网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()

  • A、agent session scripts
  • B、preconfiguration installer
  • C、Junos Pulse component set
  • D、agent actions

参考答案

更多 “End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()A、agent session scriptsB、preconfiguration installerC、Junos Pulse component setD、agent actions” 相关考题
考题 With the explosive popularity of mobile devices, we have witnessed a steady increase in demand for mobile date service. In addition mobile users also expect to connect to the Internet for communicate and access to services through the best suitable connection, anywhere and at anytime. Although the seamless roaming capability is well supported in conventional. Cellular communication networks, roaming and interworking technologies are still immature in heterogenous wireless networks. Seamless roaming over heterogenous wireless networks will be an ongoing and improved process, due to the requirements from both end users and network administrators. From the wireless access networks belonging to different administrative domains, mobile users cannot always identify at every instance which network is the best one to access for their service. It is highly demanded to establish a network architecture which can facilitate mobile terminals to access the appropriate network in a cost-effective way. If a mobile user wants to move from one network to another with continuous service, the terminals have to cope with network change to maintain service seamlessly. Quality of service is a major issue that the end users should be provided with the satisfying service, while the network workload and cost should not too much increased. In addition, since end users are provided with numerous service ranging from Voice-over-IP to Video-on-Demand services, it is expected that users can experience the same quality for all the different service. Therefore, the network architecture need to be designed in such a way that the quality mechanism is incorporated so that users are served according to their individual QoS requirements. Based on the paragraph above, at present, seamless roaming over heterogenous wireless network is () in conventional cellular communication networks, Because of (), mobile users cannot always identify at every instance which network is the best one to access for their services. To satisfy the users QoS requirements, the network architecture design should include () A.better thanB.maturer thanC.as good asD.not as good as49.A.the different network administrative domainsB.the same network administrative domains and mobile usersC.mobile usersD.the same network administrative domains50.A.Voice -over -IPB.the quality mechanismC.workloadD.Video-on-Demand请帮忙给出每个问题的正确答案和分析,谢谢!

考题 Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP addresses from the private 10.0.0.0 range. All the client computers on the network use Windows 2000 Professional. The network includes Windows 2000 Servers and UNIX Servers.Users' print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to the print devices attached directly to the network.You have a high-capacity print device that is attached to one of the UNIX Servers. The UNIX computer uses the LPR printing protocol, and its IP address is 10.1.1.99. The name of the printer queue is GIANT.You want users to be able to connect to this printer from their computers.What should you do?A.Install Microsoft Print Services for UNIX on PrintServ. Create a network printer on the users' computers, and specify that the printer URL is LPR://10.1.1.99/GIANT.B.Install Microsoft Print Services for UNIX on the users' computers. Create a network printer on the users' computers, and specify that the printer URL is LPR://10.1.1.99/GIANT.C.Create a network printer on PrintServ and specify that the printer name is \\10.1.1.99\GIANT. Share this printer and connect to it from the users' computers.D.Create a local printer on PrintServ. Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT. Share this printer and connect it from the users' computers.

考题 End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()A. agent session scriptsB. preconfiguration installerC. Junos Pulse component setD. agent actions

考题 End users are failing to log in to the network.Which command is used on the ERX Edge Router to validate communications with the RADIUS server?() A. test ppp aaaB. test aaa pppC. test radius userD. test user radius

考题 A Bridged 1483 network is grouping all DSL users into a single logical subnet.Which configuration command prevents the end users from directly communicating with each other?() A. no ip arpB. no ip proxy-arpC. restrict ip arpD. restrict ip proxy-arp

考题 You want to use the Web to let Eternal users or your customers look at corporate information. But you want to keep installation at the user end(66)and you don't want just anyone to get(67)your databases.That may be where an application server enters the picture. For more user machine independent, these t software packages, typically written in the(68)programming language.for use on Windows NT-based systems, act as go-betweens linking browser-equipped end users to the databases that(69)the information they need to(70)。A.simpleB.simplyC.singleD.singly

考题 ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Management Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()A.1B.2C.3D.4

考题 What should be part of a comprehensive network security plan()。 A.Allow users to develop their own approach to network securityB.Physically secure network equipment from potential access by unauthorized individualsC.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedE.Minimize network overhead by deactivating automatic antivirus client updates

考题 The project, ___________ by the end of 2020, will expand the city′ s telephone network to cover 1,000,000 users.A.accomplished B.being accomplished C.to be accomplished D.having been accomplished

考题 ABC Company has 1500 managed devices and 15,000 end users on a campus network. LANManagement Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()A、 1B、 2C、 3D、 4

考题 Which two statements are true about the application of QoS in a converged network?()A、end-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptableB、end-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptableC、end-to-end network delay is not a factor as long as the  delay is consistentD、some packet loss can be corrected by codec algorithmsE、RSVP handles voice packet retransmissionF、fragmentation is a result of packet loss

考题 What should be part of a comprehensive network security plan?()A、Allow users to develop their own approach to network security.B、Physically secure network equipment from potential access by unauthorized individuals.C、Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.D、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.E、Minimize network overhead by deactivating automatic antivirus client updates.

