网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

When you access the Cisco CRS Administration page for the first time in a cluster, the system automatically initiates the cluster setup procedure. You perform this procedure one time for a cluster. Whatdo you accomplish in this procedure?()

  • A、identify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator 
  • B、identify CSQs and JTAPI user and designate a Cisco CRS administrator 
  • C、identify resources and RM user and enter information about your LDAP 
  • D、identify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources 

参考答案

更多 “When you access the Cisco CRS Administration page for the first time in a cluster, the system automatically initiates the cluster setup procedure. You perform this procedure one time for a cluster. Whatdo you accomplish in this procedure?()A、identify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator B、identify CSQs and JTAPI user and designate a Cisco CRS administrator C、identify resources and RM user and enter information about your LDAP D、identify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources ” 相关考题
考题 You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?() A. When you want all unauthenticated traffic to be redirectedB. When you want all clear text traffic to be redirected.C. When you want all authenticated traffic to be redirected.D. When you want all encrypted traffic to be redirected.

考题 You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()A.AB.BC.CD.D

考题 When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?() A.show ip access-listB.show access-listC.list ip interfaceD.show interfaceE.show ip interface

考题 When you design QoS on CE for an MPLS Layer 2 VPN, which three things should be considered?()A、Layer 2 access link QoS designB、enterprise-to-service-provider mapping modelsC、Layer 3 link access QoS designD、service provider service level agreementsE、Layer 2 link access load balancing

考题 The LAN-side of the Teleworker router is assigned private IP address space (RFC1918), and the VPN topology is IPSec-only (no GRE protocol). When is it required to configure NAT/pNAT on the Teleworker router?()A、when all access to the Internet is through the IPSec tunnelB、when there is direct Internet access via split-tunnelingC、when there is no Internet access configured through the Teleworker routerD、whenever you have IOS-Firewall (CBAC) configured

考题 A policy-based IPsec VPN is ideal for which scenario?()A、when you want to conserve tunnel resourcesB、when the remote peer is a dialup or remote access clientC、when you want to configure a tunnel policy with an action of denyD、when a dynamic routing protocol such as OSPF must be sent across the VPN

考题 You are installing a cisco aironet 1000 series controller-based access point. when you boot it, all the leds on the access point blink together. What does this indicate about the access point?()A、duplicate ip addressB、code upgrade in progressC、normal operationD、searching for primary controller

考题 When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()A、show ip access-listB、show access-listC、list ip interfaceD、show interfaceE、show ip interface

考题 In a deployment using standalone access points, clients set up to authenticate with EAP-PEAP orEAP-Cisco Wireless (Cisco-LEAP) cannot authenticate. When you inspect the Failed Attempts reporton the Cisco Secure ACS, you find this error: "Unknown network access server NAS."  Which problem may have caused this failure?()A、misconfigured IP address of the AAA server on the access pointB、misconfigured EAP type on the access pointC、misconfigured IP address of the access point on the AAA serverD、misconfigured EAP type on the AAA server

考题 You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()A、When you want all unauthenticated traffic to be redirectedB、When you want all clear text traffic to be redirected.C、When you want all authenticated traffic to be redirected.D、When you want all encrypted traffic to be redirected.

考题 Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

考题 You develop a Web application that writes data to a file on a server. You restrict access to the file to specific Windows users. The Web application runs as CONTOSO/ASPNET. You deny anonymous access to the application in IIS. You add the following XML segment in the Web.config file.You need to ensure that the application meets the following requirements:It must impersonate the user when it writes data to the file.It must run as CONTOSO/ASPNET when a user does not access the file. Which two actions should you perform? ()A、Use the following XML segment in the Web.config file. identity impersonate="false"/B、Use the following XML segment in the Web.config file. identity impersonate="true"/C、Use the following code segment to access the file. Dim wp As WindowsPrincipal = _CType(HttpContext.Current.User, WindowsPrincipal) Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent() Dim wic As WindowsImpersonationContext = wi.Impersonate()' Access the file herewic.Undo()D、Use the following code segment to access the file. Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent()Dim wic As WindowsImpersonationContext = _WindowsIdentity.Impersonate(wi.Token)' Access the file herewic.Undo()

考题 You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  When you access the application in a Web browser, you receive the following error message: "Service Unavailable".  You need to access the application successfully.  What should you do? ()A、Start Microsoft IIS 6.0.B、Start the Application pool.C、Set the .NET Framework version.D、Add the Web.config file for the application.

