网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.

A.encoded
B.encrypted
C.stored
D.transmitted

参考答案

参考解析
解析:
更多 “A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted” 相关考题
考题 ● For (71) service, we need a virtual-circuit subnet. Let us see how that works. Theidea behind virtual circuits is to avoid having to choose a new (72) for every packet sent.Instead, when a connection is established, a route from the (73) machine to the destinationmachine is chosen as part of the connection setup and stored in tables inside the (74) . Thatroute is used for all traffic flowing over the connection, exactly the same way that thetelephone system works. When the connection is released, the virtual circuit is alsoterminated. With connection-oriented service, each packet carries an (75) telling whichvirtual circuit it belongs to.(71)A. connectionless B. connection-oriented C. datagram D. telegram(72)A. processor B. device C. route D. terminal(73)A. source B. route C. destination D. host(74)A. connections B. resources C. bridges D. routers(75)A. address B. identifier C. interface D. element

考题 ●Flow control is a function that prevents network congestion by ensuring that (71) do not overwhelm (72) with datA.There are three commonly used methods for handling network congestion . (73) is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74) are used by receiving devices to help prevent their buffers from overflowing . (75) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.(71)~(72)A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices(73)~(75) A.BufferB.Source-quench messagesC.BufferingD.Windowing

考题 For (71) service, we need a virtual-circuit subnet. Let us see how that works. The idea behind virtual circuits is to avoid having to choose a new (72) for every packet sent. Instead, when a connection is established, a route from the (73)machine to the destination machine is chosen as part of the connection setup and stored in tables inside the (74) That route is used for all traffic flowing over the connection, exactly the same way that the telephone system works. When the connection is released, the virtual circuit is also terminated. With connection-oriented service, each packet carries an (75) telling which virtual circuit it belongs to.A.connectionlessB.connection-orientedC.datagramD.telegram

考题 When you are(71)a home or small office network, it is recommended that you use the Network Setup Wizard in Windows XP Home Edition to enable Internet Connection Sharing. The Network Setup Wizard automatically provides all of the network settings you need to(72)one Internet connection with all the computers in your network.After ICS is enabled, and you make sure that all of your computers can(73)with each other and they have Internet(74), you can use programs such as Internet Explorer and Outlook Express as if they were(75)connected to the Internet service provider(ISP). When a request to the Internet is made, the ICS host computer connects to the ISP and creates the connection so that other computers can reach a specified Web address or download E-mail.A.creatingB.reachC.going forD.setting up

考题 Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices

考题 Network managers have long awaited practical voice-over-IP(VOIP)solutions. VOIP promises(71)network management and decreases costs by(72)a company's telephony and data infrastructures into one network. And a VOIP solution implemented at a company' s head -quarters with far -reaching branch offices can(73)tremendous amounts of(74)in long distance phone bills, provided that solution delivers POTS -like voice(75)over the Internet.A.complicatedB.usefulC.easeD.orderly

考题 You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

考题 You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()A.AB.BC.CD.D

考题 VPN connections allow users working at home or on the road to connect in a secure fashion to a ( ) corporate server using the routing infrastructure provided by a public internetwork (such as the Internet). From the users perspective, the VPN connection is a point-to-point connection between the users computer and a corporate ( ). The nature of the ( ) internetwork is irrelevant to the user because it appears as if the data is being sent over a dedicated ( ) link. VPN technology also allows a corporation to connect to branch offices or to other companies over a public internetwork, while maintaining secure ( ). The VPN connection across the Internet logically operates as a wide area network link between the sites.A.customer B.network C.remote D.local A.router B.client C.host D.server A.medium B.intermediate C.remote D.local A.network B.private C.public D.local A.technology B.server C.host D.communications

考题 IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic] B.private] C.personal D.proper

考题 You have a computer that runs Windows 7. You connect to your company s network by using a VPNconnection. You discover that when you establish the VPN connection, you are unable to access InternetWeb sites. When you disconnect the VPN connection, you can access Internet Web sites. You need toaccess Internet Web sites while you are connected to the VPN.  What should you do?()A、Configure the VPN connection to use only PPTP.B、Configure the VPN connection to use only L2TP/IPSec.C、From the Internet Protocol Version 4 (TCP/IPv4) properties of the local area connection, disable theAutomatic metric setting.D、From the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection, disable the Usedefault gateway on remote network setting.

