 Adapter teaming is designed to work with switches.B、 Adapter teaming only functions with gigabit network cards.C、 Adapter teaming only provides fault tolerance, not additional bandwidth.D、 Adapter teaming only works with IPX when using switches and network cards with special features that support teaming.

考题 An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA

考题 In order to increase reliability, minimize collisions and establish a large number of systems on an Ethernet segment, which of the following options should be selected for the Ethernet network?()A、10BaseTB、Switched 10BaseTC、Switched 100BaseT Half-DuplexD、Switched 100BaseT Full-Duplex

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. Your company runs Terminal Services. You intend to install an application update for the lobapp.exe application on the Terminal Server. You find instances of the lobapp.exeprocesses left behind by users who have disconnected. In order to make sure that you can perform anapplication update, you have to terminate all instances of the lobapp.exe processes. In order to achievethis,what action should you perform?()A、In order to achieve this,the Tskill lobapp /a command should be run on the Terminal Server.B、In order to achieve this,the Get-Process cmdlet should be run on the Terminal Server.C、In order to achieve this,the Tasklist /fi "IMAGENAME eq lobapp.exe" command should be run on the Terminal Server.D、In order to achieve this,you should end all instances of lobapp.exe in the Terminal Services Manager console.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The Web Server(IIS) server role and the FTP Publishing Service role service are installed on the server. You have a newFTP site added to the server. You have to make sure that the new FTP site is available. In order to makesure of this,what action should you perform?()A、In order to make sure of this, the iisreset command should be run on the server.B、In order to make sure of this, a host header file should be configured in the default Web site properties.C、In order to make sure of this, an alternate IP address should be configured in the default Web siteproperties.D、In order to make sure of this, an alternate TCP port should be configured in the FTP site properties.E、In order to make sure of this, an alternate IP address should be configured in the FTP site properties.

考题 单选题What is a benefit of implementing a Cisco End-to-End Solution?()A It maximizes the network securityB It increase the cost of the equipmentC It enables the network to work as a unified wholeD It reduces the Cost of equipment

考题 单选题What is the benefit of implementing a Cisco end-to-end solution?()A It enables the network to work as a unified wholeB It maximizes the network securityC It increases the cost of the equipmentD It reduces the cost of the equipment

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Hyper-V server role installed. You create a new virtual machine and perform an installation of WindowsServer 2003 on the virtual machine. You have the virtual machine configured to use the physical networkcard of the host server. You find that you are unable to access network resources from the virtual machine.You have to make sure that the virtual host can connect to the physical network. What action should youperfrom?()A In order to make sure that the virtual host can connect to the physical network, the Multipath I/O feature should be enabled on the host server.B In order to make sure that the virtual host can connect to the physical network, you should perform the installation of the Microsoft Loopback adapter on the virtual machine.C In order to make sure that the virtual host can connect to the physical network, you should perform the installation of Microsoft Hyper-V Integration Components on the virtual machine.D In order to make sure that the virtual host can connect to the physical network, you should perform the installation of the Microsoft Loopback adapter on the host server.

考题 单选题While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop. Which of these can you implement to prevent future occurrences of this issue?()A RSTPB root guardC BPDU guardD GLBP

考题 单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()A Configure the wireless network to use WPA2, PEAP and MSCHAP v2.B Configure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.C Configure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.D Configure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server that runs Windows Server 2008. Theserver runs the Terminal Server Gateway (TS Gateway) role service. Now you receive an order from thecompany management. According to the company requirement, you have to identify whether a user namedUser1 has ever connected to his office workstation through the TS Gateway server. What action should youperform to achieve this?()A In order to achieve this, you should view the Event Viewer Security log.B In order to achieve this, you should view the Event Viewer Application log.C In order to achieve this, you should view the Event Viewer Terminal Services-Gateway log.D In order to achieve this, you should view the events in the Monitoring folder from the TS Gateway Manager console.

考题 单选题pany has implemented 802.1X authentication as a security enhancement.  Which statement is  true about 802.1x port-based authentication?()A  TACACS+ is the only supported authentication server type.B  If a host initiates the authentication process and does not receive a response, it assumes it is  not authorized.C  RADIUS is the only supported authentication server type.D  Before transmitting data, an 802.1x host must determine the authorization state of the switch.E  Hosts are required to havea 802.1x authentication client or utilize PPPoE.F  None of the other alternatives apply.

考题 多选题You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()AJunos PulseBJava AgentCOdyssey Access ClientDNative 802.1X supplicant

考题 单选题You are the network administrator for your company. The Denver office is currently connected to the corporate WAN by using a Windows Server 2003 computer named Server23.Server23 is configured as a dial-up router. Server23 has two network adapters. One network adapter connects to the Ethernet LAN. The other network adapter is a broadband networking device.The company plans to increase the number of employees in the Denver office by at least 25 percent. You need to confirm that the current network bandwidth of the broadband connection will be sufficient for the future expansion of the Denver office.You want to use System Monitor on Server23 to find out the current utilization of the broadband network connection.  What should you do?()A Monitor the Bytes Total/sec counter on the Network Interface object.B Monitor the Bytes Total/sec counter on the Server object.C Monitor the Server//Packets/sec counter on the Server object.D Monitor the Current Bandwidth counter on the Network Interface object.