Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()
第1题:
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()
A.Campus
B.Teleworker
C.Branch
D.Data center
第2题:
A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()
第3题:
Your Web site uses custom Themes. Your Web site must support additional Themes based on the user‘s company name. The company name is set when a user logs on to the Web site. The company‘s Theme name is stored in a variable named ThemeName. You need to use this variable to dynamically set the Web site‘s Theme.What should you do?()
A.
B.
C.
D.
第4题:
You work as a network technician at Company. Your boss, Mrs. , is interested in GLBP. In particular, she wants to know the multicast address that this protocol uses. What should you tell her? ()
第5题:
A user in your company has a laptop, which he uses both, on and off the network. You want to change the users profile to roaming but when you attempt to change the setting, the Roaming profile option is grayed out. How can you change the laptop users profile to roaming?()
第6题:
A. It uses a Reliable transport mechanism.
B. It uses a Non-reliable transport mechanism
C. It is less bandwidth-intensive than connection oriented services
D. it uses handshaking
第7题:
Company uses layer 3 switches in the Core of their network. Which method of Layer 3 switching uses a forwarding information base (FIB)?()
第8题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()
A.A
B.B
C.C
D.D
第9题:
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
第10题:
A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()