考题 Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network.  You need to ensure that the computer is able to connect to the wireless network.  What should you do?()A、Change the Network Category setting of the wireless connection to Public.B、Enable the Internet Connection Sharing feature on the wireless network adapter.C、Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.D、Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.

考题 What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()A、Allow unrestricted access to the console or VTY ports.B、Use a firewall to restrict access from the outside to the network devices.C、Always use Telnet to access the device command line because its data is automatically encrypted.D、Use SSH or another encrypted and authenticated transport to access device configurations.E、Prevent the loss of passwords by disabling password encryption. 

考题 As the administrator of your company’s network, you have implemented encryption for extra security of data on your network. A user moves an encrypted file from an NTFS partition on her Windows 2000 Workstation to an NTFS folder on a remote Windows 2000 Server. What effect will this have on the encrypted file?()A、The encrypted file will automatically be decrypted.B、Encrypted files and folders cannot be moved or copied, decrypt it first then move or copy thefile or folder.C、The encrypted file will remain encrypted in the Windows 2000 folder.D、The encrypted file will inherit the encryption state of the remote NTFS folder.

考题 You need to design a solution so that users in the retail outlets can access their e-mail on the Exchange 2003 servers. What should you do?()A、Install an Exchange 2003 server infrastructure that will support POP3 connections from the Internet. Install a user certificate on each client computer at the retail outlets. Instruct the users to sign and encrypt all outbound e-mail messagesB、Install an Exchange 2003 server infrastructure that will support encrypted POP3 connections from the Internet. Configure the client computer in the retail outlets to use an encrypted connection to the POP3 serverC、Install an Exchange 2003 server infrastructure that will support encrypted Microsoft Outlook Web Access connections from the Internet. Instruct all users at the retail outlets to access their e-mail by using Microsoft Internet Explorer 5.5 or later to connect to the secure Microsoft Outlook Web Access serverD、Install an Exchange 2003 server infrastructure that will support encrypted IMAP4 connections from the Internet. Configure the client computers in the retail outlets to use an encrypted connection to the IMAP4 server

考题 You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?() A、Configure the wireless network connection on Pro1 so that it has an IP address of 192. 168. 0. 2.B、Disable and then re-enable Internet Connection Sharing (ICS) on Pro1.C、Create a network bridge between the wired and wireless connections on Pro1.  D、Clear the Allow other network users to control or disable the shared Internet connection check box in the advanced properties of the VPN connection.

考题 You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.   What must you do so that you can access the Internet?()A、Configure the ISDN connection to use SLIP instead of PPP.B、Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.C、Clear the Use default gateway on remote network check box.D、Install and configure the SAP Agent service.

考题 You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box. 

考题 单选题You have a Windows Server 2008 R2 Hyper-V server with a single network adapter that is connected to a virtual network. The virtual network is configured as External. Virtual machines (VMs) running on the server are not able to communicate with the host server over the network. You need to ensure that VMs running on the server are able to communicate with the host server over the network.  In Virtual Network Manager,what should you do?()A Select the Internal only connection type.B Select the Private virtual machine network connection type.C Select the Allow management operating system to share this network adapter check box.D Clear the Allow management operating system to share this network adapter check box.

考题 单选题You create a new dial-up connection to connect to the Internet. You configure the Internet connection to enable Internet Connection Sharing. However, you cannot see or connect to any shared resource on your network. What should you do?()A Configure the dial-up connection to disable shared access.B Configure the dial-up connection to disable on-demand dialing.C Disable data encryption in the new dial-up connection.D Use the ipconfig command to release and renew your network TCP/P address.

