网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).
- A、Disable all 802.11 traffic
- B、Disable the SSID from broadcasting
- C、Disable WPA
- D、Enable Bluetooth only communication
- E、Change the default admin password
- F、Disable WEP
参考答案
更多 “For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).A、Disable all 802.11 trafficB、Disable the SSID from broadcastingC、Disable WPAD、Enable Bluetooth only communicationE、Change the default admin passwordF、Disable WEP” 相关考题
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
考题
A network vulnerability scanner is part of which critical element of network and system security?()
A. host securityB. perimeter securityC. security monitoringD. policy management
考题
Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the networkA.complex
B.unique
C.catchy
D.long
考题
What are three characteristics that buyers of Cisco Small Business routers typically look for?()A、 basic security optionsB、 simple network configurationC、 advanced network configurationD、 integrated solutionsE、 advanced security optionsF、 point products
考题
What are the benefit of using Netflow?()A、Network, Application User MonitoringB、Network PlanningC、Security AnalysisD、Accounting/Billing
考题
How does the Cisco Security Agent proactively stop both known and unknown attacks?()A、 It reverse engineers and documents the attackB、 It looks subjectively at network traffic for abnormal flows of behaviorC、 It creates a signature and updates the network security policiesD、 It actively monitors all vulnerable areas of the network
考题
A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management
考题
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing
考题
Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
考题
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/syslog.conf
考题
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg
考题
Active Directory Rights Management Services (AD RMS) is deployed on your network. Users who have Windows Mobile 6 devices report that they cannot access documents that are protected by AD RMS. You need to ensure that all users can access AD RMS protected content by using Windows Mobile 6 devices. What should you do()A、Modify the security of the ServerCertification.asmx file.B、Modify the security of the MobileDeviceCertification.asmx file.C、Enable anonymous authentication for the _wmcs virtual directory.D、Enable anonymous authentication for the certification virtual directory.
考题
You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()A、The user permissions on the zone should be granted.B、The user permissions on the DNS zone should be granted.C、The user should be added to the DNSUpdateProxy Global security group.D、The user should be added to the DNSAdmins domain local security group.
考题
You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()A、Microsoft Baseline Security Analyzer (MBSA)B、Security Configuration and Analysis consoleC、gpresult.exeD、Resultant Set of Policy console in planning mode
考题
Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.
考题
单选题You need to recommend changes to the existing environment that meet the company’s security requirements for the file server on the main campus. What should you recommend?()A
Deploy Network Policy Server (NPS) and create a network policy.B
Deploy Print and Document Services and create a custom printer filter.C
Deploy File Server Resource Manager (FSRM) and create a file classification rule.D
Deploy Active Directory Rights Management Services (AD RMS) and create an AD RMS rights policy template.
考题
单选题A network vulnerability scanner is part of which critical element of network and system security?()A
host securityB
perimeter securityC
security monitoringD
policy management
考题
单选题How does the Cisco Security Agent proactively stop both known and unknown attacks?()A
It reverse engineers and documents the attackB
It looks subjectively at network traffic for abnormal flows of behaviorC
It creates a signature and updates the network security policiesD
It actively monitors all vulnerable areas of the network
考题
单选题You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()A
Microsoft Baseline Security Analyzer (MBSA)B
Security Configuration and Analysis consoleC
gpresult.exeD
Resultant Set of Policy console in planning mode
考题
单选题You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain. Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network. How should you configure Server1?()A
Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B
Configure the network adapter on the test network to disable IEEE 802.1x authentication.C
Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D
Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E
Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
考题
单选题Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network. What should you do? ()A
Set the security type to the No authentication (Open) option.B
Configure the wired and wireless network adapters as a network bridge.C
Modify the wireless network profile type to the Use all-user profiles only (recommended) option.D
On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.
考题
单选题You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB
detailed security device specificationsC
results from pilot network testingD
results from a network audit
考题
单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The TS Gateway roleservice is installed on this server. You have to provide a security group access to the TS Gateway server. So what action should you perform?()A
A Terminal Services Resource Authorization Policy should be created and configured.B
A Terminal Services Connection Authorization Policy should be created and configured.C
The security group should be added to the Remote Desktop Users group.D
The security group should be added to the TS Web Access Computers group.
考题
单选题You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A
a list of applications currently in use in the networkB
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsC
detailed security device specificationsD
results from pilot network testing
考题
单选题You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()A
The user permissions on the zone should be granted.B
The user permissions on the DNS zone should be granted.C
The user should be added to the DNSUpdateProxy Global security group.D
The user should be added to the DNSAdmins domain local security group.
考题
多选题For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).ADisable all 802.11 trafficBDisable the SSID from broadcastingCDisable WPADEnable Bluetooth only communicationEChange the default admin passwordFDisable WEP
热门标签
最新试卷