护理学相关专业知识

单选题You are the network administrator for Company.  You configure an L2TP virtual private network (VPN) connection on your Windows 2000 Professional computer to remotely access Company’s Windows 2000 Routing and Remote Access server. The server is configur

题目
单选题
You are the network administrator for Company.  You configure an L2TP virtual private network (VPN) connection on your Windows 2000 Professional computer to remotely access Company’s Windows 2000 Routing and Remote Access server. The server is configured to accept a limited number of both PPTP and L2TP connections. You configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically. Many times when you try to connect, you are unable to because all of the ports are in use. Other times you are able to connect successfully.   You want to increase your chances of being able to connect to the server while ensuring that the most secure connection type available is used.   What should you do? ()
A

Enable the VPN connection to use MS-CHAP.

B

Specify a TCP/IP address in the Network properties.

C

Change the data encryption setting to Optional Encryption.

D

Configure the Type of VPN server I am calling to be Automatic.

E

Configure the Type of VPN server I am calling to be PPTP.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()

A.Campus

B.Teleworker

C.Branch

D.Data center


参考答案:C

第2题:

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. The domain contains a Windows Server 2003 computer named Server1.   You are planning a public key infrastructure (PKI) for the company. You want to deploy a certification authority (CA) on Server1.   You create a new global security group named Cert Administrators. You need to delegate the tasks to issue, approve, and revoke certificates to members of the Cert Administrators group.   What should you do?()

  • A、 Add the Cert Administrators group to the Cert Publishers group in the domain.
  • B、 Configure the Certificates Templates container in the Active Directory configuration naming context to assign the Cert Administrators group the Allow - Write permission.
  • C、 Configure the CertSrv virtual directory on Server1 to assign the Cert Administrators group the Allow - Modify permission.
  • D、 Assign the Certificate Managers role to the Cert Administrators group.

正确答案:D

第3题:

You are a network administrator for your company. All servers run Windows Server 2003. A server namedServer34 runs an application named App1.Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)You need to identify the unauthorized application by using the output from the netstat command.Which tool should you use to identify the application? ()

A. Performance console

B. System Monitor

C. Network Monitor

D. Task Manager


参考答案:D

第4题:

You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()

  • A、/24
  • B、/26
  • C、/27
  • D、/28

正确答案:C

第5题:

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

  • A、Repeater
  • B、Wireless router
  • C、Hub
  • D、Wireless network adapter

正确答案:D

第6题:

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

  • A、STP
  • B、GVRP
  • C、SNMP
  • D、VTP
  • E、DHCP

正确答案:D

第7题:

You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()

  • A、You should assign the network 172.16.0.0/16.
  • B、You should assign the network 172.16.0.0/17.
  • C、You should assign the network 172.16.0.0/18.
  • D、You should assign the network 172.16.0.0/19.
  • E、You should assign the network 172.16.0.0/20.
  • F、You should assign the network 172.16.0.0/22.

正确答案:F

第8题:

You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


正确答案:B
解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

Incorrect answers:
A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

第9题:

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()

  • A、Campus
  • B、Teleworker
  • C、Branch
  • D、Data center

正确答案:C

第10题:

You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install Windows Server Update Services (WSUS) on a network server named Server1. When you attempt to synchronize Server1 with the Windows Update servers, you receive an error message. You open Internet Explorer and verify that you can communicate with an external Web site by using the proxy server. You need to ensure that Server1 can communicate with the Windows Update servers. What should you do on Server1?()

  • A、Restart the IIS administration tool.
  • B、Configure the Internet Explorer settings to bypass the proxy server.
  • C、In the WSUS options, configure authentication to the proxy server.
  • D、Install the ISA Firewall Client.

正确答案:C

更多相关问题