网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()

  • A、When you want all unauthenticated traffic to be redirected
  • B、When you want all clear text traffic to be redirected.
  • C、When you want all authenticated traffic to be redirected.
  • D、When you want all encrypted traffic to be redirected.

参考答案

更多 “You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()A、When you want all unauthenticated traffic to be redirectedB、When you want all clear text traffic to be redirected.C、When you want all authenticated traffic to be redirected.D、When you want all encrypted traffic to be redirected.” 相关考题
考题 You are the administrator of Ezonexam.com's network.You want to connect your Windows 2000 Professional computer to a new TCP/IP based laser print device. The print device is Plug and Play compliant and is included on the current Hardware Compatibility List (HCL). When you attempt to create a new TCP/IP printer port you receive the following error message:"Specified Port cannot be added. The port already exists."You want to be able to use the new TCP/IP printer.What should you do?A.Modify the properties of the existing printer port to use the new print device.B.Change the LPT port setting to bidirectional in the BIOS on your computer.C.Change the LPT port setting to enable legacy Plug and Play detection on your computer.D.Obtain and install the WDM-compliant device drivers and printing software for the printer.

考题 You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?() A. When you want all unauthenticated traffic to be redirectedB. When you want all clear text traffic to be redirected.C. When you want all authenticated traffic to be redirected.D. When you want all encrypted traffic to be redirected.

考题 Which parameters must you select when configuring operating system probes SCREEN options?() A. syn-fin, syn-flood, and tcp-no-fragB. syn-fin, port-scan, and tcp-no-flagC. syn-fin, fin-no-ack, and tcp-no-fragD. syn-fin, syn-ack-ack-proxy, and tcp-no-frag

考题 You configure your Windows 2000 Professional computer for Internet Connection Sharing and for TCP/IP filtering as shown in the exhibit.You test your TCP/IP filtering configuration from another client computer. You can access web sites, but you cannot access FTP sites.What should you do to be able to access FTP sites?A.Add Port 21 to the TCP Ports section.B.Add Port 138 to the TCP Ports section.C.Add Port 21 to the IP Ports section.D.Add Port 138 to the IP Ports section.

考题 You are configuring a Cisco multilayer switch for the Company network.  Which command would  you use to configure a port to act as a routed interface?()A、 ip routingB、 switchport mode trunkC、 no switchportD、 switchport trunk native vlan 1E、 None of the other alternatives apply

考题 You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the documentation that the best way to set up a trunk is to set the port as dynamic desirable. The trunk is not coming up. Which one of these options would be a valid explanation? ()A、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode ONB、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode to OFFC、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode asauto.D、The firewall does not support DTP. You should set the switchport trunk mode to ON

考题 When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()A、protect (drop packets with unknown source addresses)B、restrict (increment SecurityViolation counter)C、shut down (access or trunk port)D、transition (the access port to a trunking port)

考题 When configuring unified ports on a 5548 switch, which port ordering must be respected?()A、 Fibre Channel ports must be configured from the first port in the module.B、 Ethernet ports must be configured from the last port in the module.C、 Fibre Channel ports must be configured from the last port in the module.D、 Ethernet ports must be configured from the first port in the module.

考题 You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()A、You should consider configuring recipient filtering.B、You should consider configuring sender reputation.C、You should consider configuring content filtering.D、You should consider configuring sender filtering.

考题 You install a third-party application on your computer. The application uses port 80 to negotiate a listening port. After establishing the listening port, the application uses dynamic ports above 6000.  You need to configure Microsoft Windows Firewall to allow traffic for the application.  What should you do? ()A、Add a port exception for port 80.B、Disable the Core Networking exception.C、Restore the Windows Firewall defaults.D、Add a program exception for the new application.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You work in a company named Wiikigo, Ltd. and there is a two-node Network Load Balancing cluster. Onlythe intranet Web site will be provided with the high availability and load balancing by the cluster. Thecompany names the cluster as web.wiikigo.com. You find a problem that the Network Load Balancingcluster can be seen in the network neighborhood by the Wiikigo users. And the users can utilize the web.wiikigo.com name to get access to various services. The web.wiikigo.com Network Load Balancing clusteris set with only one port rule. Since you are the technical support, you are required have the web.wiikigo.com Network Load Balancing cluster configured to receive only HTTP traffic. Which two actions should be performed to achieve the goal?()A、To achieve the goal, the Network Load Balancing Clusters console should be opened and a new Allow rule should be created for TCP port 80.B、To achieve the goal, the Network Load Balancing Clusters console should be opened and the default port rule should be modified to a disabled port range rule.C、To achieve the goal, one of the cluster nodes should be logged on to and the wlbs disable all command should be run.D、To achieve the goal, the Network Load Balancing Clusters console should be opened and the default port rules should be deleted.

考题 Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.

考题 You are the administrator of Company's network. You wish to connect your Windows 2000 Professional computer to a new TCP/IP based Plug and Play compliant print device. The print device is included on the current Hardware Compatibility List (HCL) When you attempt to create a new TCP/IP printer port, you receive the following message:   "Specified Port cannot be added. The port already exists."  You want to create a new TCP/IP printer port.  What should you do? ()A、Change the LPT port setting to enable legacy Plug and Play detection on your computer.B、Delete the existing printer port.C、Change the LPT port setting to bidirectional in the BIOS on your computer.D、Obtain and install the WDM-compliant device drivers and printing software for the printer.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The Web Server(IIS) server role and the FTP Publishing Service role service are installed on the server. You have a newFTP site added to the server. You have to make sure that the new FTP site is available. In order to makesure of this,what action should you perform?()A、In order to make sure of this, the iisreset command should be run on the server.B、In order to make sure of this, a host header file should be configured in the default Web site properties.C、In order to make sure of this, an alternate IP address should be configured in the default Web siteproperties.D、In order to make sure of this, an alternate TCP port should be configured in the FTP site properties.E、In order to make sure of this, an alternate IP address should be configured in the FTP site properties.

