网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker?() (Select TWO).

  • A、Disable TPM in the system BIOS
  • B、Run the BitLocker wizard and any necessary partitions
  • C、Enable TPM in the system BIOS
  • D、Enable TPM in the Windows 7 OS files
  • E、Set up the OS and the system files on the same partition

参考答案

更多 “A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker?() (Select TWO).A、Disable TPM in the system BIOSB、Run the BitLocker wizard and any necessary partitionsC、Enable TPM in the system BIOSD、Enable TPM in the Windows 7 OS filesE、Set up the OS and the system files on the same partition” 相关考题
考题 A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? () A. ESD matB. ESD wrist strapC. Sealable plastic bagD. Anti-static bag

考题 A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?() A. Keyboard filtersB. Privacy filtersC. ScreensaversD. Secure display drivers

考题 A network technician wants to use a packet analyzer to troubleshoot a reported problem with auser‘s workstation with IP address 192.168.1.45. To identify the workstation‘s packets thetechnician wants to use the workstation‘s MAC address.Which of the following protocols would provide the needed information?()A.DHCPB.ARPC.DNSD.PING

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?() A. DHCP serverB. Proxy serverC. RepeaterD. DHCP relay

考题 A technician wants to compare a new server performance over a period of time. Which of the following should the technician do FIRST?() A. Monitor processor performance logsB. Constantly check the task managerC. Use performance server logsD. Establish a baseline for the server

考题 You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.

考题 A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA、Power UsersB、UsersC、GuestsD、Administrato

考题 A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()A、Keyboard filtersB、Privacy filtersC、ScreensaversD、Secure display drivers

考题 As a network technician, do you know what is a recommended practice for secure configurationmanagement?()A、Disable post scanB、Use SSH or SSLC、Enable trust levelsD、Deny echo replies on all edge routers

考题 A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()A、ESD matB、ESD wrist strapC、Sealable plastic bagD、Anti-static bag

考题 A technician wants to compare a new server performance over a period of time. Which of the following should the technician do FIRST?()A、Monitor processor performance logsB、Constantly check the task managerC、Use performance server logsD、Establish a baseline for the server

考题 A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING

考题 For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()A、VPN concentratorB、Virtual serversC、WirelessD、Multimode fiber

考题 A technician is setting up a network and wants to automatically assign IP addresses. Which of the following will need to be configured to automatically assign IP addresses?()A、WINSB、DNSC、DHCPD、NTP

考题 A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?()A、DHCP serverB、Proxy serverC、RepeaterD、DHCP relay

考题 A technician wants to create a spanned volume on a set of hard drives. Which of the following tools will identify if the drives will support a spanned volume?()A、System InformationB、Disk ManagementC、Device ManagerD、Task Manager

考题 A company wants all IM chat via the internet to stop. A technician blocks IRC traffic with a traffic shaping device, yet IM chat remains useable. Which of the following should a technician do next?()A、Block both IRC and ICMPB、Utilize SNMP to identify IM usersC、Contact the IM carrier to request the IM account be disabledD、Change the shaping setting to allow minimal traffic to reduce port hopping

考题 A technician wants to increase the reliability of a DHCP server. Which of the following components should be installed to increase the server’s uptime on the network?()A、 Increase the amount of RAMB、 Use a lower voltage power supplyC、 Add a hardware firewallD、 Install redundant NICs

考题 A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A、 Guest user accountB、 Limited user accountC、 Power user accountD、 Administrator user account

考题 A technician wants to verify a remote printer that has been power cycled is back online. Thetechnician would use which of the following commands and switch?()A、tracert -tB、ipconfig /renewC、ping –tD、nslookup -ttl

考题 A user is receiving an error about not having enough virtual memory. A technician wants to manually set the amount of available virtual memory for the computer. At a MINIMUM, the technician should set the virtual memory to be which of the following?()A、0.5 times the amount of physical memoryB、1.5 times the amount of physical memoryC、2 times the amount of physical memoryD、Equal to the amount of physical memory

考题 单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A  Guest user accountB  Limited user accountC  Power user accountD  Administrator user account

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 多选题A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker?() (Select TWO).ADisable TPM in the system BIOSBRun the BitLocker wizard and any necessary partitionsCEnable TPM in the system BIOSDEnable TPM in the Windows 7 OS filesESet up the OS and the system files on the same partition

考题 单选题A user is receiving an error about not having enough virtual memory. A technician wants to manually set the amount of available virtual memory for the computer. At a MINIMUM, the technician should set the virtual memory to be which of the following?()A 0.5 times the amount of physical memoryB 1.5 times the amount of physical memoryC 2 times the amount of physical memoryD Equal to the amount of physical memory

考题 单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B You must then zeroize the keys to reset secure shell before configuring other parameters.C All vty ports are automatically enabled for SSH to provide secure management.D The SSH protocol is automatically enabled.