-
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
A . Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
B . Allow all inbound VPN traffic to pass through the perimeter firewall only.
C . Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
D . Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
-
You have a secured Windows Communication Foundation (WCF) service. You need to track unsuccessful attempts to access the service. What should you do?()
A . Set the authorization Manager Type attribute of the service Authorization behavior to Message.
B . Set the include Exception Detailsln Faults attribute of the service Debug behavior to true.
C . Set the Mode attribute of the security configuration element to Message.
D . Set the message Authentication AuditLevel attribute of the service Security Audit behavior to Failure.
-
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
A . Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
B . Allow all inbound VPN traffic to pass through the perimeter firewall only.
C . Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
D . Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
-
You need to reduce the level of access that a malicious Web site might have to your computer. What should you do? ()
A . Start a Windows Defender scan.
B . Enable Microsoft Windows Internet Explorer Phishing Filter.
C . Enable Microsoft Windows Internet Explorer Pop-up Blocker.
D . Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.
-
You want to limit access to a method of a public class to members of the same class. Which access modifier accomplishes this objective?()
A . Public
B . Private
C . Protected
D . Transient
E . No access modifier is required
-
We would like to take this()to establish business relations with you.
A、opening
B、opportunity
C、step
D、advantage
-
You need to design an e-mail access strategy for remote users. What should you do? ()
A . Instruct remote users to connect to their e-mail by using RPC
B . Instruct remote users to connect to Outlook Web Access by using only HTTPS
C . Instruct remote users to connect to the company network by using PPTP connections
D . Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.
-
You are designing a strategy to provide Internet access to all users. What should you do?()
A . Configure Internet Connection Sharing on all client computers.
B . Configure Automatic Private IP Addressing (APIPA) on all client computers.
C . Configure one server as a Routing and Remote Access VPN server.
D . Configure one server as a Routing and Remote Access NAT router.
-
You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()
A . show access-list
B . show ip access-list
C . show ip interface
D . show interface
E . show interface list
-
To establish a communication channel for the telex service in the INMARSAT-A terminal, you should first().
A . establish a communication channel from the CES, via the International Telex network to the final destination
B . set up a communication channel from your SES, via a satellite, to a CES within your ocean region
C . set up a channel directly to the addressee at the destination
D . establish a channel from your terminal, via the International telex network to a CES within your ocean regio
-
You are designing a strategy to ensure that VPN users are able to access all internal resources. What should you do?()
A . Specify a static routing table entry on VPN1 for the Dallas network.
B . Specify a static routing table entry on VPN1 for the Seattle network.
C . Implement Internet Authentication Service (IAS) on VPN1.
D . Define a User Class option for Routing & Remote Access Clients on the DHCP Server.
-
You want subclasses in any package to have access to members of a superclass. Which is the most restrictive access that accomplishes this objective?()
A . public
B . private
C . protected
D . transient
E . default acce
-
You want subclasses in any package to have access to members of a superclass. Which is the mostrestrictive access modifier that will accomplish this objective?()
A . Public
B . Private
C . Protected
D . Transient
E . No access modifier is qualified
-
You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()
A . From Windows Firewall, add an exception
B . From windows Firewall enable the block all incoming connections option
C . From the Windows Firewall with Advanced Security snap-in, create an inbound rule
D . From the Windows Firewall with Advanced Security snap-in, create an outbound rule.
-
You have an Exchange Server 2010 organization.You install a new Client Access server in the organization.You need to verify whether users can access the new Client Access server by using Outlook Web App. What should you do?()
A . From the Exchange Best Practices Analyzer, run a baseline scan.
B . From the Exchange Management Shell, run the Test-OwaConnectivity cmdlet.
C . From the Exchange Management Console (EMC), examine the properties of the default Outlook Web App mailbox policy.
D . From the Internet Information Services (IIS) Manager, view the session state settings for the Outlook Web Access virtual directory.
-
You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()
A . Create a Network Load Balancing cluster that contains the Outlook Web Access servers
B . Create a Microsoft Cluster Server cluster that contains the Outlook Web Access servers
C . Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailbox
D . Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access server
-
You work as a network engineer at TestKing.com. You are required to allow establishment of a Telnet session with a router TestKingC.Which set command must be configured?()
A .https://assets.asklib.com/images/image2/2018072717510448028.jpg
B .https://assets.asklib.com/images/image2/2018072717511289780.jpg
C .https://assets.asklib.com/images/image2/2018072717511936039.jpg
D .https://assets.asklib.com/images/image2/2018072717512431070.jpg
E .https://assets.asklib.com/images/image2/2018072717513262336.jpg
F .https://assets.asklib.com/images/image2/201807271751385786.jpg
-
To establish a communication channel for the telex service in the INMARSAT-Aterminal, you should first().
A . establish a communication channel from the CES, via the International Telex Network to the final destination
B . set up a communication channel from your SES, via a satellite, to a CES within your ocean region
C . set up a channel directly to the addressee at the destination
D . establish a channel from your terminal , via the International Telex Network to a CES within your ocean regio
-
Look at the graphic below, the connectivity between Cisco IP phone access port and theworkstation CK-PC has been established, how to manage the traffic?()https://assets.asklib.com/images/image2/2018072616242596692.jpg
A . The IP phone access port will override the priority of the frames received from the CK-PC
B . The IP phone access port would trust the priority of the frames received from the CK-PC
C . The switch port FaO/4 would neglect the priority of the frames received from the CK-PC
D . The switch port FaO/4 would trust the priority for the frames received from the CK-PC
-
Your network consists of a single Active Directory domain. You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent users from establishing multiple Remote Desktop connections to the server. What should you do? ()
A . Install and configure Terminal Server Licensing.
B . From Terminal Services Manager, modify the user sessions.
C . From Terminal Services Configuration, modify the server settings.
D . From Active Directory Users and Computers, modify the Sessions settings for each user account.
-
You need to design access to e-mail by Internet users. What should you do?()
A . Configure front-end servers to use HTTP to communicate with back-end servers
B . Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange servers
C . Require all users to encrypt all outbound e-mail messages
D . Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Acce
-
Your computer is unable to access external names or IP addresses. You need to connect to external Internet resources. What should you do first?()
A . In a command window, type the ipconfig /displaydns command.
B . In the Network and Sharing Center window, click the View Full Map link.
C . In the Network and Sharing Center window, click the Diagnose and repair link.
D . Configure the DNS server by using an IP address provided by your Internet Service Provider (ISP).
-
You have a server that runs windows server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do?()
A.From windows firewall, add an exception.
B.From windows firewall enable the block all incoming connections option.
C.From the windows firewall with advanced security snap-in, create an inbound rule.
D.From the windows firewall with advanced security snap-in, create an outbound rule.
-
We take the liberty of writing to you () establishing business relations.
A.hope
B.in hope
C.in the hope of
D.hoping