MCSE

单选题You are the network administrator for your company.You work in the company’s branch office in Chicago. The network in your office consists of 40 Windows XP Professional desktop computers and one Windows Server 2003 computer named Server1. Server1 conne

题目
单选题
You are the network administrator for your company.You work in the company’s branch office in Chicago. The network in your office consists of 40 Windows XP Professional desktop computers and one Windows Server 2003 computer named Server1. Server1 connects to the Internet through a 512-Kbps leased line. The main office of the company is in Seattle.Users of the desktop computers in the Chicago office are developers who are developing a new software product. You want these users to place daily builds of the product in a shared folder on Server1. You want developers in the Seattle office to be able to download the daily builds from Server1 by using FTP.You install IIS on Server1 and configure the FTP site so that it is available to the developers in the Seattle office. However, when you monitor inbound Internet connection attempts to Server1, you notice many attempted HTTP connections.You want to secure Server1 so that it is not susceptible to malicious Internet users. Server1 must also connect to the Internet to use Windows Update and to download virus definition updates. You do not want to purchase additional hardware or software.   What should you do on Server1?()
A

Enable Internet Connection Sharing (ICS).

B

Configure port filtering on the network adapter to allow only TCP port 80 and TCP port 21.

C

Enable Internet Connection Firewall (ICF) and create a service setting in the Internet Connection Firewall settings that allows Internal and external TCP port 21 to Server1  internal and external TCP port 80 to Server1

D

Enable Internet Connection Firewall (ICF) and select the FTP Server check box in the Services tab. Enter Server1 as the server hosting the FTP services.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


正确答案:B
解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

Incorrect answers:
A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

第2题:

You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts.Which network mask should you use?()

A.255.255.255.192

B.255.255.255.224

C.255.255.255.240

D.255.255.255.248

E.255.255.255.252

F.255.255.255.254


参考答案:B

第3题:

You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.

However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?

A. STP

B. GVRP

C. SNMP

D. VTP

E. DHCP

F. None of the above


正确答案:D
D 解析:Explanation:
The VTP (VLAN Trunking Protocol) is a Cisco Layer 2 messaging protocol that manages the addition, deletion, and renaming of VLANs on a network-wide basis. It allows for VLAN information to span multiple switches within the switch domain.

Incorrect Answers:
A. STP is a switching protocol but it is used for preventing network loops.

B. GVARP is an actual protocol used in switch administration, but it beyond the scope of what a CCNA is expected to know.

C. SNMP is a protocol used for managing and monitoring networks

E. DHCP is the Dynamic Host Configuration Protocol, which allows for PC's to obtain their IP address dynamically upon booting up, along with their DNS and default gateway information.

第4题:

You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode and you want to perform a backup. Which type of backup would be appropriate in this case? ()

  • A、Hot backup
  • B、Online backup
  • C、consistent backup
  • D、incremental backup
  • E、inconsistent backup

正确答案:C

第5题:

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

  • A、Repeater
  • B、Wireless router
  • C、Hub
  • D、Wireless network adapter

正确答案:D

第6题:

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()

A.Campus

B.Teleworker

C.Branch

D.Data center


参考答案:C

第7题:

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

  • A、STP
  • B、GVRP
  • C、SNMP
  • D、VTP
  • E、DHCP

正确答案:D

第8题:

You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.

You want to upgrade all of the critical system files and patches on the server in the shortest possible time.

What should you do?

A.Use Windows Update.

B.Run System File Checker.

C.Log on as administrator and run Windows Update.

D.Log on as administrator and run System File Checker.


正确答案:C
解析:Explanation:WindowsUpdateisusedtoupgradethesystemfilesandtoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.AllnecessaryfilesaredownloadedthroughtheInternet.TobeabletorunWindowsUpdatewemusthaveadministrativerights.Incorrectanswers:A:Thenon-administrativeuseraccountcannotbeusedtorunWindowsUpdate.TorunWindowsUpdatewemusthaveadministrativerights.B:SystemFileCheckercheckstheintegrityofthesystemfiles.Itcannotbeusedtoupgradethesystemfilesortoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.D:SystemFileCheckercheckstheintegrityofthesystemfiles.Itcannotbeusedtoupgradethesystemfilesortoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.

第9题:

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()

  • A、Campus
  • B、Teleworker
  • C、Branch
  • D、Data center

正确答案:C

第10题:

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Chicago and a branch office in Dallas. During the course of day you receive an instruction form the CIO to ensure that confidential data is not forwarded on the Internet. What should you do?()

  • A、Your best option would be to include Transport Protection Rules in your plan.
  • B、Your best option would be to include a custom Send connector in you plan.
  • C、Your best option would be to include custom MailTips in you plan.
  • D、Your best option would be to include Role Based Access Control (RBAC) role entries in your plan.

正确答案:A

更多相关问题