You are configuring captive port

题目

You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()

  • A、When you want all unauthenticated traffic to be redirected
  • B、When you want all clear text traffic to be redirected.
  • C、When you want all authenticated traffic to be redirected.
  • D、When you want all encrypted traffic to be redirected.
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which parameters must you select when configuring operating system probes SCREEN options?()

A. syn-fin, syn-flood, and tcp-no-frag

B. syn-fin, port-scan, and tcp-no-flag

C. syn-fin, fin-no-ack, and tcp-no-frag

D. syn-fin, syn-ack-ack-proxy, and tcp-no-frag


参考答案:C

第2题:

You are configuring a Cisco multilayer switch for the Company network.  Which command would  you use to configure a port to act as a routed interface?()

  • A、 ip routing
  • B、 switchport mode trunk
  • C、 no switchport
  • D、 switchport trunk native vlan 1
  • E、 None of the other alternatives apply

正确答案:C

第3题:

You are the administrator of Ezonexam.com's network.

You want to connect your Windows 2000 Professional computer to a new TCP/IP based laser print device. The print device is Plug and Play compliant and is included on the current Hardware Compatibility List (HCL). When you attempt to create a new TCP/IP printer port you receive the following error message:

"Specified Port cannot be added. The port already exists."

You want to be able to use the new TCP/IP printer.

What should you do?

A.Modify the properties of the existing printer port to use the new print device.

B.Change the LPT port setting to bidirectional in the BIOS on your computer.

C.Change the LPT port setting to enable legacy Plug and Play detection on your computer.

D.Obtain and install the WDM-compliant device drivers and printing software for the printer.


正确答案:A
解析:Explanation: The error message states that the new port cannot be added since it already exists. Thus all that is necessary to enable you to make use of the printer is to modify the properties of the existing port.

Incorrect answers:
B: Changing the port setting to bidirectional is not going to enable printing with the new print device.
The problem stems from the new port that cannot be added.

C: Since the print device is plug and play compliant and is included on the HCL, changing the port setting is not going to allow you to use the new TCP/IP printer because the problem stems from a port that cannot be added.

D: For hardware support Windows 2000 Professional includes the Win32 Driver Model (WDM). This provides a common model for device drivers across Windows 98 and Windows 2000. Drivers that are written to the WDM will work in both Windows 98 and Windows 2000. Windows 2000 uses a driver-signing process to make sure drivers have been certified to work correctly with the Windows Driver Model (WDM) in Windows 2000. However, the error message states that it is a port that cannot be added since it already exists. It is thus not a driver problem.

第4题:

You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()

  • A、You should consider configuring recipient filtering.
  • B、You should consider configuring sender reputation.
  • C、You should consider configuring content filtering.
  • D、You should consider configuring sender filtering.

正确答案:A

第5题:

When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()

  • A、protect (drop packets with unknown source addresses)
  • B、restrict (increment SecurityViolation counter)
  • C、shut down (access or trunk port)
  • D、transition (the access port to a trunking port)

正确答案:C

第6题:

You configure your Windows 2000 Professional computer for Internet Connection Sharing and for TCP/IP filtering as shown in the exhibit.

You test your TCP/IP filtering configuration from another client computer. You can access web sites, but you cannot access FTP sites.

What should you do to be able to access FTP sites?

A.Add Port 21 to the TCP Ports section.

B.Add Port 138 to the TCP Ports section.

C.Add Port 21 to the IP Ports section.

D.Add Port 138 to the IP Ports section.


正确答案:A
解析:Explanation: The FTP protocol uses the TCP port 21. In the exhibit the UDP port 21 has been incorrectly added instead of the TCP port.

Incorrect answers:
B: The FTP protocol uses Port 21 not Port 138.

C: The port 21 should be added as a TCP port 21, not as a UDP port or as an IP protocol. IP is also a network protocol and not a port.

D: The FTP protocol uses TCP port 21 not port 138. IP is also a network protocol and not a port.

第7题:

You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the documentation that the best way to set up a trunk is to set the port as dynamic desirable. The trunk is not coming up. Which one of these options would be a valid explanation? ()

  • A、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode ON
  • B、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode to OFF
  • C、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode asauto.
  • D、The firewall does not support DTP. You should set the switchport trunk mode to ON

正确答案:D

第8题:

You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()

A. When you want all unauthenticated traffic to be redirected

B. When you want all clear text traffic to be redirected.

C. When you want all authenticated traffic to be redirected.

D. When you want all encrypted traffic to be redirected.


参考答案:B

第9题:

When configuring unified ports on a 5548 switch, which port ordering must be respected?()

  • A、 Fibre Channel ports must be configured from the first port in the module.
  • B、 Ethernet ports must be configured from the last port in the module.
  • C、 Fibre Channel ports must be configured from the last port in the module.
  • D、 Ethernet ports must be configured from the first port in the module.

正确答案:C,D

第10题:

You install a third-party application on your computer. The application uses port 80 to negotiate a listening port. After establishing the listening port, the application uses dynamic ports above 6000.  You need to configure Microsoft Windows Firewall to allow traffic for the application.  What should you do? ()

  • A、Add a port exception for port 80.
  • B、Disable the Core Networking exception.
  • C、Restore the Windows Firewall defaults.
  • D、Add a program exception for the new application.

正确答案:D

更多相关问题