-
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
A . Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
B . Allow all inbound VPN traffic to pass through the perimeter firewall only.
C . Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
D . Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
-
What are two reasons that a network administrator would use access lists? (Choose two.) ()。
A . to control vty access into a router
B . to control broadcast traffic through a router
C . to filter traffic as it passes through a router
D . to filter traffic that originates from the router
E . to replace passwords as a line of defense against security incursions&e
-
In a network using Cisco autonomous access points running WDS, what port is used for authentication by the local authentication service on an access point?()
A . 1813
B . 1645
C . 1646
D . 1812
-
What are two benefits of clustered access points on a small business network using the Cisco500 Series Access Point? ()
A . Cisco IOS configuration
B . tri-band 11g single radios
C . rouge AP integration
D . single view to deploy and manage
E . secure guest acce
-
You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()
A . It is a list of remote database links stored in the XML file that are available to the users of the database.
B . It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
C . It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
D . It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.
-
Your network contains a server that runs Windows Server 2008 R2. The server has the Network Policy and Access Services server role installed. You need to allow only members of a global group named Group1 VPN access to the network. What should you do? ()
A . Add Group1 to the RAS and IAS Servers group.
B . Add Group1 to the Network Configuration Operators group.
C . Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.
D . Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.
-
In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()
A . 1813
B . 1645
C . 1646
D . 1812
-
ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()
A . It is a list of remote database links stored in the XML file that are available to the users of the database.
B . It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
C . It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
D . It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.
-
You are the Cisco Network Designer in Cisco.com. Which two statements about Layer 3 access designs are correct?()
A . Convergence time is fractionally slower than STP.
B . Broadcast and fault domains are increased.
C . IP address space is difficult to manage.
D . Fast uplink convergence is supported for failover and fallback.
-
What are two reasons that a network administrator would use access lists (Choose two.)()。
A . to control vty access into a router
B . to control broadcast traffic through a router
C . to filter traffic as it passes through a router
D . to filter traffic that originates from the router
E . to replace passwords as a line of defense against security incursio
-
NSAPI的全称为Network layer Service Access Point Identifier。()
A . 正确
B . 错误
-
The Cisco NAC Appliance is able to check which three items before allowing network access?()
A . client antivirus software state
B . personal firewall settings
C . wireless cell bandwidth availability
D . IOS versions for routers and switches
E . appropriate client patch management level
F . appropriate QoS settings for client applicatio
-
Which feature would prevent guest users from gaining network access by unplugging an IP phone andconnecting a laptop computer?()
A . IPSec VPN
B . SSL VPN
C . port security
D . port security with statically configured MAC addresses
E . private VLAN
-
UTRAN(UMTS Terrestrial Radio Access Network)执行RAN的功能,其外部接口包括().
A . IU口
B . IUb口
C . lur口
D . UU口
-
Cisco Clean Access ensures that computers connecting to your network have which of the following?()
A . No vulnerable applications or operating systems
B . No viruses or worms
C . Appropriate security applications and patch levels
D . Current IPS signatures
E . Cisco Security Agent
-
The Company wireless network is using 802.11G access points. Which two statements are true about these access points? ()
A . It supports eight different data rates.
B . It is fully backward compatible with 802.11b
C . It provides the same network throughput with 802.11b clients, 802.11g clients, or a mixed environment where both clients are present.
D . It is only compatibly with the 11 Mbps 802.11b transfer rate.
E . It has three non-overlapping channels in its channel options.
-
称取KCl0.447g和NaC19.36g,溶于蒸馏水倒入500ml容量瓶中,稀释至刻度,此时溶液中Na+、K+浓度相当于(原子量K=39,Na=23,Cl=35.5)()。
A . Na
140mmol/LK
5.5mmol/L
B . Na
145mmol/LK
6.0mmol/L
C . Na
155mmol/L
K5mmol/L
D . Na
150mmol/LK
5.5mmol/L
E . Na
160mmol/LK
6.0mmol/L
-
The Cisco NAC Appliance is able to check which three items before allowing network access?()
A . client antivirus software state
B . personal firewall settings
C . wireless cell bandwidth availability
D . IOS versions for routers and switches
E . appropriate client patch management level
F . appropriate QoS settings for client application Answer:
-
有关系S(S#,SNAME,SAGE),C(C#,CNAME),SC(S#,C#,GRADE)。其中S#是学生号,SNAME是学生姓名,SAGE是学生年龄,C#是课程号,CNAME是课程名称。要查询选修“ACCESS”课的年龄不小于20的全体学生姓名的SQL语句是SELECT SNAME FROM S,C,SC WHERE子句。这里的WHERE子句的内容是( )。
-
有关系 S(S#,SNAME,SAGE), C(C#,CNAME), SC(S#,C#,GRADE)。要查询选修”ACCESS”课的年龄不小20的全体学生姓名的SQL语句”SELECT SNAME FROM S,C,SC WHERE 子句”。这里的WHERE子句的内容是( )。
-
已知惯性系S&39;相对于惯性系S以0.5c的匀速度沿x轴负方向运动,若从S&39;系的坐标原点O&39;沿x轴正方向发出一光波,则S系中测得此光波的波速为多少(c为真空中的光速)?
-
Network Access Protection (NAP) is configured for the corporate network.Users connect to t
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()
A. Create an IPsec Enforcement Network policy.
B. Create an 802.1X Enforcement Network policy.
C. Create a Wired Network (IEEE 802.3) Group policy.
D. Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.
-
Mathilda is a Linux administrator on a large network.She does not have access to Linux
A.But she wants to automate the account creating process.Which of the following choices will best help Mathilda to simplify the process?()
B.Establish a default system profile file and use the user add-D command when creating new users.
C.Establish a default system profile file and use the user add-d command when creating new users.
D.Establish a default system profile file and use the user add-G command when creating new users.
E.Establish a default system profile file and use the user add-g command when creating new users.
-
NAC&39;s (Network Access Control) role is to restrict network access to only compliant endpoints and ()users. However, NAC is not a complete LAN(请作答此空)solution; additional proactive and ()security
A.crisis
B. security
C. favorable
D. excellent