WS 2013 elődöntő Kreatív + angol teszt



Similar documents
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Lab Developing ACLs to Implement Firewall Rule Sets

3.1 Connecting to a Router and Basic Configuration

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Device Interface IP Address Subnet Mask Default Gateway

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Lab Diagramming Intranet Traffic Flows

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

Welcome to Todd Lammle s CCNA Bootcamp

PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram

Lab Diagramming External Traffic Flows

- The PIX OS Command-Line Interface -

Skills Assessment Student Training Exam

SKV PROPOSAL TO CLT FOR ACTIVE DIRECTORY AND DNS IMPLEMENTATION

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

MICROSOFT WINDOWS SERVER8 ADMINISTRATION

Basic Network Configuration

Lab Configuring the PIX Firewall as a DHCP Server

Troubleshooting the Firewall Services Module

Lab - Using IOS CLI with Switch MAC Address Tables

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

HP Device Manager 4.6

Specialized Programme on Internetworking Design and LAN WAN Administration

Lab Configure Basic AP Security through IOS CLI

6421B: How to Install and Configure DirectAccess

Active Directory Infrastructure Design Document

Lab 2 - Basic Router Configuration

1 PC to WX64 direction connection with crossover cable or hub/switch

Lab Characterizing Network Applications

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Lab Advanced Telnet Operations

- Advanced IOS Functions -

Applicazioni Telematiche

Topic 7 DHCP and NAT. Networking BAsics.

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

Lab Introductory Lab 1 Getting Started and Building Start.txt

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Deploying Windows Streaming Media Servers NLB Cluster and metasan

How Do I Upgrade Firmware and Save Configurations on PowerConnect Switches?


Lab Configure Cisco IOS Firewall CBAC

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG

Global Knowledge MEA Remote Labs. Remote Lab Access Procedure

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab

Chapter 15: Advanced Networks

Lab 8.4.3a Managing Cisco IOS Images with TFTP

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Lab Use Network Inspector to Observe STP Behavior

Debugging Network Communications. 1 Check the Network Cabling

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement

Cisco Secure PIX Firewall Frequently Asked Questions

Lab Introductory Lab 1 - Getting Started and Building Start.txt

Freshservice Discovery Probe User Guide

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

Brocade to Cisco Comparisons

Lab Load Balancing Across Multiple Paths

F-SECURE MESSAGING SECURITY GATEWAY

WhatsUpGold. v3.0. WhatsConnected User Guide

Troubleshooting the Firewall Services Module

SSVP SIP School VoIP Professional Certification

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

CCT vs. CCENT Skill Set Comparison

Lab Organizing CCENT Objectives by OSI Layer

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Basic Configuration of the Cisco Series Internet Router

Connecting to the Firewall Services Module and Managing the Configuration

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console

Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network

Using DC Agent for Transparent User Identification

iboss Enterprise Deployment Guide iboss Web Filters

Lab Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips

Virtual Managment Appliance Setup Guide

PasserellesNumeriquesCambodia (PNC)

Broadband Phone Gateway BPG510 Technical Users Guide

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition

Lab Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Section 11.1, Simple Network Management Protocol. Section 11.2, Port Data Capture

Lab Configure IOS Firewall IDS

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

- Basic Router Security -

Lab Creating a Logical Network Diagram

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )

Classroom Management network FAQ and troubleshooting

Covene Cohesion Server Installation Guide A Modular Platform for Pexip Infinity Management November 11, 2014 Version 2.0 Revision 1.

