-
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
A . Enroll each administrative account for a smart card authentication certificate.
B . Configure autoenrollment for computer authentication certificates.
C . Install a smart card reader on each server computer.
D . Install a smart card reader on each network administrator’s computer.
E . Configure each administrative account to require a smart card for interactive logon.
F . Configure the Default Domain Policy GPO to require smart cards for interactive login.
-
You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()
A . Configuration register
B . NVRAM
C . Boot flash
D . CMOS
E . Flash
-
You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?()
A . Bandwidth 56000
B . Bandwidth 56000000
C . Bandwidth 56
D . Bandwidth 56k
-
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
A . Wireless router
B . Hub
C . Repeater
D . Wireless network adapter
-
You need to ensure that the network administrators are able to administer the NewApp database servers. Which two actions should you perform?()
A . Create an organizational unit (OU) for all users who log on to any of the NewApp servers.
B . Create an organizational unit (OU) named NewApp Users for the NewApp users.
C . Create an organizational unit (OU) named NewApp Servers for the NewApp servers.
D . Create a Group Policy object (GPO) for the NewApp Users OU to enforce the use of IPSec.
E . Create a global group for all NewApp servers. Add this group to the NewApp Servers OU.
F . Create a Group Policy object (GPO) for the NewApp Servers OU to enforce the use of smart cards.
-
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
A . Enroll each administrative account for a smart card authentication certificate.
B . Configure autoenrollment for computer authentication certificates.
C . Install a smart card reader on each server computer.
D . Install a smart card reader on each network administrator’s computer.
E . Configure each administrative account to require a smart card for interactive logon.
F . Configure the Default Domain Policy GPO to require smart cards for interactive login.
-
As the Company wireless administrator, you required to be knowledgeable about the wireless LAN components. Which two statements about these components are true? ()
A . In the autonomous access point solution, control is provided by the WLAN controller.
B . In the lightweight access point solution, WLAN management is provided by the WLAN Control System (WCS).
C . In the autonomous access point solution, control is provided by the WDS (Wireless Domain Services).
D . Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless Network.
E . Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution Engine (WLSE).
F . Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless Network.
-
As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()
A . NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
B . NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
C . NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.
D . NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.
-
You are the Database Administrator (DBA) of your company. You execute the following statement on an Oracle 10g instance: SQL> ALTER SYSTEM SWITCH LOGFILE; Which two tasks are performed when the statement is executed? ()
A . The DBWn process writes to the datafile.
B . Changes in the background process are recorded.
C . The log file is updated with the current SCN number.
D . The System Change Number (SCN) is recorded in the control file.
E . The changes to the listener configuration in the listener.ora file are recorded.
-
You are the Exchange administrator of the Xxx Corporation’s Exchange 2010 organization.You have configured a Database Availability Group (DAG) named DAG01.You need to change the replication port used by the DAG.What are two things that you must do?()
A . Use the Exchange Management Console (EMC) to change the TCP port used for replication.
B . Use the Exchange Management Shell to change the TCP port used for replication.
C . Modify the Windows Firewall exceptions on each member of the DAG to open the replication port.
D . Modify the Windows Firewall exceptions on the witness server of the DAG to open the replication port.
E . Use the Exchange Management Shell to configure the DAG IP address of 0.0.0.0.
F . Use the Exchange Management Shell to change the DAG IP address to 127.0.0.1.
-
You are the network administrator tasked with designing a switching solution for the Company network. Which of the following statements describing trunk links are INCORRECT?()
A . The trunk link belongs to a specific VLAN.
B . Multiple trunk links are used to connect multiple end user devices.
C . A trunk link only supports native VLAN.
D . Trunk links use 802.10 to identify a VLAN.
E . The native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets.
-
You are the Exchange administrator for the Xxx Corporation’s Exchange 2010 organization.You want to test connectivity for Outlook Anywhere through the Autodiscover service.What should you use to test it?()
A . Mail Flow Troubleshooter
B . The Test-OutlookConnectivity cmdlet
C . Message Tracking
D . Performance Troubleshooter
-
You are preparing the supporting network infrastructure for the upgrade to Exchange Server 2003. You want to accomplish this upgrade by using the minimum amount of administrative effort.Which two actions should you perform?()
A . Run the setup.exe /domainprep command on a domain controller in the prod.testking.com domain
B . Run the setup.exe /domainprep command on a domain controller in the app.testking.com domain
C . Run the setup-exe /domainprep command on a domain controller in the testking.com domain
D . Log on to the domain by using a user account that is a member of the Domain Admins group
E . Log on to the domain by using a user account that is a member of the Schema Admins grou
-
You are the network administrator in the New York office of TestKing.The company net
You are the network administrator in the New York office of TestKing.
The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA.
All file servers in the New York office are in an organizational unit (OU) named
New York Servers. You have been assigned the Allow - Change permission for a
Group Policy object (GPO) named NYServersGPO, which is linked to the New
York Servers OU.
