网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

To enable TCP Port Forwarding applications using IOS WebVPN, what needs tobe downloaded to the client?()

  • A、 Cisco SecurityAgent (CSA)
  • B、 CiscoTrustAgent (CTA)
  • C、 Cisco Secure Desktop (CSD)
  • D、 A small Java Applet
  • E、 SSLVPN Client (SVC)
  • F、 SSLVPN Client (SVC) and Cisco Secure Desktop (CSD)

参考答案

更多 “To enable TCP Port Forwarding applications using IOS WebVPN, what needs tobe downloaded to the client?()A、 Cisco SecurityAgent (CSA)B、 CiscoTrustAgent (CTA)C、 Cisco Secure Desktop (CSD)D、 A small Java AppletE、 SSLVPN Client (SVC)F、 SSLVPN Client (SVC) and Cisco Secure Desktop (CSD)” 相关考题
考题 某单位路由器防火墙作了如下配置: firewall enable access-list normal 101 permit ip 202.38.0.0 0.0.0.255 10.10.10.10 0.0.0.255 access-list normal 101 deny tcp 202.38.0.0 0.0.0.255 10.10.10.10 0.0.0.255 gt 1024 access-list normal 101 deny ip any any 端口配置如下 interface Serial0 Enable Ip address 202.38.111.25 255.255.255.0 encapsulation ppp ip access-group 101 out interface Ethernet0 ip address 10.10.10.1 255.255.255.0 内部局域网主机均为10.10.10.0 255.255.255.0网段。以下说法正确的是(本题假设其他网络均没有使用防火墙):A、外部主机202.38.0.50可以ping通任何内部主机; B、内部主机10.10.10.5,可以任意访问外部网络资源; C、外部202.38.5.0 255.255.255.0网段主机可以与此内部网主机建立tcp连接; D、外部202.38.0.0 255.255.255.0网段主机不可以与此内部网主机建立tcp连接 E、内部任意主机都可以与外部任意主机建立tcp连接; F、内部任意主机只可以与外部202.38.0.0 255.255.255.0网段主机建立tcp连接

考题 Which command sets and automatically encrypts the privileged enable mode password?() A. enbale password c1scoB. secret enable c1scoC. password enable c1scoD. enable secret c1sco

考题 Which CLI command is used to set a Privileged Exec password of mypassword?()A、 enable password 0 mypasswordB、 enable password 3 mypasswordC、 enable password 5 mypasswordD、 enable password 10 mypassword

考题 打开审计开关的操作是什么()。A、ENABLE_AUDIT=0B、ENABLE_ENCRYPT=0C、ENABLE_AUDIT=1D、ENABLE_ENCRYPT=1

考题 Which command sets and automatically encrypts the privileged enable mode password?()A、enbale password c1scoB、secret enable c1scoC、password enable c1scoD、enable secret c1sco

考题 What is the purpose of an explicit "deny any" statement at the end of an ACL?()A、none,since it is implicitB、to enable Cisco IOS IPS to work properly;however,it is the deny all traffic entry that is actually requiredC、to enable Cisco IOS Firewall to work properly;however,it is the deny all traffic entry that is actually requiredD、to allow the log option to be used to log any matchesE、to prevent sync flood attacksF、to prevent half-opened TCP connections

考题 The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A、The enable password is present for backward compatibility.B、Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C、The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D、The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

考题 When troubleshooting the issue, you notice the election of a new root bridge with an unknown MAC address. Knowing that all access ports have the PortFast feature enabled, what would be the easiest way to resolve the issue without losing redundant links?()A、Enable bpduguard globally.B、Enable rootguard.C、Enable loopguard.D、Enable spanning tree.E、Enable UDLD

考题 The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management  domain?()A、Enable VTP pruning on any switch in the management domainB、Enable VTP pruning on any client switch in the domainC、Enable VTP pruning on a VTP server in the management domainD、Enable VTP pruning on every switch in the domainE、None of the other alternatives apply

考题 When connecting a laser printer to a network for the first time, a technician should FIRST:()A、configure the network settings on the printer.B、ensure the cable is set to TCP/IP.C、enable the printer in the BIOS.D、configure the printer as bi-directional in Windows.

考题 Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering

考题 Which command will enable RBAC on a server?()  A、setkst -t enable ; rebootB、chrbac -a enable ; rebootC、enable enhanced_RBAC ; rebootD、chdev -l sys0 -a enhanced_RBAC=’true’ ; reboot

考题 If a parent organization has been assigned a particular approval type, then which task would need to be performed to enable that approval type for a child organization?()A、Enable approval inheritance for the child organizationB、Enable approval inheritance for the parent organizationC、Enable that approval type for the child organizationD、Nothing, the inheritance is automatic

考题 Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use NetBIOS names to connect to all shared resources as the network. You configure a TCP/IP address and a subnet mask on each new computer. Which 2 additional TCP/IP properties should you configure on each new computer?()A、The bindings.B、A DNS address.C、A Gateway address.D、A WINS server address.E、A DHCP server address.

