-
Your computer is unable to access external names or IP addresses. You need to connect to external Internet resources.
What should you do first?()
https://assets.asklib.com/images/image2/2018073115223915388.jpg
A . A
B . B
C . C
D . D
-
You are designing a strategy to provide Internet access to all users. What should you do?()
A . Configure Internet Connection Sharing on all client computers.
B . Configure Automatic Private IP Addressing (APIPA) on all client computers.
C . Configure one server as a Routing and Remote Access VPN server.
D . Configure one server as a Routing and Remote Access NAT router.
-
Which wild card mask will enable a network administrator to permit access to the Internet for only hosts that are assigned an address in the range 192.168.8.0 through 192.168.15.255?()
A . 0.0.0.0
B . 0.0.0.255
C . 0.0.255.255
D . 0.0.7.255
E . 0.0.3.255
F . None of the above
-
访问列表如下: access-list 4 deny 202.38.0.00.0.255.255 access-list 4 permit 202.38.160.10.0.0.255 应用于该路由器的配置如下: Quidway(config)#firew all default permit Quidway(config-if-Serical0)#ipaccess-group 4 in 该路由器E0口接本地局域网,S0口接到Internet,以下说法正确的有:()
A . A、所有的外部数据包都可以通过S口,自由出入本地局域网
B . B、内部主机可以任意访问外部任何地址的主机
C . C、内部主机不可以访问本列表禁止的外部地址的主机
D . D、连在该路由器其他端口的主机可任意访问内部网资源
-
You are creating a shared Internet connection on your Windows 2000 Professional computer. You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet. What should you do?()
A . Configure your shared Internet connection to disable LCP extensions.
B . Configure you shared Internet connection to disable on-demand dialing.
C . Create an Internet Connection Sharing application type for HTTP to use remote server port 25.
D . Create an Internet Connection Sharing application type for HTTP to use remote server port 80.
E . Create an Internet Connection Sharing application type for FTP to use remote server port 21.
F . Create an Internet Connection Sharing application type for FTP to use remote server port 72.
-
You need to recommend a solution for controlling access to the Internet.The solution must meet the museum’s security polic. What should you include in the recommendation?()
A . File Server Resource Manager (FSRM) file screens and Group Policy objects (GPOs)
B . Microsoft Forefront Threat Management Gateway (TMG) 2010
C . Microsoft Forefront Unified Access Gateway (UAG) 2010
D . Windows Firewall with Advanced Security and Group Policy objects (GPOs)
-
You are designing a strategy to ensure that all employees have Internet access. For each branch office, what should you do?()
A . Configure a DNS server to function as caching-only servers.
B . Configure Internet Connection sharing on terminal servers.
C . Install and configure an Internet Security and Acceleration (ISA) Server Computer.
D . Install and configure a server running Routing and Remote Acess to function as a VPN server.
-
You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()
A . <authorization> <allow users="?"/> </authorization>
B . <authorization> <deny users="?"/> </authorization>
C . <authorization> <deny users="*"/></authorization>
D . <authorization> <allow users="*"/> </authorization>
-
You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()
A .https://assets.asklib.com/images/image2/2018072715022379718.jpg
B .https://assets.asklib.com/images/image2/2018072715022848525.jpg
C .https://assets.asklib.com/images/image2/2018072715023295714.jpg
D .https://assets.asklib.com/images/image2/2018072715023680640.jpg
-
You are creating a dial-up connection for Internet access. The wizard cannot access the default Internet Service Providers (ISP) with either of the numbers provided. What is your alternate method for setting up the connection?()
A . Configure the dial-up connection to negotiate with the server using Challenge-Handshake Authentication Protocol (CHAP).
B . You can choose the option to set up the Internet connection manually if you know the ISP's phone number and your account and password already.
C . You need to provide a known IP address before attempting to connect to the ISP server.
D . Your ISP is requiring Data Encryption. Configure the dial- up connection to use it.&e
-
You need to design access to e-mail by Internet users. What should you do?()
A . Configure front-end servers to use HTTP to communicate with back-end servers
B . Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange servers
C . Require all users to encrypt all outbound e-mail messages
D . Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Acce
-
在Access 2003数据库的七个对象中,()在一定程度上集成了Internet Explorer浏览器和FrontPage编辑器的功能。
A . 页
B . 报表
C . 表
D . 查询
-
BSS发送UPLINK_FREE消息,表明当前组呼的上行是空闲态。用户按PTT键后,手机上报UPLINK_ACCESS消息,请求占用上行。
A . 正确
B . 错误
-
Your computer is unable to access external names or IP addresses. You need to connect to external Internet resources. What should you do first?()
A . In a command window, type the ipconfig /displaydns command.
