Citrix workstation
personal workstation
shared workstation, private desktop
shared workstation, shared desktop
第1题:
Your customer has deployed a Cisco Wireless Location Appliance within its warehouseenvironment. However, employees there have been experiencing problems when tracking objects using activeRFID tags. You use an access point scan to determine if the Location Appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct theproblem?()
第2题:
Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment. However,employees there have been experiencing problems when tracking objects using active RFIDtags. The RFID beacon rate is 10 seconds and you have discovered an issue with the RFID timeout value. Where and how should the RFID value be changed?()
第3题:
A. PCs will attempt to use the last address assigned to them
B. PCs will pull from a static address pool
C. PCs will use APIPA
D. PCs will prompt the user for an address
第4题:
A new floor has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, a few desktop PCs have limited corporate access but not Internet access. Most other desktop PCs, all laptops, and IP phones are working correctly. Additional information indicates that the desktop PCs are obtaining IP host addresses from the DHCP server, which is intended for only the IP phones. Where should troubleshooting about this connectivity issue be focused?()
第5题:
You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()
第6题:
Your customer has deployed a Cisco Wireless Location Appliance within its warehouseenvironment. However, employees there have been experiencing problems when tracking objects using activeRFID tags.The RFID tag data is not being collected. On which device would you verify that RFIDs have been enabled?()
第7题:
When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?()
第8题:
What is the most important one among the realities listed?
[A] New vulnerabilities will be introduced into your environment every day.
[B] If employees disregard warnings about the hazards of opening questionable email attachments, the manager should educate them about properly configuring firewalls and intrusion detection systems for their PCs.
[C] Managers have more responsibility than ever.
[D] Security managers are asked to support increasing degrees of network availability and access.
第9题:
You are the network administrator for Company. Five of Company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity. You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building. You need to configure the portable computers to always allow the employees to choose which network environment to use when they start their portable computers. What should you do?()
第10题:
Your customer has deployed a cisco wireless location appliance within its warehouse environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. you use an access point scan to determine if the location appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct the problem?()