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Lesson Plans Managing a Windows 2003 Network Infrastructure

Load Balancing Microsoft Remote Desktop Services. Deployment Guide

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Virtual Web Appliance Setup Guide

Product Description. Licenses Notice. Introduction TC-200

DC Agent Troubleshooting

Management Software. User s Guide AT-S84. For the AT-9000/24 Layer 2 Gigabit Ethernet Switch. Version Rev. B

Transcription:

WS 2013 elődöntő Kreatív + angol teszt 30 feladat 45 perc (15:35-16:20) le_01 Which of the following services could be used to provide remote configuration of the networking address, routing, and DNS settings for other devices on a network? le_02 netsetup netconfig routed dhcpd What commands are used to reload a Debian system? le_03 shutdown r reboot reload reset halt -r Which is a secure way to manage your Linux-system remotely? le_04 Console SSH Telnet Secure RDP In which file do you configure the DNS servers your Linux-system should use? named.conf resolv.conf dns.cfg

le_05 When a RAID 5 array is configured with a hot-spare disk under Linux, which of the following is the minimum number of drives required? le_06 5 4 3 2 What does the command mount -a do in a Debian system? lk_07 It mounts the floppy disk for all users. It shows all mounted file systems. It opens /etc/fstab to edit. It mounts all file systems listed in /etc/fstab. With the use of Linux and SAMBA you can lk_08 Create Windows-type file-shares Emulate a Windows domain-controller SAMBA does not provide any Windows-type services SAMBA 3 can emulate A Windows PDC A Windows BDC A Windows BDC if the PDC is SAMBA 3 based SAMBA does not provide any Domain-controller emulation

lk_09 Can SAMBA make use of LDAP server(s)? lk_10 yes no only master LDAP servers only slave LDAP servers Can SAMBA provide anonymous file sharing, without authentication? lk_11 yes no The SAMBA parameter security = user configures what? wk_12 To access the server a Linux account is needed To access a share a Linux account is needed Access to the resources is anonymous Melyik képesség nem része a Windows Server 2012 alaposan megújult AD Administrative Center komponensének? Recycle Bin Fine Grained Password Policy PowerShell History Online Viewer Dynamic Access Control Active Directory Based Activation

wk_13 Milyen célt szolgál az új Hyper-V és az Active Directory együttműködésével megvalósított biztonságos AD virtualizáció? wk_14 Párhuzamos AD példányok futtatása, eltérő LDAP portokon. A virtuális gépek pillanatkép illetve export/import problémáinak megoldása. Gyors címtár mentés összetett tartományi rendszer esetén is. Virtuális tartományvezérlők egyszer replikációja. Lehetséges-e a DirectAccess bevezetése tűzfal/proxy szerver mögötti hálózatban, egyetlen hálózati interfésszel? wk_15 Igen. Igen, de csak Windows 8 kliensek esetén. Igen, de csak Windows Server 2008 R2 szerver esetén. Nem. Mely összetevőkre terjed ki a FairShare hatása egy Windows Server 2012 RDS Session Host kiszolgáló esetén? wk_16 CPU CPU+lemez CPU+lemez+hálózat CPU+lemez+hálózat+GPU Egy Windows Server 2012-es VDI (Virtual Desktop Infrastructure) környezet esetén, mely két kollekciótípust alkalmazhatjuk a felhasználók számára kiajánlott virtuális gépek esetén? Common gépek User Group gépek Pool gépek Personal gépek

we_17 You are a systems administrator for an property management company. You need to install an internally developed automation tool on a computer running Windows Server 2008 R2. The tool acts as a network client and needs to connect to a server on your intranet using TCP port 88 and to a server on the Internet using TCP port 290. Additionally, a client component you install on your workstation running Windows 7 will connect to the computer running Windows Server 2008 R2 using TCP port 39. Windows Firewall is currently configured with the default settings on both computers. Which of the following changes do you need to make to allow the application to work? we_18 On the computer running Windows Server 2008 R2, add a firewall rule to allow outbound connections on TCP port 290. On your workstation, add a firewall rule to allow outbound connections on TCP port 39. On the computer running Windows Server 2008 R2, add a firewall rule to allow inbound connections on TCP port 39. On the computer running Windows Server 2008 R2, add a firewall rule to allow inbound connections on TCP port 290. You have just finished upgrading all domain controllers in the worldskills.hu domain to Windows Server 2008 R2. You want to configure fine-grained password policies for several groups of users in worldskills.hu. What must you do first? we_19 Install a read-only domain controller. Raise the forest functional level. Run Dfsrmig.exe. Install the Group Policy Management Console (GPMC) feature. You want to raise the domain functional level of a domain in the worldskills.hu forest. Which tool can you use? (Choose all that apply.) Active Directory Sites And Services Active Directory Domains And Trusts Active Directory Users And Computers Active Directory Schema