考题 You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()A、In the Web.config file, enable impersonation.B、In IIS, enable anonymous access.C、In IIS, disable anonymous access.D、In the Web.config file, set the authentication mode to Windows.

考题 Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()A、When you configure access to the wired network at home, set the wired network adapter location type to Public.B、When you configure access to the wired network at home, set the wired network adapter location type to Private.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.

考题 多选题You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()AIn the Web.config file, enable impersonation.BIn IIS, enable anonymous access.CIn IIS, disable anonymous access.DIn the Web.config file, set the authentication mode to Windows.

考题 多选题You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name "CONTOSO/Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()AIn the Web.config file, enable impersonation.BIn IIS, enable anonymous access.CIn IIS, disable anonymous access.DIn the Web.config file, set the authentication mode to Windows.

考题 多选题Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()AWhen you configure access to the wired network at home, set the wired network adapter location type to Public.BWhen you configure access to the wired network at home, set the wired network adapter location type to Private.CWhen you configure access to the public wireless access points, set the wireless network adapter location type to Public.DWhen you configure access to the public wireless access points, set the wireless network adapter location type to Private.

考题 单选题You use a Windows 2000 Professional portable computer both at the office and at home. In the office youconnect the portable computer to a docking station and use Internet Explorer to access the Internetthrough your LAN connection.At home, you configure a new dial-up connection to the Internet. Now when you attempt to access theInternet from the office you are prompted to connect via your dial-up connection. When you cancel thismessage, you can only work offline and cannot access the Internet.You want to maintain your dial-up connection for home use and your ability to access the Internet whenconnected to the company LAN. What should you do?()A Reconfigure the dial-up connection to dial-up to a private network.B Create another connection that uses a virtual private network (VPN) to connect to a privatenetwork though the Internet.C Configure Internet Explorer to automatically detect proxy settings.D Configure Internet Explorer to dial whenever a network connection is not present.

考题 单选题A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()A Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.B Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.C Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.D Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.

考题 单选题You use a Windows 2000 Professional portable computer both at the office and at home. In the office you connect the portable computer to a docking station and use Internet Explorer to access the Internet through your LAN connection.  At home, you configure a new dial-up connection to the Internet. Now when you attempt to access the Internet from the office you are prompted to connect via your dial-up connection. When you cancel this message, you can only work offline and cannot access the Internet.  You want to maintain your dial-up connection for home use and your ability to access the Internet when connected to the company LAN. What should you do?()A Reconfigure the dial-up connection to dial-up to a private network.B Create another connection that uses a virtual private network (VPN) to connect a private network though the Internet.C Configure Internet Explorer to automatically detect proxy settings.D Configure Internet Explorer to dial whenever a network connection is not present.

考题 多选题Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()AWhen you configure access to the wired network at home, set the wired network adapter location type to Private.BWhen you configure access to the wired network at home, set the wired network adapter location type to Public.CWhen you configure access to the public wireless access points, set the wireless network adapter location type to Private.DWhen you configure access to the public wireless access points, set the wireless network adapter location type to Public.

考题 单选题When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()A show ip access-listB show access-listC list ip interfaceD show interfaceE show ip interface

考题 单选题In a deployment using standalone access points, clients set up to authenticate with EAP-PEAP orEAP-Cisco Wireless (Cisco-LEAP) cannot authenticate. When you inspect the Failed Attemptsreport on the Cisco Secure ACS,you find this error:"Unknown network access server NAS." Which problemmayhave caused this failure?()A misconfigured IP address of the AAA server on the access pointB misconfigured EAP type on the access pointC misconfigured IP address of the access point on the AAA serverD misconfigured EAP type on the AAA server

考题 单选题When you ______ to access your account, you need to enter your four-digit password.A wantB will wantC wantedD wanting