考题 You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runsTerminal services to enable remote users to run commonly required applications from their terminal. A remote user logged on to the Terminal Server, required some help on the application he wanted to run.However,when you connect to the Terminal Server session,you cannot operate any applications. Which of the following options would you choose to ensure that you can assist any user on the Terminal Server?()A、From the Terminal Server, run the Chguserver /execute command and then reconnect to the session.B、In the RDP-Tcp Properties on the Terminal Server, enable the Use remote control option with default user settings.C、In the RDP-Tcp Properties on the Terminal Server, enable the Use remote control with the following settings option and then configure the Level of control policy setting to Interact with the session. Ask the user to log off and log back on.D、From the Terminal Server, run the Tscon /v command and then reconnect to the session.

考题 The network at Company Ltd. consists of one Windows NT Server 4.0 domain and 35 Windows 2000Professional computers. The Company network consists of five interconnected TCP/IP subnets. All of thecomputers use TCP/IP as the only network protocol.You are adding 15 Windows 2000 Professional computers to the network. You want to enable theWindows 2000 Professional computers to resolve NetBIOS names to TCP/IP addresses.What should you do? ()A、Install a DHCP server. Configure each computer to use DHCP. B、Install a WINS server. Configure each computer to use WINS. C、Create a Lmhosts.sam file on each computer. Add an entry containing the TCP/IP address and  NetBIOS name for each computer on the network. D、Create a Hosts.sam file on each computer. Add an entry containing the TCP/IP address and NetBIOS name for each computer on the network. 

考题 You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()A、Enable DHCP in the TCP/IP properties.B、Replace the Token Ring network adapter with an Ethernet network adapter.C、Configure a different TCP/IP address on the same subnet.D、Configure a valid DNS Server in the TCP/IP properties.

考题 You want to configure your Windows 2000 Professional computer to remotely access your company's Windows 2000 Routing and Remote Access server. You configure a VPN connection. For security purposes, you configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically, to enable IPSec, and to set IPSec to Secure Server.  When you try to connect, you receive the following error message, "The encryption attempt failed because no valid certificate was found."  What should you do to connect to the server? ()A、Enable the VPN connection to use MS-CHAP.B、Change the data encryption setting toOptional Encryption.C、Specify a TCP/IP address in theNetworkproperties.D、Change the IPSec policy setting toClient.

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server is configured as a network address translation (NAT) router. The server has two network adapters and provides Internet access for the network.You need to prevent traffic on port 21 from being sent to the Internet. All other outbound traffic must be allowed.What should you do?() A、On the network adapter that is connected to the LAN, enable TCP/IP filtering. B、On the network adapter that is connected to the Internet, enable TCP/IP filtering. C、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the Services and Ports tab, and define a new service. D、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the NAT/Basic Firewall tab, and define a new static packet filter.

考题 Your Company upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings to be the same as they were for the previously installed network adapter.   When you restart eh computer, however, you cannot access the network. You try to ping your network adapter’s TCP/IP address locally. You receive the following error message. “Request timed out.” Next, you try to ping 127.0.0.1 and receive the same error message.   What must you do?()A、Configure a different TCP/IP addressB、Enable DHCP in the TCP/IP propertiesC、Enable DNS in the TCP/IP propertiesD、Configure the network adapter to run at 100 Mbps onlyE、Replace the network adapter.

考题 多选题Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use NetBIOS names to connect to all shared resources as the network. You configure a TCP/IP address and a subnet mask on each new computer. Which 2 additional TCP/IP properties should you configure on each new computer?()AThe bindings.BA DNS address.CA Gateway address.DA WINS server address.EA DHCP server address.

考题 单选题The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A The enable password is present for backward compatibility.B Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

考题 单选题Which CLI command is used to set a Privileged Exec password of mypassword?()A  enable password 0 mypasswordB  enable password 3 mypasswordC  enable password 5 mypasswordD  enable password 10 mypassword

考题 单选题What is the purpose of an explicit "deny any" statement at the end of an ACL?()A none,since it is implicitB to enable Cisco IOS IPS to work properly;however,it is the deny all traffic entry that is actually requiredC to enable Cisco IOS Firewall to work properly;however,it is the deny all traffic entry that is actually requiredD to allow the log option to be used to log any matchesE to prevent sync flood attacksF to prevent half-opened TCP connections

考题 单选题Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()A aaa authentication enable method defaultB aaa authentication enable defaultC aaa authentication enable levelD aaa authentication enable default local

考题 单选题To enable TCP Port Forwarding applications using IOS WebVPN, what needs tobe downloaded to the client?()A  Cisco SecurityAgent (CSA)B  CiscoTrustAgent (CTA)C  Cisco Secure Desktop (CSD)D  A small Java AppletE  SSLVPN Client (SVC)F  SSLVPN Client (SVC) and Cisco Secure Desktop (CSD)

考题 单选题You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()A Enable DHCP in the TCP/IP properties.B Replace the Token Ring network adapter with an Ethernet network adapter.C Configure a different TCP/IP address on the same subnet.D Configure a valid DNS Server in the TCP/IP properties.