网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?()
A

Multicast

B

Unicast

C

Broadcast

D

Peer-to-peer


参考答案

参考解析
解析: 暂无解析
更多 “单选题An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?()A MulticastB UnicastC BroadcastD Peer-to-peer” 相关考题
考题 () is setting up a research team to see how children react to video games. A.The Japan’s Health MinistryB.Japan’s health MinistryC.A Japan’s health MinistryD.Japan health Ministry

考题 Many new buildings are ( ) the Su zhou River. A、setting up byB、putting up onC、going up onD、building up by

考题 You are developing a Windows Communication Foundation (WCF) service.You need to enable security auditing for all events.What should you do?() A. Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.B. Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.C. Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.D. Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.

考题 An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()A.NATB.DynamicC.SubnettingD.Static

考题 Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances

考题 You are proceeding down a channel and lose the engine(s).You must use the anchors to stop the ship.Which statement is true ________.A.Pay out all of the cable before setting up on the brake to insure the anchors dig in and holdB.For a mud,mud and clay,or sandy bottom pay out a scope of 5 to 7 times the depth before setting up on the brakeC.Use one or both anchors with a scope of twice the depth before setting the brakeD.Drop the anchor to short stay and hold that scope

考题 One of the important decisions at the Yalta Conference was()Athe allied landing at NormandyBthe setting-up of a world organization,the United Nations,to manage peace and security after the warCcoordinated efforts in war against JapanDNone of the above

考题 One of the important decisions at the Yalta Conference was()A、the allied landing at NormandyB、the setting-up of a world organization,the United Nations,to manage peace and security after the warC、coordinated efforts in war against JapanD、None of the above

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 An administrator has set up a company’s intranet server.Users should be able to access it but nousers are able to.The administrator verifies that the website is accessible by IP address.Which of the following should the administrator look at FIRST to resolve the issue?()A、WINS serverB、DNS serverC、Lmhosts fileD、DHCP cache

考题 An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues.  All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic.  Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs

考题 After installing a second processor and corresponding heatsink into a server, an administrator notices that the new processor is not showing up during POST.  Which of the following could be the cause of this issue?()A、 The power supply is not sufficient to power the server.B、 The voltage regulator module (VRM) was not installed.C、 The IRQ setting was not set.D、 The DMA setting was not set.

考题 An administrator notices that every time a particular server is restarted it requires a password in order for the server to begin the start up process. Which of the following is the reason this is happening?()A、The server needs to have the password service verified and reconfigured.B、The server administrator has set a password policy in Group Policy.C、The server has the BIOS setting configured incorrectly.D、The server is set with a boot password before accessing the OS

考题 An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?()A、MulticastB、UnicastC、BroadcastD、Peer-to-peer

考题 You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()A、Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.B、Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.C、Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.D、Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.

考题 You are the administrator of the Corp arborshoes.com domain. Users in the domain run Windows 2000 Professional on their desktop computers.   A user named Katrin in the Sales organizational unit (OU) reports that her mouse is not working correctly. You log on to the domain from Katrin’s computer by using the domain Administrator account. You use Device Manager to display the current information for the mouse driver.   You discover that Katrin’s computer is using an older version of the mouse driver. You have current drivers furnished by the manufacturer of the mouse. You install the current driver by using Device manager and restart the computer.   You test the mouse and it is still not functioning correctly. You view Device Manger and notice that the display of the current driver indicates that the previous driver is still uninstalled.   You want to be able to install the correct mouse driver. What should you do? ()A、Set the Sales OU policy for security to warn and allow the installation to override the local security defaults. B、Set the domain policy for security to block but allow the installation to override the local and Sales OU security defaults. C、Set the Local Computer Policy for security on Katrin’s computer to warn but allow the installation to override the domain and the Sales OU security defaults. D、Disable plug and play on Katrin’s computer. Restart the computer and manually set up the system resources for the mouse. 

考题 Maria has been set up as an assistant to the administrator. Users of your network are complaining that Maria has been opening their files and editing them. She needs to perform backups and installations of programs, and setting up of printers.   How do you fix the problem with the minimum amount of effort, yet allowing her to accomplish the assigned tasks? ()A、Remove her Administrator privilege and give her Power Users and Backup Operators.B、Leave her as Administrator and make deny on Users’ files.C、Remove her administrator privileges and assign her Server Operators.D、Remove her administrator privileges and assign her Power Users and Replicator. E、Tell her that she isn’t allowed to tamper with other users files.

考题 You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()A、A virus that infects an IT administrator’s client computer could gain domain administrator privilegesB、Couriers could gain access to domain administrator privilegesC、Business office staff could discover couriers’ passwords and use them to access couriers’ informationD、All users could use their user accounts to gain the ability to install untested security patches on their client computers

考题 You are the network administrator for ExamSheet. Laura is a sales representative for the company. She travels on a regular basis and dials into the company network from her Windows 2000 Professional portable computer. ExamSheet recently implemented a new computing security policy that mandates all remote connections be established by a two-way authentication method. You configure a Windows 2000 Server computer to run Routing and Remote Access Server for Windows 2000 to meet the requirements of the new security policy. Laura reports she now cannot initiate a dial-up connection. Laura needs to dial in to the company network. What should you do?()A、Apply the Hisecws.inf Security Template to Laura’s computer.B、Apply the Compatws.inf Security Template to Laura’s computer.C、Instruct Laura to configure her dial-up connection to use multi-link.D、Instructs Laura to configure her dial-up connection to use MS-CHAP v2.E、Instruct Laura to configure her dial-up connections to use L2TP.

考题 单选题You are proceeding down a channel and lose the engine(s).You must use the anchors to stop the ship.Which statement is true().A Pay out all of the cable before setting up on the brake to insure the anchors dig in and holdB For a mud,mud and clay,or sandy bottom pay out a scope of 5 to 7 times the depth before setting up on the brakeC Use one or both anchors with a scope of twice the depth before setting the brakeD Drop the anchor to short stay and hold that scope

考题 单选题One of the important decisions at the Yalta Conference was()A the allied landing at NormandyB the setting-up of a world organization,the United Nations,to manage peace and security after the warC coordinated efforts in war against JapanD None of the above

考题 单选题An administrator recently installed a known good RAID adapter.  During boot up, the administrator is able to access the RAID configuration utility; however, when the administrator checks for the card in the operating system, it does not show up.  Which of the following should the administrator do FIRST?()A Move the RAID adapter to another slot.B Perform a baseline of the system.C Contact the reseller of the adapter for a replacement card.D Check the RAID adapter’s manufacturer for the latest drivers.

考题 单选题What do the officials from 23 countries and 6 international organizations do?A Clean up the corruption and ineffective rule that plagued Palestine.B Overhaul the Palestinian government, economy and security forces.C Protect Palestine’s national security.

考题 单选题After installing a second processor and corresponding heatsink into a server, an administrator notices that the new processor is not showing up during POST.  Which of the following could be the cause of this issue?()A  The power supply is not sufficient to power the server.B  The voltage regulator module (VRM) was not installed.C  The IRQ setting was not set.D  The DMA setting was not set.

考题 单选题An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?()A NATB DynamicC SubnettingD Static