考题 单选题You use a Windows 2000 Professional portable computer both at the office and at home. In the office youconnect the portable computer to a docking station and use Internet Explorer to access the Internetthrough your LAN connection.At home, you configure a new dial-up connection to the Internet. Now when you attempt to access theInternet from the office you are prompted to connect via your dial-up connection. When you cancel thismessage, you can only work offline and cannot access the Internet.You want to maintain your dial-up connection for home use and your ability to access the Internet whenconnected to the company LAN. What should you do?()A Reconfigure the dial-up connection to dial-up to a private network.B Create another connection that uses a virtual private network (VPN) to connect to a privatenetwork though the Internet.C Configure Internet Explorer to automatically detect proxy settings.D Configure Internet Explorer to dial whenever a network connection is not present.

考题 单选题You are using a dialup connection. You want to ensure that your password is encrypted. What protocols from the list below would you disable? ()A PAPB SPAPC MSCHAPD MSCHAP V2

考题 单选题You use a Windows 2000 Professional portable computer both at the office and at home. In the office you connect the portable computer to a docking station and use Internet Explorer to access the Internet through your LAN connection.  At home, you configure a new dial-up connection to the Internet. Now when you attempt to access the Internet from the office you are prompted to connect via your dial-up connection. When you cancel this message, you can only work offline and cannot access the Internet.  You want to maintain your dial-up connection for home use and your ability to access the Internet when connected to the company LAN. What should you do?()A Reconfigure the dial-up connection to dial-up to a private network.B Create another connection that uses a virtual private network (VPN) to connect a private network though the Internet.C Configure Internet Explorer to automatically detect proxy settings.D Configure Internet Explorer to dial whenever a network connection is not present.

考题 单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   All client computers run Windows 7. Some users have laptop computers and work remotely from home.   You need to plan a data provisioning infrastructure to secure sensitive files. Your plan must meet the following requirements:   èFiles must be stored in an encrypted format.   èFiles must be accessible by remote users over the Internet.   èFiles must be encrypted while they are transmitted over the Internet. What should you include in your plan?()A Deploy one Microsoft SharePoint Foundation 2010 site. Require users to access the SharePoint site by using a Secure Socket Transmission Protocol (SSTP) connection.B Deploy two Microsoft SharePoint Foundation 2010 sites.Configure one site for internal users. Configure the other site for remote users. Publish the SharePoint sites by using HTTPS.C Configure a Network Policy and Access Services (NPAS) server to act as a VPN server. Require remote users to access the files by using an IPsec connection to the VPN server.D Store all sensitive files in folders that are encrypted by using Encrypting File System (EFS). Require  remote users to access the files by using Secure Socket Transmission Protocol (SSTP).

考题 单选题You have a server named Server2 that runs Windows Server 2003 Service Pack 2 (SP2). The server has two network connections named Local Area Connection and Internet Connection.You configure network address translation (NAT) on Server2 as shown in the exhibit. (Click the Exhibit button.) You configure all client computers to use Server2 as their default gateway.Users report that they cannot connect to the Internet. You successfully connect to the Internet from Server2.You need to ensure that client computers can access Internet resources.  What should you do?()A Change the Internet Connection interface type to Basic firewall only. B Change the Internet Connection interface type to Private interface connected to private network. C Add Local Area Connection as a new interface for the NAT protocol and set the interface as a Public interface connected to the Internet. D Add Local Area Connection as a new interface for the NAT protocol and set the new interface as a Private interface connected to private network.

考题 单选题You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet.   The company’s written security policy includes the following requirements for VPN connections over the Internet:  All data must be encrypted with end-to-end encryption.  VPN connection authentication must be at the computer level.   Credential information must not be transmitted over the Internet as part of the authentication process.   You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy.   What should you do?  ()A  Use a PPTP connection with EAP-TLS authentication.B  Use a PPTP connection with MS-CHAP v2 authentication.C  Use an L2TP connection with EAP-TLS authentication.D  Use an L2TP connection with MS-CHAP v2 authentication.

考题 单选题As the administrator of your company’s network, you have implemented encryption for extra security of data on your network. A user moves an encrypted file from an NTFS partition on her Windows 2000 Workstation to an NTFS folder on a remote Windows 2000 Server. What effect will this have on the encrypted file?()A The encrypted file will automatically be decrypted.B Encrypted files and folders cannot be moved or copied, decrypt it first then move or copy thefile or folder.C The encrypted file will remain encrypted in the Windows 2000 folder.D The encrypted file will inherit the encryption state of the remote NTFS folder.