21
25
80
110
123
第1题:
You need to configure port security on switch R1. Which two statements are true about this technology? ()
第2题:
Which of the following default ports must be opened to allow a technician to telnet into a machine?()
第3题:
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).
第4题:
A user in the accounting department reports that their office is able to connect to the network, but they are unable to connect to the Internet. Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue?() (Select TWO).
第5题:
Which of the following ports are used by default for web servers? ()(Select TWO)
第6题:
Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()
第7题:
You have an Exchange Server 2010 organization. Your network is separated from the Internet by a firewall. You need to identify the ports that must be opened on the firewall to allow clients from the Internet to usethe following connections methods:.Outlook Anywhere .Outlook Web App (OWA).Exchange ActiveSync .IMAP4 over Secure Sockets Layer (SSL) Which TCP ports should you identify?()
第8题:
Disable all 802.11 traffic
Disable the SSID from broadcasting
Disable WPA
Enable Bluetooth only communication
Change the default admin password
Disable WEP
第9题:
25, 443 and 993
26, 443 and 995
25, 80, 143, and 3269
80, 143, 443, and 389
第10题:
Power supply tester
Cable tester
Loopback plugs
Multimeter
Butt set
第11题:
80
110
123
143
443
第12题:
The user must configure the settings.
Roaming profile must be stored on every client.
The user must be on a domain.
Roaming profile has to be stored on a network server.
The user must have an IP address on their client.
第13题:
Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()
第14题:
For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).
第15题:
By default, which of the following ports would a network need to have opened to allow for thetransmission of incoming and outgoing email?() (Select TWO).
第16题:
While accessing the Internet in an external environment (i.e. while traveling), a Windows 7 firewall hould be set to which of the following?()
第17题:
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()
第18题:
A machine must have the most direct access possible to two different networks. However, it cannot act as a router between the networks. Which of the following arrangements is most appropriate to facilitate the machine’s accessibility?()
第19题:
22
23
143
161
162
8080
第20题:
Physical network diagram
Job log
Acceptable use policy
Baseline documentation
Wiring schematic
第21题:
21
23
24
25
第22题:
Point to Point
Point to Multipoint
VLAN
Ring
Bus
第23题:
Port security can be configured for ports supporting VoIP.
With port security configured, four MAC addresses are allowed by default.
The network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.
Withsecurity configured, only one MAC addresses is allowed by default.
Port security cannot be configured for ports supporting VoIP.
第24题:
21
25
80
110
123