网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

As a network administrator,you have been instructed to prevent all traffic or iginating on the LAN from entering the R2 router.Which the following command would implement the access list on the interface of theR2 router?()

A.access-list 101 in

B.access-list 101 out

C.ipaccess-group 101 in

D.ipaccess-group 101 out


参考答案

更多 “ As a network administrator,you have been instructed to prevent all traffic or iginating on the LAN from entering the R2 router.Which the following command would implement the access list on the interface of theR2 router?()A.access-list 101 inB.access-list 101 outC.ipaccess-group 101 inD.ipaccess-group 101 out ” 相关考题
考题 You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A./24B./26C./27D./28

考题 You have a computer that runs Windows Vista.You need to prevent all inbound traffic to your computer without being notified.What should you do?() A.AB.BC.CD.D

考题 As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()A.access-list 101 inB.access-list 101 outC.ip access-group 101 inD.ip access-group 101 out

考题 You are planning a new VLAN-based network solution.  What is one item you should consider when creating your implementation plan as it concerns VLANs?()A、generic router and switch configuration parametersB、end-to-end test plan after all components have been installed and  configuredC、administrator assignmentsD、rollback plan

考题 You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()A、It resembles a Layer 2 bridge.B、Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C、Inline interfaces which have no IP addresses cannot be detected.D、Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

考题 As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()A、access-list 101 inB、access-list 101 outC、ip access-group 101 inD、ip access-group 101 out

考题 A System p administrator has been instructed to verify that all filesets have all required requisitesand are completely installed. Which of the following commands will provide this information()A、lslppB、lppchkC、geninstallD、installp

考题 You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A、/24B、/26C、/27D、/28

考题 You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. You have been instructed to make sure that a server, named ABC-SR07, is configured to be managed remotely from ABC-SR01 using Server Manager.Which of the following is not a valid option to take?()A、You could access the server manager on ABC-SR01.B、You could access the server manager on ABC-SR13.C、You could run the %windir%/system32/Configure-SMRemoting.exe from n elevated command prompt on ABC-SR13.D、You could run the Configure-SMRemoting.exe –enable cmdlet on ABC-SR01.

考题 You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to add a new domain controller to ABC.com’s existing environment. Which of the following actions should you take?()A、You should consider making use of Server Manager.B、You should consider making use of Authorization Manager.C、You should consider making use of Remote Desktop Gateway Manager.D、You should consider making use of Network Load Balancing Manager.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.

考题 You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to modify the name of the local Administrator account on all ABC.com workstations. You want to achieve this using as little administrative effort as possible. Which of the following actions should you take?()A、You should consider configuring the Security Options settings via the Group Policy Management Console (GPMC).B、You should consider configuring the Security Options settings via Server Manager.C、You should consider configuring the replication settings.D、You should consider navigating to Local Users and Groups via Computer Management on each workstation.

考题 You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com.  All servers on the ABC.com network have Windows Server 2012 R2 installed and all client computers have Windows 8 installed. The ABC.com network contains a domain controller named ABC_DC01. You want to run the ping ABC_dc01.ABC.com command from a client computer named ABC_WS27.How would you accomplish this?()A、You should configure the firewall on ABC_DC01 to allow inbound ICMP traffic.B、You should run the dcdiag /v command on ABC_DC01.C、You should run the netdiag /v command on ABC_WS27.D、You should configure the firewall on ABC_Ws27 to allow inbound ICMP traffic.

考题 You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to make sure that ABC.com users are not able to install a Windows Store application. You then create a rule for packaged apps.  Which of the following is the rule based on?()A、The publisher of the package.B、The publisher of the application.C、The name of the packageD、The name of the applicationE、The package version.F、The application version.

考题 多选题You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.  You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature.  Which of the following is TRUE with regards to Windows Firewall with Advanced Security?()AIt provides host-based,two-way network traffic filtering for a computer.BIt provides host-based,one-way network traffic filtering for a computer.CIt blocks unauthorized network traffic flowing into or out of the local computer.DIt only blocks unauthorized network traffic flowing into the local computer.EIt only blocks unauthorized network traffic flowing out of the local computer.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

考题 多选题You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing NIC Teaming.Which of the following is TRUE with regards to NIC Teaming?()AIt allows for traffic failover to prevent connectivity loss if a network component fails.BIt prevents bandwidth aggregation.CThe Windows Server 2012 R2 implementation of NIC Teaming supports a maximum of 5 NICs in a team.DThe Windows Server 2012 R2 implementation of NIC Teaming supports a maximum of 32 NICs in a team.

考题 单选题You are the network administrator for Company.  You have been assigned the task to upgrade the 23 Windows NT Workstation 4.0 computers in the accounting department to Windows 2000 Professional. Users in the accounting department run a peer-to-peer financial and credit application on their computers. The application requires that information is passed between the accounting department computers over the network. You upgrade all the computers and configure them to have the default security settings. You want to ensure that network traffic between accounting computers is secure. What should you do? ()A Disable NetBIOS over TCP/IP on the accounting department computers.B Apply the Hisecws.inf security template to the local security policy on the accounting department computers.C Enable the Encrypting File System (EFS) on all files used by the financial and credit application on the accounting department computers.D Configure port filters for each port used by the financial and credit application on the accounting department computers.

考题 单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to modify the name of the local Administrator account on all ABC.com workstations. You want to achieve this using as little administrative effort as possible. Which of the following actions should you take?()A You should consider configuring the Security Options settings via the Group Policy Management Console (GPMC).B You should consider configuring the Security Options settings via Server Manager.C You should consider configuring the replication settings.D You should consider navigating to Local Users and Groups via Computer Management on each workstation.

考题 多选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to make sure that ABC.com users are not able to install a Windows Store application. You then create a rule for packaged apps.  Which of the following is the rule based on?()AThe publisher of the package.BThe publisher of the application.CThe name of the packageDThe name of the applicationEThe package version.FThe application version.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()A Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.B Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.C Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.D Create a Pattern Match capture trigger for the 131.107.0.1 IP address.

考题 单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to add a new domain controller to ABC.com’s existing environment. Which of the following actions should you take?()A You should consider making use of Server Manager.B You should consider making use of Authorization Manager.C You should consider making use of Remote Desktop Gateway Manager.D You should consider making use of Network Load Balancing Manager.

考题 单选题A system administrator has been instructed to verify that all filesets have all required requisites and are completely installed. Which command will provide this information?()A lslppB lppchkC instfixD installp

考题 多选题You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()AIt resembles a Layer 2 bridge.BTraffic flow through the IPS resembles traffic flow through a Layer 3 router.CInline interfaces which have no IP addresses cannot be detected.DMalicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

考题 单选题You are using VTP version 2 in your network to transport VLAN information between switches. When adding a switch to the network that has been used in the lab previously, you notice that a lot of the existingVLANs have been deleted or replaced with other names. What can you do to prevent this from happeningin the future, without losing all VTP features that you are using today?()A configure a hard-to-guess VTP domain nameB use a hard-to-guess VTP passwordC use VTP transparent modeD implement VTP version 3

考题 单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()A The SetupUser profileB The Default User profileC The Administrator profileD The System profileE The All Users profile

考题 单选题You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()A Upgrade the switchesB Configure BPDU guardC Configure VLAN access listsD Configure port securityE Configure Dynamic ARP inspection