Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 and are configured as DNS servers. A domain controller named DC1 has a standard primary zone for contoso,com. A domain controller named DC2 has a standard secondary zone for contoso,com. You need to ensure that the replication of the contoso,com zone is encrypted. You must not lose any zone data. What should you do()
第1题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()
A.A
B.B
C.C
D.D
第2题:
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
第3题:
A sensor network is ( ) of a large number of sensor nodes that are densely deployed ( ) inside the phenomenon or very close to it.
A.part B.consist C.consisted D.composed A.either B.from C.at D.of
第4题:
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()
第5题:
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
第6题:
You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()
A.A
B.B
C.C
D.D
第7题:
Which two statements about common network attacks are true?()
第8题:
A.A
B.B
C.C
D.D
E.E
第9题:
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()
第10题:
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()