Free 4A0-112 Exam Braindumps (page: 3)

Page 2 of 12

You work as the network administrator at ABC.com. The ABC.com network consists of a domain named ABC.com. The servers at the ABC.com network run Windows Server 2003.

The ABC.com network has a Web server named ABC-SR11. During a routine monitoring you notice an increase in network traffic. Due to this you need to find out the MAC address of the workstation that initiated the transfers and the command that was used. However, you action must not effect ABC-SR11.

What actions must you take?

  1. You must run the ipconfig/registerdns.
  2. You must use the Netmon utility.
  3. You must capture the IP traffic to ABC-SR11.
  4. You must Enable Server Message Block (SMB) signing on all the workstations.

Answer(s): C



Your company’s corporate security policy is very strict. No username or password information may be passed over the Internet without using the strongest encryption available. Your company does not yet have a certificate infrastructure in place. Which of these methods would be the best choice for VPN authentication to ensure that you are within your company’s corporate security policy requirements?

  1. MS-CHAP v2
  2. PAP
  3. CHAP
  4. SPAP

Answer(s): A



You work as the network administrator at ABC.com. The ABC.com network has a domain named ABC.com. The servers at the ABC.com network run Windows Server 2003 and the workstations, Windows XP Professional.

The ABC.com network has a Web server named ABC-SR10 that has the Internet Information Services (IIS) 6.0 installed. ABC-SR10 hosts a Web site that can be reached from the internal network and the Internet. The internal traffic at ABC.com needs authentication without a secure protocol to access the Web site; however Internet traffic needs to authenticate with a secure protocol.

What actions must you take to ensure that the all accesses to ABC-SR10 use a secure protocol?

  1. You need to configure the log to capture Notification events.
  2. You need to apply the hisecdc.inf predefined security template.
  3. You need to monitor network traffic and IIS logs.
  4. You need to apply a custom security template.

Answer(s): C



Your corporate network uses variable length subnetting to make more efficient use of IP addresses. One of the IP addresses for a host is 131.39.161.17 with a subnet mask of 255.255.248.0. What is the proper notation for the network to which this host is connected?

  1. 131.39.160.0/21
  2. 131.36.161.0/20
  3. 131.39.161.17/21
  4. 131.36.160.0/20

Answer(s): A






Post your Comments and Discuss Nokia 4A0-112 exam with other Community members:

4A0-112 Discussions & Posts