网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()
A

 PAT

B

 ACLs

C

 Subnet masking

D

 Port blocking


参考答案

参考解析
解析: 暂无解析
更多 “单选题An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A  PATB  ACLsC  Subnet maskingD  Port blocking” 相关考题
考题 A user reports that they are getting an error when trying to save a video file to a share on a server running Windows Server 2003. The administrator looks at the file and finds that it is 5GB. The administrator checks the server and finds that the server has 100GB of free space. This file needs to be saved on the server.Which of the following should the administrator do to accomplish this?()A. Convert the filesystem to EXT3.B. Convert the filesystem to VMFS.C. Convert the filesystem to NTFS.D. Convert the filesystem to FAT32.

考题 An administrator needs to diagnose problems with a WINS server. Which of the following toolsshould be used?() A.nslookupB. nbtstatC. digD. netstat

考题 You are the administrator of two Microsoft Windows 2000 advanced server computers. On these servers, you are configuring a database that will store accounting information for your company.The data must be available at all times. Interruptions in data connectivity should not last longer than five minutes. Any changes to the database should not require you to reconfigure the client computers.How should you configure the database?A.Configure the database on the two servers as a SQL Server 2000 cluster.B.Configure the database on one server, and then configure a standby database on the second server.C.Configure the database on each server. Use Microsoft Distributed Transaction Coordinator to keep the two servers perfectly synchronized.D.Configure the database as a federated database, and then partition half the data on each server.

考题 A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()A.B.C.D.

考题 You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. One of the servers,Server01 has the Web Server (IIS) role installed and all theWeb Server role services on it. Which of the following features would you configure on the server toprovide a user the ability to administer a website?()A、Configure .Net Users feature on Server01B、Configure.Net Roles feature on Server01C、Configure IIS Manager Permissions feature on Server01D、Configure Authentication feature on Server01

考题 An administrator needs to diagnose problems with a WINS server. Which of the following toolsshould be used?()A、nslookupB、nbtstatC、digD、netstat

考题 A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()A、Configure port Fa0/1 to accept connections only from the static IP address of the server.B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C、Configure the MAC address of the server as a static entry associated with port Fa0/1.D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 Which of the following could be used to restrict access to the local web server to only certain IP addresses?()A、 Create an ACL.B、 Create an application exception.C、 Configure IPSec.D、 Block port 80.

考题 Which of the following would an administrator use to configure a server’s BIOS settings even if the OS crashes?()A、 VPNB、 KVM over IPC、 TelnetD、 Remote Desktop

考题 An administrator needs to grant privileges to other server staff members to run archive utilities on adefault Windows installation. The administrator needs to set the minimum permissions to:()A、 remote users.B、 account operators.C、 server operators.D、 backup operators.

考题 A user reports that they are getting an error when trying to save a video file to a share on a server running Windows Server 2003. The administrator looks at the file and finds that it is 5GB. The administrator checks the server and finds that the server has 100GB of free space. This file needs to be saved on the server. Which of the following should the administrator do to accomplish this?()A、Convert the filesystem to EXT3.B、Convert the filesystem to VMFS.C、Convert the filesystem to NTFS.D、Convert the filesystem to FAT32.

考题 An administrator notices that every time a particular server is restarted it requires a password in order for the server to begin the start up process. Which of the following is the reason this is happening?()A、The server needs to have the password service verified and reconfigured.B、The server administrator has set a password policy in Group Policy.C、The server has the BIOS setting configured incorrectly.D、The server is set with a boot password before accessing the OS

考题 An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking

考题 A system administrator needs to specify a set of FQDN to IP address mappings for a legacyserver; the administrator does not want the legacy server to be referenced by other servers. Which of the following should the administrator use to set this?()A、DHCP serverB、DNS serverC、Host fileD、Route statements

考题 A staging server is critical for an administrator to test updates without introducing risk into a production environment.  Which of the following steps should an administrator take to test on a staging server?()A、Create and Configure a WebSphere Commerce Instance on the staging serverB、Run the Stage Copy Utility to copy production server data into the staging server.C、Run the Stage Propagate Utility to propagate the staging server with production server data D、Create and configure a Staging database

