-
Some of the TestKing routers have been configured with default routes. What are some of the advantages of using default routes?()
A . They establish routes that will never go down.
B . The keep routing tables small.
C . They require a great deal of CPU power.
D . The allow connectivity to remote networks that are not in the routing table.
E . They direct traffic from the Internet into corporate networks.
-
You are auditing some events on your Windows 2000 Professional computer. You make changes in the system time of this computer. Under what event will this log be generated in the event viewer? ()
A . Privilege Use
B . Object Use
C . Security Settings Use
D . System Use
-
What are some of the characteristics of the OSPF routing protocol?()
A . It confines network instability to a single area of network.
B . It increases the routing overhead of the network
C . It supports VLSM
D . It routes between Autonomous Systems.
E . It allows extensive control of routing updates
F . None of the above
-
What are some virtues of implementing end-to-end VLANs?()
A . End-to-end VLANs are easy to manage.
B . Users are grouped into VLANs independent of a physical location.
C . Each VLAN has a common set of security and resource requirements for all members.
D . Resources are restricted to a single location.
-
On()side of the street there are some trees.
A . both
B . either
C . every
D . all
-
You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()
A . Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.
B . Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.
C . Use Windows Explorer to turn on auditing for the specific files.
D . Have the administrator for domains log you on as an administrator and enable auditing for a specific file.
E . Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.
F . Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.&e
-
What are some of the characteristics of a typical VLAN arrangement?()
A . VLANs logically divide a switch into multiple, independent switches at Layer 2.
B . Trunk links can carry traffic for multiple VLANs.
C . VLAN implementation significantly increases traffic due to added trunking information.
D . A VLAN can span multiple switches.
E . VLANs typically increase the number of switches needed
F . VLANs typically decrease the number of switches needed
-
What are some of the advantages of using a router to segment the network? (Choose two.)()
A . Filtering can occur based on Layer 3 information.
B . Broadcasts are eliminated.
C . Routers generally cost less than switches.
D . Broadcasts are not forwarded across the router.
E . Adding a router to the network decreases latency.
-
Inter-VLAN routing has been implemented in the Company network. In VLAN routing, what are some of the disadvantages of designing a router-on-stick configuration? ()
A . InterVLAN routing cannot be filtered by the router.
B . The router becomes a single point of failure for the network.
C . Routers will not route STP BPDUs.
D . There is a possibility of inadequate bandwidth for each VLAN.
E . Additional overhead on the router can occur.
F . NetFlow Switching is required for InterVLAN accounting.
-
What are some of the advantages of using a router to segment the network (Choose two.)()。
A . Filtering can occur based on Layer 3 information.
B . Broadcasts are eliminated.
C . Routers generally cost less than switches.
D . Broadcasts are not forwarded across the router.
E . Adding a router to the network decreases latency.
-
What are some characteristics of the typical VLAN arrangement?()
A . VLANs logically divide a switch into multiple, independent switches at Layer 2.
B . Trunk links can carry traffic for multiple VLANs.
C . VLAN implementation significantly increases traffic due to added trunking information.
D . A VLAN can span multiple switches.
E . VLANs extend the collision domain to include multiple switches.
F . VLANs typically decrease the number of multiple switches.
-
In CiscoWorks LAN Management Solution, what are some of the examples of a managed device (sometimes called network elements)? (Choose three.) ()
A . routers
B . LAN switches
C . PBX switches
D . TDM switches
E . appliance
-
SORT_AREA SIZE and HASH_AREA_SIZE parameters are ignored in some of the user sessions. What could be the reason?()
A . The User Global Area (UGA) is not configured.
B . The sessions were started using the login name SYS.
C . The sessions are running in the Automatic Shared Memory Management mode.
D . The sessions are running in the automatic Program Global Area (PGA) memory management mode.
-
What are some of the advantages of using a router to segment the network?()
A . Filtering can occur based on Layer 3 information.
B . Broadcasts are eliminated.
C . Routers generally cost less than switches.
D . Broadcasts are not forwarded across the router.
E . Adding a router to the network decreases latency.
-
What are some general guidelines regarding the placement of access control lists?()
A . You should place standard ACLS as close as possible to the source of traffic to be denied.
B . You should place extended ACLS as close as possible to the source of traffic to be denied.
C . You should place standard ACLS as close as possible to the destination of traffic to be denied.
D . You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.