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. All servers on the TestKing.com network are configured to run Exchange Server 2010.At present the network is separated from the Internet by means of a firewall. You receive an instructionform management to ensure that customers from the Internet to use Outlook Anywhere, Outlook Web App(OWA), Exchange ActivSync as well as IMAP4 over Secure Sockets Layer (SSL). You thus need todetermine the TCP ports that you need to open. What should you do?()A、You should consider opening port 25, port 80, port 143 as well as port 3269.B、You should consider opening port 25, port 443 as well as port 993.C、You should consider opening port 80, port 143, port 443 as well as port 389.D、You should consider opening port 26, port 443 as well as port 995.

考题 You are the administrator of a Windows 2000 Professional computer, which has a 56 Kbps modem, connected to itself. You want the users on your company’s network to be able to connect to the Internet using your computer. But, you do not want to allow any other operations than HTTP and FTP. Which ports will you allow through this connection? ()A、Port 80B、Port 21C、Port 25D、Port 81

考题 单选题Which parameters must you select when configuring operating system probes SCREEN options?()A syn-fin, syn-flood, and tcp-no-fragB syn-fin, port-scan, and tcp-no-flagC syn-fin, fin-no-ack, and tcp-no-fragD syn-fin, syn-ack-ack-proxy, and tcp-no-frag

考题 单选题You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()A You should consider configuring recipient filtering.B You should consider configuring sender reputation.C You should consider configuring content filtering.D You should consider configuring sender filtering.

考题 单选题You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()A When you want all unauthenticated traffic to be redirectedB When you want all clear text traffic to be redirected.C When you want all authenticated traffic to be redirected.D When you want all encrypted traffic to be redirected.

考题 单选题When configuring a routed port on a Cisco multilayer switch, which of these is a required configuration task that you must perform to enable that port to function as a routed port? ()A Enable the switch to participate in routing updates from external devices with the router command in global configuration mode.B Enter the no switchport command to disable Layer 2 functionality at the interface level.C Each port participating in routing of Layer 3 packets must have an IP routing protocol assigned on aperinterface level.D Routing is enabled by default on a multilayer switch, so the port can become a Layer 3 routing interface by assigning the appropriate IP address and subnet information.

考题 多选题A virtual port channel (vPC) allows links that are physically connected to two different Cisco Nexus devices to appear as a single port channel to a third device. Which are the mandatory steps for configuring vPC? ()AEnable feature vPCBDefine domainsCEstablish peer keepalive connectivityDCreate a peer linkEConfigure the peer link as a trunk portFCreate port channels and vPCsGDefine port channel load-balancing methodHMake sure configurations are consistent

考题 单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. All servers on the TestKing.com network are configured to run Exchange Server 2010.At present the network is separated from the Internet by means of a firewall. You receive an instructionform management to ensure that customers from the Internet to use Outlook Anywhere, Outlook Web App(OWA), Exchange ActivSync as well as IMAP4 over Secure Sockets Layer (SSL). You thus need todetermine the TCP ports that you need to open. What should you do?()A You should consider opening port 25, port 80, port 143 as well as port 3269.B You should consider opening port 25, port 443 as well as port 993.C You should consider opening port 80, port 143, port 443 as well as port 389.D You should consider opening port 26, port 443 as well as port 995.

考题 多选题You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()AConfigure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.BConfigure a security policy that references the unified-access-control captive-portal service.CConfigure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.DConfigure a security policy that references the unified-access-control intranet-controller service.

考题 单选题As look-out,you spot an object 45°off your port bow. You should report the object as().A broad on the port bowB 3 points on the port bowC 3 points forward of the port beamD on the port beam

考题 单选题You are configuring a Cisco multilayer switch for the Company network.  Which command would  you use to configure a port to act as a routed interface?()A  ip routingB  switchport mode trunkC  no switchportD  switchport trunk native vlan 1E  None of the other alternatives apply

考题 多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. Your company has a Network Load Balancing cluster named nlb.wiikigo.com.The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenlydistributes HTTP traffic between both hosts. WEB2 needs to be configured to handle all HTTPS traffic fornlb.wiikigo.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2. What should you do to achieve this?()AIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Single host.BIn the properties for WEB2, the Handling priority option for the TCP 443 port rule should be changed tothe value of 1.CIn the properties for WEB1, the Handling priority option for the TCP 443 port rule should be changed tothe value of 0.DIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Multiple host and the Affinity option set to the value of Single.

考题 单选题When configuring private VLANs, which configuration task must you do first?()A Configure the private VLAN port parameters.B Configure and map the secondary VLAN to the primary VLAN.C Disable IGMP snooping.D Set the VTP mode to transparent.

考题 单选题Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A You should consider configuring the sender reputation.B You should consider configuring the sender filtering.C You should consider configuring the content filtering.D You should consider configuring the recipient filtering.