B . In the Network and Sharing Center window, click the View Full Map link.
C . In the Network and Sharing Center window, click the Diagnose and repair link.
D . Configure the DNS server by using an IP address provided by your Internet Service Provider (ISP).
-
A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。
A . 10.10.0.1
B . 10.10.0.2
C . 199.99.9.33
D . 199.99.9.57
E . 200.2.2.17
F . 200.2.2.18
-
As an Internet researcher, you should review the source of each site accessed and ______________of each document accessed.
-
Customers must have access to the Internet and a valid method of payment in order to complete a transaction.
-
听力原文: Web filtering is just one method or restricting access to the Internet. Here are some countries that have tried to control or track their residents' online activities, according to Reporters Without Borders.
Saudi Arabia—The government filters all traffic through a central server and recently issued regulations banning access to sites considered subversive, contrary to the State or its system or damaging to the dignity of the heads of state.
Burma—Except for some government officials and businessmen, few people in this military-controlled country have access to the Internet. A colonel was jailed after visiting an opposition political site.
China—Internet service providers must install filters that block the Web sites of many Western media outlets, Taiwan and Hong Kong newspapers, human rights groups and the Falun Gong, the banned illegal movement. The government has set up a special Internet police unit.
Britain—Last year the Regulation of Investigatory Powers Act extended police phone-tapping privileges to the Internet. If asked, companies and individuals would have to help law enforcement officials decode lawfully obtained data.
Russia—The government has instituted an Internet surveillance system that requires service providers and telephone operators to reroute data traffic to local law enforcement headquarters, allowing authorities to monitor phone calls or e-mail.
Australia—The government does not filter the Internet, but the Broadcasting Services Act defines forbidden online content, including specific representations of sexual acts and information on crime, violence and the use of certain narcotics.
Questions:
11. According to the reporters, how do the mentioned countries control or track their residents' online activities ?
12.Which countries track net activities, according to the report?
13.Who was jailed after visiting an opposition political site?
14.What has the government of China set up in order to supervise the illegal Web activities?
15.Which of the forbidden online content is not mentioned?
(31)
A.Install Web filters.
B.Set Web sites.
C.Ban access to sites.
D.Block online service activities.
-
将Access数据库中的数据发布在Internet网络上可以通过______。
A.查询
B.窗体
C.表
D.数据访问页
-
According to the passage, the major advantage of the Internet is [A] its convenience in obtaininginformation. [B] its wide and cheap access aroundthe world. [C] its ability to process information. [D] its adaptability to computerhardware.
-
You are the administrator of a Windows Server 2003 computer named TestKing3.TestKing3 has Terminal Services installed. TestKing3 connects to the Internet through a proxy server on the company network.Help desk employees periodically access custom web applications on the company network. You install IIS on TestKing3 with all the default settings.You need to ensure that help desk employees can access Terminal Services on TestKing3 from Internet Explorer 6.0.What should you do?()
A. Uninstall IIS and Terminal Services. Reinstall IIS, and then reinstall Terminal Services.
B. Configure the Internet Connection Firewall (ICF) to allow incoming ports 80 and 3389.
C. Create a new virtual directory named Tsweb.
D. Create a new web site named Tsweb.
E. Install Remote Desktop Web Connection
-
Everyone in the world can access the Internet using his World Wide Web system
请问这句话怎么翻译?
还有这个using为什么这么用?是动词ing形式作定语么?
-
将Access数据库中的数据发布在Internet网络上可以通过()。
A.查询
B.窗体
C.报表
D.数据访问页
-
以下关于213系列车型中的HANDS-FREE ACCESS功能描述正确的是()
A.进行踢腿动作时,站在距离车辆至少30公分的位置
B.钥匙位于车内
C.进行踢腿动作时,动作越慢越好
D.钥匙位于车后
E.进行踢腿动作时,不能接触保险杠