-
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
A . Enroll each administrative account for a smart card authentication certificate.
B . Configure autoenrollment for computer authentication certificates.
C . Install a smart card reader on each server computer.
D . Install a smart card reader on each network administrator’s computer.
E . Configure each administrative account to require a smart card for interactive logon.
F . Configure the Default Domain Policy GPO to require smart cards for interactive login.
-
Wide Area Network (WAN) is a computer network that covers a broad areA. Which statement is correct for wide-area network (WAN)?()
A . Limited in a single building, a group of buildings, or even a single room
B . Crosses metropolitan, regional, or national boundaries
C . Encompasses an entire city or metropolitan area and connects multiple local-area networks (LANs)
D . Connects client devices wireless protocol
-
How does network integration help businesses keep pace with changing network demands?()
A . addition of strict firewalls
B . limiting Internet access
C . intelligence on foundation network devices
D . increased use of network service
-
Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()
A . Content networking
B . Campus local-area networking
C . Network management
D . Network security
-
Your network contains an enterprise root certification authority (CA). You need to ensure that a certificate issued by the CA is valid. What should you do()
A . Run syskey.exe and use the Update option.
B . Run sigverif.exe and use the Advanced option.
C . Run certutil.exe and specify the -verify parameter.
D . Run certreq.exe and specify the -retrieve parameter.
-
VOIP is being implemented on the Company network. In a properly designed network, what is the maximum amount of time a voice package should spend crossing a network? ()
A . 90 milliseconds
B . 120 milliseconds
C . 150 milliseconds
D . 240 millisecond
-
The 201.145.32.0 network is subnetted using a /26 mask. How many networks and IP hosts per network exists using this subnet mask?()
A . 4 networks with 64 hosts
B . 64 networks and 4 hosts
C . 2 networks and 62 hosts
D . 62 networks and 2 hosts
E . 6 network and 30 host
-
Select the three best answers which best describe Private Network-to Network Interface (PNNI) in an ATM network.()
A . It is the Routing protocol used between ATM switches
B . PNNI uses the same Dijsktra algorithm for SPF calculation
C . PNNI and OSPF use the same Database to make cohesive decision for packet forwarding
D . PNNI measures line capacities and delays in addition to simple cost metric
-
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
A . Enroll each administrative account for a smart card authentication certificate.
B . Configure autoenrollment for computer authentication certificates.
C . Install a smart card reader on each server computer.
D . Install a smart card reader on each network administrator’s computer.
E . Configure each administrative account to require a smart card for interactive logon.
F . Configure the Default Domain Policy GPO to require smart cards for interactive login.
-
What are three factors a network administrator must consider before implementing Netflow in the network?()
A . CPU utilization
B . where Netflow data will be sent
C . number of devices exporting Netflow data
D . port availability
E . SNMP version
F . WAN encapsulatio
-
Network topology Exhibit:
https://assets.asklib.com/images/image2/2018073108484671566.jpg
You work as a network engineer for. You are required to set up the network being displayed in the network topology exhibit through the console using IOS commands.
A . 正确
B . 错误
-
Which of the following Class A networks is reserved for "private networks" use only?()
A . network 10.0.0.0
B . network 127.0.0.0
C . network 129.135.0.0
D . network 192.168.0.0
-
Jitter is causing problems with the VOIP application in the network. What causes network jitter?()
A . Variable queue delays
B . Packet drops
C . Transmitting too many small packets
D . Compressio
-
A network vulnerability scanner is part of which critical element of network and system security?()
A . host security
B . perimeter security
C . security monitoring
D . policy management
-
our network contains a Network Policy Server (NPS) named Server1.You need to configure a network policy for a VLAN.Which RADIUS attributes should you add?()
A . ¡¤Logi-LAT-Service ˆLogin-LAT-Node ˆLogin-LAT-Group ˆNAS-Identifier
B . ¡¤Tunne-Assignment-ID ˆTunnel-Preference ˆTunnel-Client-Auth-ID ˆNAS-Port-Id
C . ¡¤Tunne-Client-Endpt ˆTunnel-Server-Endpt ˆNAS-Port-Type ˆTunnel-Password
D . ¡¤Tunne-Medium-Type ˆTunnel-Pvt-Group-ID ˆTunnel-Type ˆTunnel-Tag
-
A network vulnerability scanner is part of which critical element of network and system security?()
A . host security
B . perimeter security
C . security monitoring
D . policy management
-
Which two series of routers can integrate security services, enable wireless networking, and simplify network management? ()
A . Cisco 830 Series routers
B . Cisco 850 Series routers
C . Cisco 1700 Series Modular Access Routers
D . Cisco 3800 Series Integrated Services Router
-
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port()。
A . This is a 10 Mb/s switch port
B . This is a 100 Mb/s switch port
C . This is an Ethernet port operating at half duplex
D . This is an Ethernet port operating at full duplex
E . This is a port on a network interface card in a PC
-
Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()
A . Optical network
B . Network management
C . Storage-area network (SAN)
D . Content delivery network (CDN)
-
Your network contains an enterprise root certification authority (CA). You need to ensure that a certificate issued by the CA is valid. What should you do()
A . Run syskey.exe and use the Update option. T.he safer ,easier way to help you pass any IT exams. 4 / 90
B . Run sigverif.exe and use the Advanced option.
C . Run certutil.exe and specify the -verify parameter.
D . Run certreq.exe and specify the -retrieve parameter.
-
SMB network decision makers commonly site which of the following as typical network requirements?()
A . scalability, effectiveness, high availability, mobility
B . cost effectiveness, high availability, hosting multiple protocols, hosting webservers
C . QoS, multicast, cost effectiveness, redundancy
D . centralization, security, highly available, scalability
-
CNN, Cable News Network, is the first network to provide 24-hour television news coverage, and the first all-news television network in the U.S.
-
In PTN wrapping ring network protection, when a node detects network failure, through
A.A.MPLS
B.B.OAM
C.C.APM
D.D.APS
-
Network Access Protection (NAP) is configured for the corporate network.Users connect to t
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()
A. Create an IPsec Enforcement Network policy.
B. Create an 802.1X Enforcement Network policy.
C. Create a Wired Network (IEEE 802.3) Group policy.
D. Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.