In this scenario the client computer does not have the correct information in its local DNS cache.
There are two ways to solve this problem. You could use ipconfig /flushdns to reset the DNS cache, or you could stop and restart the DNS client service.
2、A, B, D
In order to establish a connection-orientated service, the connection must first be established. An example of this would the TCP/IP suites use of the three-way handshake. The sending and receiving of synchronization and acknowledgment packets between the sending system and the receiving system accomplish a three-way handshake. Errors can be corrected when the sender does not receive an acknowledgment, within a specified amount of time, from the receiving system the packet will be resent.
To use multilink modems, multilink must be enabled at the client and at the server. In the scenario, multilink is enabled at the client only. You therefore need to enable it at the server as well.
HTTP traffic uses TCP port 80 and FTP traffic uses TCP port 21 for session control and port 20 for data transfer. Therefore, by enabling TCP port 80 and TCP port 21 only HTTP and FTP traffic will be allowed. All other network traffic will not be allowed.
5、B, C, E
B: Users can logically be grouped into VLAN.
C: By grouping users into different VLANs, a secure VLAN can be created. Only some users could be allowed to access the secure VLAN. This improves security.
E: Each separate VLAN is a separate broadcast domain. Creating VLAN increase the number of broadcast domains and decrease the size of each broadcast domain.
Explanation: The WINS network service is used to resolve NetBIOS names to TCP/IP addresses.
As the network is routed, it consists of more than one subnet. On a routed network a default gateway address has to be configured so that the clients on one subnet will be able to communicate with the clients on another subnet across the router. The requirement to use NetBIOS names in a routed environment forces us to use a WINS server, as NetBIOS broadcasts cannot pass across the router.
The purpose of the Spanning Tree Protocol (STP) is to provide for redundant paths within a switched environment while ensuring that there is a loop free network. This is done as the redundant ports are blocked.
In cut-through mode, the switch checks the destination address (DA) as soon as the header is received and immediately begins forwarding the frame. Depending on the network transport protocol being used (connection or connectionless orientate), there is a significant decrease in latency from input port to output port. The delay in cut-through switching remains constant regardless of the size of the frame, because this switching mode starts to forward the frame as soon as the switch reads the DA.
Switches break up the collision domains, but it is still a single broadcast domain. Routers also create separate collision domains, but also separate broadcast domains, as routers usually do not pass broadcast traffic.
While L2TP is used to set up the connection, L2TP in itself does nothing for security. IPSec is the protocol used to secure the information.
B. You’re using a process called server clustering.
C. CA servers use public key encryption. While no security is “unhackable,” public key is quite secure if implemented properly. PGP (Pretty Good Privacy) is a publicly available security encryption mechanism, as are various symmetric key solutions. Public key encryption uses an asymmetric key pair: a public key and a private key.
When adding DNS servers to the domain, you must add an NS (Name Server) record to the zone.
Used to map a DNS domain name as specified in owner to the name of hosts operating DNS servers specified in
the name_server_domain_name field.
Syntax: owner ttl IN NS name_server_domain_name.
example.microsoft.com. IN NS nameserver1.example.microsoft.com.
（CSDN链接地址：系统功能 -> 用户行为准则 -> 第五点“版主的在社区的权利、义务”）
（CSDN链接地址：系统功能 -> 使用帮助 -> 第三点“删除帖子”）