题目内容

信息时代保护公民在互联网上的个人信息的原则是()。

A. 基本权利不受侵犯
B. 力求平衡
C. 信息自由流通
D. 保密原则

查看答案
更多问题

You are creating a dial-up connection on your Windows 2000 portable computer to connect to your customer’s dial-up server. You are not sure which type of server your customer is using for dial-up connections. You want to ensure that your dial-up connection authentication is secure and that your logon information is not sent in plain text. You view the Advanced Security Settings dialog box as shown in the exhibit. Which option or options should you disable in the Advanced Security Settings dialog box?()

A. Unencrypted password (PAP)
B. Shiva Password Authentication Protocol (SPAP)
Challenge Handshake Authentication Protocol (CHAP)
D. Microsoft CHAP (MS-CHAP)
E. Microsoft CHAP Version 2 (MS-CHAP v2)
For Microsoft CHAP based protocols.

Refer to the exhibit. Which statement is true when voice traffic is forwarded on the same VLAN used by the data traffic? ()

A. The voice traffic cannot be forwarded to the distribution layer.
B. The voice traffic cannot use 802.1p priority tagging.
C. Port security cannot be enabled on the switch that is attached to the IP phone.
D. Quality of service cannot be applied for the voice traffic.

You create a shared Internet connection on a Windows 2000 Professional computer. Your network has 10 users on the LAN. All of the users can connect to HTTP sites, FTP sites, and streaming audio content on the Internet. One of the computers on your LAN is running an FTP host application. Users on the Internet cannot connect to the FTP host on your network. What should you do?()

A. Configure the FTP host to accept incoming requests on service port 80.
B. Configure an Internet Connection Sharing application type for FTP to use remote server port23.
Configure an Internet Connection Sharing service type for FTP use service port 21 on theFTP host computer.
D. Configure an Internet Connection Sharing service type for FTP use service port 23 on theFTP host computer.

Refer to the exhibit. A trunk link is connected between switch A_SW and switch D_SW. Based on the configuration shown in the exhibit, how would the traffic coming from the switch A_SW be managed? ()

A. The trunk port Fa0/1 on switch A_SW will trust allCoS values on the frames coming from the IP phone.
B. The trunk port Fa0/1 on switch A_SW will trust allCoS values on the frames received on the IP phone.
C. The trunk port Fa0/1 on switch D_SW will trust allCoS values on the frames coming from port Fa0/1 on A_S
D. The trunk port Fa0/1 on switch D_SW will trust allCoS values on the frames received on the A_SW switch port Fa0/4.
E. The trunk port Fa0/1 on switch D_SW will trust allCoS values on the frames received on the IP phone port.

答案查题题库