更多"A network administrator has configu"的相关试题:
[单项选择] A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()
A. The host needs to open the telnet port.
B. The host needs a route for the translated address.
C. The administrator must use a proxy-arp policy for the translated address.
D. The administrator must use a security policy, which will allow communication between the zones.
[单项选择]Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()
A. SHA not responding to NAP client
B. SHA unable to contact required services
C. SHV not responding
D. SHV unable to contact required services
[多项选择]An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL?()
A. FTP
B. Telnet
C. SMTP
D. DNS
E. HTTP
F. POP3
[单项选择]An access list has been designed to prevent HTTP traffic from the Accounting Department from reaching the HR server attached to the Holyoke router. Which of the following access lists will accomplish this task when grouped with the e0 interface on the Chicopee router()。
A. permit ip any any deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80
B. permit ip any any deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80
C. deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80 permit ip any any
D. deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80 permit ip any any
[单项选择]Your company has deployed network access protection (NAP) enforcement for VPNs. You need to ensure that the health of all clients can be monitored and reported. What should you do?()
A. Create a group policy object (GPO) that enabled security center and link the policy to the domain.
B. Create a group policy object (GPO) that enabled security center and link the policy to the domain controllers organizational unit (OU).
C. Create a group policy object (GPO) and set the require trusted path for credential entry option to enabled. Link the policy to the domain.
D. Create a group policy object (GPO) and set the require trusted path for credential entry option to Enabled. Link the policy to the domain controllers organizational unit (OU).
[单项选择]Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP.What should you do?()
A. Configure all access points as RADIUS clients to the Remediation Servers.
B. Configure all access points as RADIUS clients to the Network Policy Server (NPS).
C. Create a Network Policy that defines Remote Access Server as a network connection method.
D. Create a Network Policy that specifies EAP-TLS as the only available authentication method.
[单项选择]As a network administrator, you have configured a Catalyst 6500 Series Switch with redundant supervisor engine in a CIS network. What is the result of issuing the redundancy force-switchover command on that switch?()
A. Automatic switchover from active to standby on primary supervisor failure
B. Reset of the primary supervisor.
C. Manual switchover from active to standby supervisor
D. Manual switchover from standby to active supervisor
[单项选择] An administrator has configured a two node cluster, Node1 and Node2 with two resource groups, RG1 andRG2. The resource groups are configured as follows: RG1: Participating Nodes: Node1, Node2 Startup Policy: Online On Home Node Only Fallover Policy: Fallover To Next Priority Node In The List Fallback Policy Never Fallback RG2: Participating Nodes: Node2, Node1 Startup Policy: Online On Home Node Only Fallover Policy: Fallover To Next Priority Node In The List Fallback Policy: Fallback To Higher Priority NodeIn The List An Online on Different Nodes Dependency has been configured as:High Priority Resource Groups: RG2 Intermediate Priority Resource Group: RG1 The cluster has been running without any problems with both resource groups on their home nodes whenNode1 suffers a critical operating system problem causing the node to halt.What is the status of the resource groups?()()
A. RG1 is Online RG2 is Online
B. RG1 is Online RG2 is Offline
C. RG1 is Offline RG2 is Online
D. RG1 is Offline RG2 is Offline
[单项选择]Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()
A. Create an Ipsec enforcement network policy.
B. Create an 802.1xenforcemen tnetwork policy.
C. Createa wired network(IEEE802.3)Group policy.
D. Create an extensible authentication protocol(EAP)enforcement network policy.
[单项选择] Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()
A. Enable automatic updates on each client.
B. Enable the Security Center on each client.
C. Quarantine clients that do not have all available security updates installed.
D. Disconnect the connection until the required updates are installed.
[单项选择] Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()
A. Create an IPsec Enforcement Network policy.
B. Create an 802.1X Enforcement Network policy.
C. Create a Wired Network (IEEE 802.3) Group policy.
D. Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.