The written company security policy states that all new servers must be configured
with specified predefined security settings when the servers join the domain. These
settings differ slightly for the various company offices.
You plan to install Windows Sever 2003, on 15 new computers, which all functions
as file servers. You will need to configure the specified security settings on the new
file servers.
TestKingA currently has the specified security settings configured in its local
security policy. You need to ensure that the security configuration of the new file
servers is identical to that of TestKingA. You export a copy of TestKingA‘s local
security policy settings to a template file.
You need to configure the security settings of the new servers, and you want to use
the minimum amount of administrative effort.
What should you do?()
-
You are a network administrator for The network consists of a single Active Directory domain named.
The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO.
Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:\Program Files\MT Apps. The financial application suite contains many executable files.
Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components.
The financial application suite and the browser-based application are frequently updates with patches or new versions.
You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration.
Which three actions should you perform to configure software restriction polices?()
(Each correct answer presents part of the solution. Choose three)
-
You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name "CONTOSO\Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()
A. In the Web.config file, enable impersonation.
B. In IIS, enable anonymous access.
C. In IIS, disable anonymous access.
D. In the Web.config file, set the authentication mode to Windows.
-
You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.
You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.
Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.
You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.
A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/c1ca10b5ef7976b1e62efd8e32fc3420.jpg' />
You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/35218487c59e1ec9d3305e8d5fd23b81.jpg' />
You need to ensure that Paul can establish Remote Desktop connections with DC1.
What should you do? ()
-
You are the administrator of the Coho Vineyard network. The network consists of 10 Windows 2000 Advanced Server computers and 250 Windows 2000 Professional computers.
Your company has two domains cohovineyard.com and westcoastsales.com.
The company's intranet site is on a Windows 2000 Advanced Server computer named ServerA. ServerA is in the cohovineyard.com domain and is running Internet Information Services (IIS) and Microsoft Proxy Server 2.0
You want to configure the Windows 2000 Professional computers in the westcoastsales.com domain to access the intranet site. You want users to be able to connect to the intranet site by using the URL http://serverA rather than its fully qualified domain name.
What should you do?
A.Add cohovineyard.com to the Domain Suffix Search Order on the computers.
B.Add westcoastsales.com to the Domain Suffix Search Order on the computers.
C.Add westcoastsales.com to the exceptions list in the proxy server settings on the computers.
D.Configure the proxy server settings on the computers to bypass the proxy server for intranet addresses.
-
You are the administrator of a SQL Server 2000 computer. Each evening after business hours, you perform. database maintenance tasks. You create a Data Transformation Services package to populate the data warehouse. MAPI is not installed on the server.
You want to schedule the DTS package to run each night. You want to attend to other duties while the DTS package is executing. You also want to be notified if the DTS package fails.
What should you do?
A.Select the DTS packages log package execution to SQL server check box. Create a SQL server event alert to notify you if the package fails.
B.Select the DTS packages write completion status to event log check box. Create a SQL server event alert to notify you if the package fails.
C.Configure the DTS package to include an on failure precedence constraint and a send mail task. Configure the send mail task to notify you if the package fails.
D.Configure the DTS package to include an on failure precedence constraint and a send mail task. Configure the execute process task to execute a not send command that will notify you if the package fails.
-
You are the network administrator for All servers run Windows Server 2003.You are creating a backup schedule for the main file server.You need to create a schedule so that backup jobs are completed in the shortestamount of time possible.What should you do?()
A. Schedule a normal backup every Sunday. Schedule incremental backups every Monday through Saturday.
B. Schedule a normal backup every Sunday. Schedule differential backups every Monday through Saturday.
C. Schedule a copy backup every day.
D. Schedule a normal backup every day.
-
You are the network administrator for You manage a WindowsServer 2003 computer named TestKing1.There are multiple scheduled tasks configure on TestKing1. One task is a scheduledbackup job. You need to temporarily disable the backup job from running so thatyou can troubleshoot a problem. You must not interfere with any other scheduledtasks.You need to disable the scheduled backup job. You want to achieve this goal byusing the minimum amount of administrative effort.What should you do?()
A. Pause the Task Scheduler service.
B. Delete the scheduled backup job. Re-create the backup after you finish troubleshooting.
C. Modify the properties of the scheduled backup job and clear the Enabled check box.
D. Run the ntbackup /p command on the server.
-
You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.
However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?
A. STP
B. GVRP
C. SNMP
D. VTP
E. DHCP
F. None of the above
-
You are the administrator on a Linux network.You have created and are ready to impleme
A.Chmod-M30
B.Chgrp-d30
C.Chage-M30
D.Useradd-D30
-
You are logged on as the administrator of your new computer, which runs Windows NT wor
A.Directory Replication
B.Workstation
C.Netlogon
D.Server