we_20 You work as a network administrator for a research lab in a large company. The research lab includes six computers for which central computing services has allocated the address space 172.16.1.0/29. You now plan to add 10 new computers to the research network. Company policy states that each network is granted address space only according to its needs. What should you do? we_21 You do not need to expand the network because a /29 network is large enough to support your needs. Ask to expand the network to a /28 address block. Ask to expand the network to a /27 address block. Ask to expand the network to a /26 address block. After the address of a certain client computer is updated, you notice that a local DNS server is resolving the name of the computer incorrectly from cached information. How can you best resolve this problem? we_22 At the client computer, type ipconfig /flushdns. At the DNS server, type the command dnscmd /clearcache. Restart all DNS client computers. Restart the DNS Client service on the client computer. Which of the following are required to create a domain controller successfully? (Choose all that apply.) A DHCP server to assign an IP address to the domain controller A WINS server A valid DNS domain name A valid NetBIOS name

ce_23 While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows request times out. At which OSI layer is this problem associated with? ce_24 The data link layer. The application layer. The access layer. The network layer. The session layer. Based on the diagram, which destination addresses will host A use to send data to host B? The IP address of S1. The IP address of R1 Fa0/0. The IP address of host B. The MAC address of S1. The MAC address of R1 Fa0/0. The MAC address of host B.

ce_25 Why do switches never learn broadcast addresses? ce_26 Broadcast frames are never sent to switches. A broadcast frame is never forwarded by a switch. Broadcasts only use network layer addressing. A broadcast address is always in the destination address field of a frame. Broadcast addresses use an incorrect format for the switching table. Based on the information shown below, what can be determined from the output shown? ce_27 The S3 switch is using VTP. This is the only switch in the LAN topology. The S3 switch is not the root switch. The link to the root bridge is through a 1 Gbps connection. Spanning Tree Protocol is disabled on the S3 switch. During startup, a router displays the following error message: boot: cannot open "flash:" What will the router do next? It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog. It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM. It will attempt to locate the configuration file from a TFTP server. If this fails, it will load a limited configuration from ROM. Because of damaged flash memory, the router will fail the POST. It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialog.

ce_28 Regarding the extended ping command; which of the statements below are true? ce_29 The extended ping command is supported from user EXEC mode. The extended ping command is available from privileged EXEC mode. With the extended ping command you can specify the TCP and UDP port to be pinged. With the extended ping command you can specify the timeout value. With the extended ping command you can specify the datagram size. The network administrator wants to configure and apply an access list to allow Telnet access to the router, but only from the network administrator's computer. Which commands would be the best choice to allow only the IP address 172.16.3.3 to have Telnet access to the router? ce_30 access-list 101 permit tcp any host 172.16.3.3 eq telnet access-list 3 permit host 172.16.3.3 access-list 101 permit ip any any interface s0/0 line vty 0 4 line con0 ip access-group 3 in ip access-group 101 in access-class 3 in The command "frame-relay map ip 10.121.16.8 102 broadcast" was entered on a FR router. Which of the following statements is true concerning this command? The command is required for all frame relay configurations. The broadcast option allows packets, such as RIP updates to be forwarded across the PVC. This command should be executed from the global configure mode. 102 is the remote DLCI that will receive the information. The IP Address 10.121.16.8 is the local router port used to forward data.