网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).

  • A、Disable all 802.11 traffic
  • B、Disable the SSID from broadcasting
  • C、Disable WPA
  • D、Enable Bluetooth only communication
  • E、Change the default admin password
  • F、Disable WEP

参考答案

更多 “For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).A、Disable all 802.11 trafficB、Disable the SSID from broadcastingC、Disable WPAD、Enable Bluetooth only communicationE、Change the default admin passwordF、Disable WEP” 相关考题
考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

考题 A network vulnerability scanner is part of which critical element of network and system security?() A. host securityB. perimeter securityC. security monitoringD. policy management

考题 Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the networkA.complex B.unique C.catchy D.long

考题 What are three characteristics that buyers of Cisco Small Business routers typically look for?()A、 basic security optionsB、 simple network configurationC、 advanced network configurationD、 integrated solutionsE、 advanced security optionsF、 point products

考题 What are the benefit of using Netflow?()A、Network, Application User MonitoringB、Network PlanningC、Security AnalysisD、Accounting/Billing

考题 How does the Cisco Security Agent proactively stop both known and unknown attacks?()A、 It reverse engineers and documents the attackB、 It looks subjectively at network traffic for abnormal flows of behaviorC、 It creates a signature and updates the network security policiesD、 It actively monitors all vulnerable areas of the network

考题 A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management

考题 You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

考题 Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

考题 An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/syslog.conf

考题 A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg

考题 Active Directory Rights Management Services (AD RMS) is deployed on your network. Users who have Windows Mobile 6 devices report that they cannot access documents that are protected by  AD RMS.   You need to ensure that all users can access AD RMS protected content by using Windows  Mobile 6 devices.  What should you do()A、Modify the security of the ServerCertification.asmx file.B、Modify the security of the MobileDeviceCertification.asmx file.C、Enable anonymous authentication for the _wmcs virtual directory.D、Enable anonymous authentication for the certification virtual directory.

考题 You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()A、The user permissions on the zone should be granted.B、The user permissions on the DNS zone should be granted.C、The user should be added to the DNSUpdateProxy Global security group.D、The user should be added to the DNSAdmins domain local security group.

考题 You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()A、Microsoft Baseline Security Analyzer (MBSA)B、Security Configuration and Analysis consoleC、gpresult.exeD、Resultant Set of Policy console in planning mode

考题 Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

考题 单选题You need to recommend changes to the existing environment that meet the company’s security requirements for the file server on the main campus. What should you recommend?()A Deploy Network Policy Server (NPS) and create a network policy.B Deploy Print and Document Services and create a custom printer filter.C Deploy File Server Resource Manager (FSRM) and create a file classification rule.D Deploy Active Directory Rights Management Services (AD RMS) and create an AD RMS rights policy  template.

考题 单选题A network vulnerability scanner is part of which critical element of network and system security?()A  host securityB  perimeter securityC  security monitoringD  policy management

考题 单选题How does the Cisco Security Agent proactively stop both known and unknown attacks?()A  It reverse engineers and documents the attackB  It looks subjectively at network traffic for abnormal flows of behaviorC  It creates a signature and updates the network security policiesD  It actively monitors all vulnerable areas of the network

考题 单选题You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()A Microsoft Baseline Security Analyzer (MBSA)B Security Configuration and Analysis consoleC gpresult.exeD Resultant Set of Policy console in planning mode

考题 单选题You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()A  Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B  Configure the network adapter on the test network to disable IEEE 802.1x authentication.C  Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D  Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E  Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.

考题 单选题Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()A Set the security type to the No authentication (Open) option.B Configure the wired and wireless network adapters as a network bridge.C Modify the wireless network profile type to the Use all-user profiles only (recommended) option.D On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB detailed security device specificationsC results from pilot network testingD results from a network audit

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The TS Gateway roleservice is installed on this server. You have to provide a security group access to the TS Gateway server. So what action should you perform?()A A Terminal Services Resource Authorization Policy should be created and configured.B A Terminal Services Connection Authorization Policy should be created and configured.C The security group should be added to the Remote Desktop Users group.D The security group should be added to the TS Web Access Computers group.

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A a list of applications currently in use in the networkB IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsC detailed security device specificationsD results from pilot network testing

考题 单选题You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()A The user permissions on the zone should be granted.B The user permissions on the DNS zone should be granted.C The user should be added to the DNSUpdateProxy Global security group.D The user should be added to the DNSAdmins domain local security group.

考题 多选题For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).ADisable all 802.11 trafficBDisable the SSID from broadcastingCDisable WPADEnable Bluetooth only communicationEChange the default admin passwordFDisable WEP