题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-10-21 22:10:12

[多项选择]A network administrator has configured access list 172 to prevent Telnet and ICMP traffic from reaching a server with the address if 192.168.13.26. Which command can the administrator issue to verify that the access list is working properly?()
A. Router# ping 192.168.13.26
B. Router# debug access-list 172
C. Router# show open ports 192.168.13.26
D. Router# show access-list
E. Router# show ip interface

更多"A network administrator has configu"的相关试题:

[单项选择] A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()
A. The host needs to open the telnet port.
B. The host needs a route for the translated address.
C. The administrator must use a proxy-arp policy for the translated address.
D. The administrator must use a security policy, which will allow communication between the zones.
[单项选择]Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()
A. SHA not responding to NAP client
B. SHA unable to contact required services
C. SHV not responding
D. SHV unable to contact required services
[多项选择]An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL?()
A. FTP
B. Telnet
C. SMTP
D. DNS
E. HTTP
F. POP3
[单项选择]An access list has been designed to prevent HTTP traffic from the Accounting Department from reaching the HR server attached to the Holyoke router. Which of the following access lists will accomplish this task when grouped with the e0 interface on the Chicopee router()。
A. permit ip any any deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80
B. permit ip any any deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80
C. deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80 permit ip any any
D. deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80 permit ip any any
[单项选择]Your company has deployed network access protection (NAP) enforcement for VPNs. You need to ensure that the health of all clients can be monitored and reported. What should you do?()
A. Create a group policy object (GPO) that enabled security center and link the policy to the domain.
B. Create a group policy object (GPO) that enabled security center and link the policy to the domain controllers organizational unit (OU).
C. Create a group policy object (GPO) and set the require trusted path for credential entry option to enabled. Link the policy to the domain.
D. Create a group policy object (GPO) and set the require trusted path for credential entry option to Enabled. Link the policy to the domain controllers organizational unit (OU).
[单项选择]Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP.What should you do?()
A. Configure all access points as RADIUS clients to the Remediation Servers.
B. Configure all access points as RADIUS clients to the Network Policy Server (NPS).
C. Create a Network Policy that defines Remote Access Server as a network connection method.
D. Create a Network Policy that specifies EAP-TLS as the only available authentication method.
[单项选择]As a network administrator, you have configured a Catalyst 6500 Series Switch with redundant supervisor engine in a CIS network. What is the result of issuing the redundancy force-switchover command on that switch?()
A. Automatic switchover from active to standby on primary supervisor failure
B. Reset of the primary supervisor.
C. Manual switchover from active to standby supervisor
D. Manual switchover from standby to active supervisor
[单项选择] An administrator has configured a two node cluster, Node1 and Node2 with two resource groups, RG1 andRG2. The resource groups are configured as follows: RG1: Participating Nodes: Node1, Node2 Startup Policy: Online On Home Node Only Fallover Policy: Fallover To Next Priority Node In The List Fallback Policy Never Fallback RG2: Participating Nodes: Node2, Node1 Startup Policy: Online On Home Node Only Fallover Policy: Fallover To Next Priority Node In The List Fallback Policy: Fallback To Higher Priority NodeIn The List An Online on Different Nodes Dependency has been configured as:High Priority Resource Groups: RG2 Intermediate Priority Resource Group: RG1 The cluster has been running without any problems with both resource groups on their home nodes whenNode1 suffers a critical operating system problem causing the node to halt.What is the status of the resource groups?()()
A. RG1 is Online RG2 is Online
B. RG1 is Online RG2 is Offline
C. RG1 is Offline RG2 is Online
D. RG1 is Offline RG2 is Offline
[单项选择]Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()
A. Create an Ipsec enforcement network policy.
B. Create an 802.1xenforcemen tnetwork policy.
C. Createa wired network(IEEE802.3)Group policy.
D. Create an extensible authentication protocol(EAP)enforcement network policy.
[单项选择] Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()
A. Enable automatic updates on each client.
B. Enable the Security Center on each client.
C. Quarantine clients that do not have all available security updates installed.
D. Disconnect the connection until the required updates are installed.
[单项选择] Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()
A. Create an IPsec Enforcement Network policy.
B. Create an 802.1X Enforcement Network policy.
C. Create a Wired Network (IEEE 802.3) Group policy.
D. Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码