网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()

  • A、IDS
  • B、IPS
  • C、Firewall
  • D、Managed PKI

参考答案

更多 “ An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI” 相关考题
考题 Which of the following is NOT true?A) When a person tries to help others, he must be clear that there is a real emergency.B) When a person tries to help others, he should know whether they are worth his help.C) A person must take the full responsibility for the safety of those in emergencies if he wants to help.D) A person with a heart attack needs help.

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode

考题 An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?() A.IDSB.IPSC.FirewallD.Managed PKI

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?() A.netstatB.tracerouteC.nbtstatD.ping

考题 The Cisco network-based virtual firewall service solution helps service providers to deliver costeffective, scalable, integrated security services for enterprise customers using Cisco platforms .What is a virtual firewall?()A. another name for a firewall deployed in routed modeB. another name for a firewall deployed in transparent modeC. a separation of multiple firewall security contexts on a single firewallD. a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context

考题 下列哪些设备属于安全设备()。 A.IDSB.IPSC.FirewallD.Switch

考题 The Cisco network-based virtual firewall service solution helps service providers to deliver cost-effective, scalable, integrated security services for enterprise customers using Cisco platforms.What is a virtual firewall?()A、 another name for a firewall deployed in routed modeB、 another name for a firewall deployed in transparent modeC、 a separation of multiple firewall security contexts on a single firewallD、 a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption

考题 Keyword and blacklist filtering would be handled at which level in a network?()A、Layer 2 managed switchB、DHCP serverC、Hardware firewallD、Bridge

考题 Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A、Network layer firewallB、Stateful inspection firewallC、Zone aware firewallD、Application layer firewall

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.A new Xxx usage policy prohibits the employees from using certain words in internal e-mail messaging.What actions must you take to have the policy implemented?()A、You must set up an IP Block list.B、You must set up sender filtering.C、You must set up managed folders.D、You must build a transport rule

考题 You need to recommend which role services must be deployed to support the company’s planned changes.   Which two role services should you recommend?()A、Health Registration Authority (HRA)B、Host Credential Authorization Protocol (HCAP)C、Network Policy Server (NPS)D、Routing and Remote Access service (RRAS)

考题 A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years.  Which of the following locations should an administrator configure when complying with the new policy?()A、 Local workstationsB、 Backup tapesC、 Domain controllersD、 Email serverE、 SMTP gatewayF、 Proxy server

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

考题 下列哪些设备属于安全设备()。A、IDSB、IPSC、FirewallD、Switch

考题 When disposing of data, which of the following should be considered FIRST?()A、Company policy requirementsB、Local legal requirementsC、Storage requirementsD、Disposal requirements

考题 Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A、Network diagramB、Performance baselineC、Network security procedureD、Company policy

考题 An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()A、netstatB、tracerouteC、nbtstatD、ping

考题 A technician wants to increase the reliability of a DHCP server. Which of the following components should be installed to increase the server’s uptime on the network?()A、 Increase the amount of RAMB、 Use a lower voltage power supplyC、 Add a hardware firewallD、 Install redundant NICs

考题 An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS

考题 ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()A、Run the net view command.B、Run the gpresult command.C、Use the IP Security Monitor console.D、Use the IPSec Policy Management console.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Outlook Web App to have access to their e-mail.A new Company.com policy prohibits the employees from downloading ZIP files from Outlook Web App.The CIO wants the employees to use Microsoft Office Outlook to download ZIP files.What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy.B、The best option is to set up the Content Filter agent.C、The best option is to set up a managed folder mailbox policy.D、The best option is to set up the Attachment Filter agent.

考题 A System p administrator is looking at changing attributes of a logical volume.  Which of the following must be defined when it is created()A、placement of the logical volumeB、stripe size of the logical volumeC、inter-disk policy of the logical volumeD、intra-disk policy of the logical volume

考题 单选题An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A IDSB IPSC FirewallD Managed PKI

考题 多选题A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years.  Which of the following locations should an administrator configure when complying with the new policy?()ALocal workstationsBBackup tapesCDomain controllersDEmail serverESMTP gatewayFProxy server

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Outlook Web App to have access to their e-mail.A new Company.com policy prohibits the employees from downloading ZIP files from Outlook Web App.The CIO wants the employees to use Microsoft Office Outlook to download ZIP files.What should you do?()A The best option is to set up an Outlook Web App Mailbox policy.B The best option is to set up the Content Filter agent.C The best option is to set up a managed folder mailbox policy.D The best option is to set up the Attachment Filter agent.