考题 A system administrator needs to configure dump devices for the system. Which command would be used to estimate the size required for a dump device?()A、lsdevB、chdevC、sysdumpdevD、sysdumpstart

考题 A new LPAR has been created that needs SAN attached disk for a database. After AIX has been installed, the fibre cables are attached to the adapters. How should the administrator configure the disks?()A、Run 'mkdev' to force the FC adapter to log into the SAN, have the SAN LUNs zoned to the server, run 'cfgmgr' to discover and configure the disks.B、Run 'mkpath' to force the FC adapter to log into the SAN, have the SAN LUNs zoned to the server, run 'cfgmgr' to discover and configure the disks.C、Run 'chpath' to force the FC adapter to log into the SAN, have the SAN LUNs zoned to the server, run 'cfgmgr' to discover and configure the disks.D、Run 'cfgmgr' to force the FC adapter to log into the SAN, have the SAN LUNs zoned to the server, run 'cfgmgr' to discover and configure the disks.

考题 Your company has an Active Directory domain. You plan to install the Active Directory Certificate Services (AD CS) server role on a member  server that runs Windows Server 2008 R2.     You need to ensure that members of the Account Operators group are able to issue smartcard  credentials. They should not be able to revoke certificates.     Which three actions should you perform()A、Install the AD CS server role and configure it as an Enterprise Root CA .B、Install the AD CS server role and configure it as a Standalone CA .C、Restrict enrollment agents for the Smartcard logon certificate to the Account Operator group.D、Restrict certificate managers for the Smartcard logon certificate to the Account Operator group.E、Create a Smartcard logon certificate.F、Create an Enrollment Agent certificate.

考题 You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

考题 You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A、Configure Internet Authentication Service (IAS) for accounting.B、Configure the server running Routing and Remote Access to support L2TP.C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

考题 You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()A、Configure the terminal server so that users log on by using local user accountsB、Configure the terminal server so that users log on by using domain accountsC、Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal serverD、Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal serverE、Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal serverF、Use Appsec.exe to restrict applications on the terminal server

考题 You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()A、Configure the terminal server to use smart cardsB、Configure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal serverC、Deny the Remote Desktop Users group access to the terminal serverD、Restrict treyresearch.com users from logging on locally to the terminal server

考题 An administrator needs to install a 2U server into a rack. Which of the following shows how much space, in height, needs to be available for the server to fit in the rack?()A、1.75 inches(4.45 cm)B、2.5 inches(6.35 cm)C、3.5 inches(8.89 cm)D、4.25 inches(10.8 cm)

考题 单选题You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()A  Configure Internet Authentication Service (IAS) for accounting.B  Configure the server running Routing and Remote Access to support L2TP.C  Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D  Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

考题 单选题An administrator notices that every time a particular server is restarted it requires a password in order for the server to begin the start up process. Which of the following is the reason this is happening?()A The server needs to have the password service verified and reconfigured.B The server administrator has set a password policy in Group Policy.C The server has the BIOS setting configured incorrectly.D The server is set with a boot password before accessing the OS

考题 单选题An administrator needs to grant privileges to other server staff members to run archive utilities on adefault Windows installation. The administrator needs to set the minimum permissions to:()A  remote users.B  account operators.C  server operators.D  backup operators.

考题 单选题You are an enterprise administrator for Cer-tech .com. All the servers on the network run Windows Server2008. The network consists of a server called Server01 on which Windows SharePoint Services (WSS) roleis installed. A group of users need to access the WSS server. However, you want to restrict the users toview items, open items, and view versions on the WSS server. To accomplish this task, you created agroup called SPUsers that will access content on the WSS server. Which of the following permissionswould you configure for the SPUsers group to restrict the permissions of the group to viewing items,opening items,and viewing versions?()A Limited AccessB DesignC ReadD Contribute