考题 A Bridged 1483 network is grouping all DSL users into a single logical subnet. Which configuration command prevents the end users from directly communicating with each other?()A、no ip arpB、no ip proxy-arpC、restrict ip arpD、restrict ip proxy-arp

考题 You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant users Special access for the reports on the network share.C、Use Windows Explorer to disable caching for the reports on the network share.D、Use Windows Explorer to disable Offline files.

考题 单选题You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()A Enable Custom InstructionsB Pre-auth notificationC Remediation messageD Send reason strings

考题 单选题You need to design access to Microsoft Outlook Web Access for remote users. What should you do?()A Place all user mailboxes on back-end servers. Deploy Outlook Web Access on three front-end servers that are members of the Network Load Balancing clusterB Place all user mailboxes on back-end servers that are members of a Network Load Balancing cluster. Deploy Outlook Web Access on the back-end serversC Place mailboxes for remote users on one back-end server and place all mailboxes for main office users on another back-end server. Deploy Outlook Web Access on the back-end server that contains the mailboxes for remote usersD Place all user mailboxes on two back-end servers that are members of a Network Load Balancing cluster. Place mailboxes for remote users and mailboxes for main office users into separate storage groups. Deploy Outlook Web Access on three front-end servers. Configure the front-end servers to access only the back-end Network Load Balancing cluster

考题 单选题End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()A agent session scriptsB preconfiguration installerC Junos Pulse component setD agent actions

考题 单选题ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Management Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()A 1B 2C 3D 4

考题 单选题You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )A From System in Control Panel, select the Change Type option, and then select the Roaming profile option. B From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. C Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. D Connect the portable computer to the network, and configure the user accounts for a roaming user profile.

考题 单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A Use Windows Explorer to receive the offline filesB Using the Windows Explorer, disable the cache for the reports on the network shareC Use the Windows NT explorer to grant the special access for the reports on the network  shareD Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 单选题End users are failing to log in to the network. Which command is used on the ERX Edge Router to validate communications with the RADIUS server?()A test ppp aaaB test aaa pppC test radius userD test user radius

考题 单选题You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information.  What should you do?()A Use Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.B Use Windows Explorer to grant Sales Staff Special access for the reports on the network share.C Use Windows Explorer to enable automatic caching for documents on the network share.D Create a new share for the Sales users only and enable caching on that share only.

考题 单选题A Bridged 1483 network is grouping all DSL users into a single logical subnet. Which configuration command prevents the end users from directly communicating with each other?()A no ip arpB no ip proxy-arpC restrict ip arpD restrict ip proxy-arp

考题 单选题You want to install Windows 2000 Professional on 45 new computers on your company’s network. You first install Windows 2000 Professional on one of the new computers. You log on to the computer by using the local administrator account.  You install Microsoft Office 97, a virus scanner, and other company-standard applications. You then create a RIS image of the computer you configured. You want to configure the RIS image so that the standard applications will be accessible to the user when the user first logs on to the network.  What should you do?()A Run Rbfg.exe before installing the standard applications. B Run RIPrep.exe before installing the standard applications. C Copy the all users profile to the default users profile.D Copy the local administrator account profile to the default users profile

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A  Configure the system event log to Do not overwrite.B  In IAS, in Remote Access Logging, enable the Authentication requests setting.C  Configure the Remote Access server to Log all events.D  Create a custom remote access policy and configure it for Authentication-Type.

考题 单选题You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D Configure the IP properties of the portable computers so that they have an alternate configuration. 

考题 单选题You manage 40 computers that run Microsoft Windows Vista.  You use Microsoft Windows Calendar to publish a calendar to a shared network location. You need to allow users to automatically view the most recent calendar updates.  What should you do? ()A Instruct all users to configure a calendar subscription that has an update interval of 15 minutes.B Instruct all users to perform calendar synchronization for all shared calendar subscriptions. C Instruct all users to map a network drive to the folder that holds the shared calendar. Import the .ics file for the shared calendar.D Use e-mail messages to deploy the .ics file for the shared calendar to each user. Instruct each user to import the .ics file that is attached to the e-mail message.

考题 单选题What should be part of a comprehensive network security plan()。A Allow users to develop their own approach to network securityB Physically secure network equipment from potential access by unauthorized individualsC Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedE Minimize network overhead by deactivating automatic antivirus client updates