网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
- A、NIPS
- B、Honeypot
- C、DMZ
- D、NIDS
参考答案
更多 “An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS” 相关考题
考题
You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?A. STPB. GVRPC. SNMPD. VTPE. DHCPF. None of the above
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
考题
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS
考题
Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A. net viewB. ipconfigC. digD. ifconfig
考题
Using network monitoring tools would allow an administrator to do which of the following?()
A. Configure offline devicesB. Examine performance issuesC. Install additional software and updatesD. View syslog events
考题
An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()A. WMIB. RISC. DNSD. SNMPE. SMTP
考题
Anadministratorwantstoproactivelycollectinformationonattackersandtheirattemptedmethodsofgainingaccesstotheinternalnetwork.Whichofthefollowingwouldallowtheadministratortodothis?()
A.NIPSB.HoneypotC.DMZD.NIDS
考题
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network.Which of the following would allow you accomplish this?()A.STPB.GVRPC.SNMPD.VTPE.DHCP
考题
An administrator is in charge of several remote servers in Japan. Users call and complain they cannot connect to the company’s resources located on those servers. Which of the following commands would allow the administrator to verify the servers are running?()A、pingB、netstatC、nbtstatD、telnet
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption
考题
Using network monitoring tools would allow an administrator to do which of the following?()A、Configure offline devicesB、Examine performance issuesC、Install additional software and updatesD、View syslog events
考题
Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()A、 VLANB、 KVMC、 IP KVMD、 RAID
考题
An administrator has encountered an error while patching a virtualized guest machine. Which of the following technologies would allow the administrator to restore to a pre-patched state the FASTEST?()A、CloningB、Bare Metal RestoreC、OS RestoreD、Snapshot
考题
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A、Disable SSIDB、WPAC、MAC filteringD、RAS
考题
An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()A、WMIB、RISC、DNSD、SNMPE、SMTP
考题
Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A、WPA-PSK encryptionB、SSID broadcastC、Port forwardingD、MAC filtering
考题
An administrator logs into a server and notices slow performance.While troubleshooting the problem the administrator notices that an unfamiliar process in the Task Manager is running at 100% CPU usage.The administrator tries to end the task and receives ‘Access is denied’. Which of the following steps would allow the administrator to terminate that process?()A、Adding the ‘Run as a service’ permission to their account.B、Running the kill utility.C、Adding their account to the remote users group.D、Ending the services.exe process then ending the runaway process.
考题
An administrator would like to know the name of the workstation that is being repaired. Which ofthe following commands, without parameters, will provide this information?()A、HostnameB、IpconfigC、NetstatD、Ping
考题
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic
考题
Which of the following would allow an administrator to incorporate a new Windows service pack into an installation when the media does not include the service pack?()A、TemplatesB、RISC、GhostD、Slipstreaming
考题
Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A、net viewB、ipconfigC、digD、ifconfig
考题
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()A、auditB、syslogC、TCBD、sysck
考题
单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A
STPB
GVRPC
SNMPD
VTPE
DHCP
考题
单选题Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()A
VLANB
KVMC
IP KVMD
RAID
考题
单选题An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A
NIPSB
HoneypotC
DMZD
NIDS
考题
单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A
net viewB
ipconfigC
digD
ifconfig
考题
多选题An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()AWMIBRISCDNSDSNMPESMTP
热门标签
最新试卷