-
1. What are some of Shakespeare's representative works?
-
Why are some of the works of Steinbeck considered controversial?
-
What are some of the well-known places of interest in Britain?
A、Hyde Park
B、Buckingham Palace
C、The Statue of Liberty
D、No. 10 Down Street
-
What are some sensitive questions one should be careful of asking Westerners?
-
Woman: I intend to buy some fruit for the children. These apples and pears seem to be in season. Ill get two dozen of each. Man: I hope they are as good as they look. Question: What does the man mean?
A.The apples and pears might not be so good.
B.The apples are not as good as the pears.
C.The apples and pears are very good.
D.The apples and pears are as good as they look.
-
听力原文:Hast: Today, we're going to examine some of the complexities involved in managing today's Internet. And our industrial expert here for us today is Matthew Flanigan, President of the Telecommunications Industry Association. Matt, many thanks. Welcome to the program. What are some of the key issues that we're still grapping with when trying to maximize the Internet's sufficiency?
Matt Flanigan, President, TIA: Well, today I would say speed and bandwidth. Especially, a little smile up to the consumer' is probably a big issue holding back the Internet. But security is also important with electronic commerce. And until they really solve that, people are not gonna feel secure.
Host: All right. Well, Let's introduce our guest.
We're joined by an executive from Effnet: Tomas Althen. Welcome to the program. We're delighted to have you. Tomas, let's start with this. What sort of Internet issue is Effnet dealing with? What kind of solutions do you bring to the table?
Tomas Althen, CEO, Effnet Group: The Internet is growing at a very rapid speed at the moment. As you must know, the number of users doubles every year. However, also the information on the net doubles every month. And this calls up the two issues we have been hearing about here, speed and security.
Host: Well, let's look at more details. Look at this video about the city council of Stockholm, Sweden.
Narrator on the video: Here is the power. The politicians and high civil servants at Stockholm County Council are used to having access to qualified information. Now with everyone using Internet and Intranet, some information has to remain secret. The decision on how to do this are mad here at IT Control. They have found the way to let 10, 000 employees use the Internet but some information can still be accessed only by qualified people.
This is the firewall keeping the information system secure. A box in the basement with software from Effnet. Scandinavia is known for its technology. Cellular phones and Internet are part of daily life. And here in Sweden there are some young, very innovative up-starting companies. One is Effnet, founded in 1997 and already on the world market.
As the world demands speed and security and reliability, Effnet's gigabit router on a card makes security easier. The generic plug-in card, firewaller and router in one, proves that they are ready to meet the world demand.
Host: Well, how does the firewall work? We were told a few days ago that one of the new methods of transmission was to break everything up into little packets, send them all into the Internet and hope they arrive in the same order, and so on. Is the protection of these packets from being raided is this the principle task of the firewall?
Tomas Althen: You can say that in one sense. You also don't want packets to come in to your data system, or into your network, packets which you don't want to be there. You want to be able to decide for yourself as an organization or as a company: hey, I don't want these guys to be able to access my treasure. And to do that you need to do some filtering. You need to decide which packets are allowed, which packets are not allowed. You have to do that very fast so you don't end up with yet another bottleneck. And we solved that problem.
Host: Let's look ahead a couple of years and have you estimate for us how you see this technology evolving. What do you think will be different or new on the horizon in a couple of years? Tomas?
Tomas Althen: More and more has been put into smaller and smaller spaces. We are making quite a leap in putting all these features on one card. But the next step is clearly putting them on one chip. And we are talking to chip vendors to try to do that as quickly as reasonable.
They usually say that one year in this business is seven ordinary years. So, that would be 14 years from now. We'll see things more and more integrated. For Effnet, in two years I would s
A.The quality of being easy to use.
B.For most of us, broadband access is years in the future.
C.To maximize the Internet's sufficiency.
-
What are some family types revealed in the clip?
A、extended family
B、gay family
C、nuclear family
D、step-family
-
The same one word may have more than one meaning. The various meanings of the word are related to some degree. This is what we call (). For example, the word table means a piece of furniture, and it may also mean all the people seated at a table.
A.polysemy
B.hyponymy
C.antonymy
D.homonymy
-
-----Haven’t you heard the news? -----What news? ----- Some of the workers are _______ while others are ______.
A、on the march, on strike
B、on march, on strike
C、on the march, on the strike
D、on the strike, on march