网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

A. reflexive

B. extended

C. standard

D. dynamic


参考答案

更多 “ A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?() A. reflexiveB. extendedC. standardD. dynamic ” 相关考题
考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode

考题 You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.What should you do?A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.C.Create a Windows 2000 Group Policy that denies user access to My Network Places.D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.

考题 A support technician wants to help a user, in a different city, navigate a new software program. Which of the following will allow the user and technician to view and control the Windows XP PC desktop simultaneously?()A、Terminal ServicesB、Remote AssistanceC、Routing and Remote Access ServiceD、Remote Desktop

考题 What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

考题 A network engineer wants to allow a temporary entry for a remote user with a specific usename andpassword so that the user can access the entire network over the internet.which ACL can be used?()A、reflexiveB、extendedC、standardD、dynamic

考题 Which of the following is NOT a security feature relating to user accounts?()A、Some commands can be password protected requiring logged in customers to re-enter their password.B、A user account can be disabled automatically, after a specified number of invalid login attempts.C、An account can have multiple valid passwords at the same time, any of which can be used to access the account.D、The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.E、Logged in customers can be logged off of the system after a specified period of inactivity.

考题 Your company consists of a single Active Directory domain that is configured in Windows 2000 native mode. All servers run Windows Server 2003 Service Pack 2 (SP2).  You deploy a Routing and Remote Access server to provide VPN access to the network.You need to ensure that only members of a group named Sales can access the network through the VPN. The solution must minimize the administrative effort required to manage remote access.  What should you do?()A、Allow dial-in access for the user accounts of all Sales group members.B、Deny dial-in access for the user accounts of all users except the Sales group members.C、Create a remote access policy and assign the Allow - Remote Access permission. Add the Windows-Groups condition and specify the Sales group.D、Create a remote access policy and assign the Deny - Remote Access permission. Add the Windows-Groups condition and specify all Active Directory groups except for Sales.

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

考题 A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()A、reflexiveB、extendedC、standardD、dynamic

考题 Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()A、It can be used to block bulk encryption attacksB、It can be used to protect against denial of service attacksC、Traffic originating from the router is considered trusted, so it is not inspectedD、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyE、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

考题 You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A、The switch name must match the workgroup name of the local network.B、The switch must be configured with an IP address and default gateway.C、The remote workstations must have access to the management VLAN of the switch.D、CDP must be enabled on the switch so that it can be located by other devices on the network.

考题 What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller

考题 Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

考题 Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()A、the Netsh toolB、the Network Policy Server consoleC、the Registry EditorD、the Routing and Remote Access console

考题 The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()A、No account. They can use the built-in guest account.B、No Account. They can use the built-in Administrator account.C、Local user accountD、Domain user account

考题 单选题What is the primary purpose of creating a Location Group Policy? ()A to associate more than one realm with an authentication serverB to logically group network access devices and associate them with specific sign-in policiesC to allow or prevent users from accessing resources in specific locations on the networkD to define the URL that users of network access devices can use to access the Infranet Controller

考题 多选题You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()AThe switch name must match the workgroup name of the local network.BThe switch must be configured with an IP address and default gateway.CThe remote workstations must have access to the management VLAN of the switch.DCDP must be enabled on the switch so that it can be located by other devices on the network.

考题 单选题A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()A Edit the /etc/hosts file and add an alias to the correct entryB Set up an alias in his .kshrc file to alias the hostname to the fully qualified hostnameC Add an alias to /etc/aliasesD Add mars.net to the search path of the resolv.conf file

考题 单选题A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()A Remotely connect to the user's laptop and review the network configuration settingsB Ping the web server from inside the network to ensure it is still up and running.C Check to make sure the company's website is accessible from the Internet.D Ensure the Ethernet cable is securely plugged into the user's laptop

考题 单选题Which of the following is NOT a security feature relating to user accounts?()A Some commands can be password protected requiring logged in customers to re-enter their password.B A user account can be disabled automatically, after a specified number of invalid login attempts.C An account can have multiple valid passwords at the same time, any of which can be used to access the account.D The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.E Logged in customers can be logged off of the system after a specified period of inactivity.

考题 单选题Your company consists of a single Active Directory domain that is configured in Windows 2000 native mode. All servers run Windows Server 2003 Service Pack 2 (SP2). You deploy a Routing and Remote Access server to provide VPN access to the network.You need to ensure that only members of a group named Sales can access the network through the VPN. The solution must minimize the administrative effort required to manage remote access.  What should you do?()A Allow dial-in access for the user accounts of all Sales group members. B Deny dial-in access for the user accounts of all users except the Sales group members. C Create a remote access policy and assign the Allow - Remote Access permission. Add the Windows-Groups condition and specify the Sales group. D Create a remote access policy and assign the Deny - Remote Access permission. Add the Windows-Groups condition and specify all Active Directory groups except for Sales.

考题 单选题Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()A the Netsh toolB the Network Policy Server consoleC the Registry EditorD the Routing and Remote Access console

考题 单选题The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()A No account. They can use the built-in guest account.B No Account. They can use the built-in Administrator account.C Local user accountD Domain user account

考题 单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A BPDUB Port securityC RSTPD STPE VTPF Blocking mode

考题 单选题A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()A Configure roles based on departments and assign access based on source IP address.B Configure roles based on the user's manager and assign access based on the user's MAC addressC Configure roles based on group memberships and assign a specific VLAN to the role.D Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.

考题 单选题What is not a difference between VPN tunnel authentication and per-user authentication?()A VPN tunnel authentication is part of the IKE specification. B VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D 802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

考题 多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.