网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()
A

Disabling connections from named pipes or socket files (depending on the operating system of the server)

B

Enabling and using SSL for connections to the Mysql database

C

Installing Mysql on the application server, and running the database and application on the same server

D

Starting the server with – bind- address=0.0.0.0 specified

E

Running the server with – skip-networking specified

F

Limiting logins to originate from the application server or the server's subnet'


参考答案

参考解析
解析: 暂无解析
更多 “多选题A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()ADisabling connections from named pipes or socket files (depending on the operating system of the server)BEnabling and using SSL for connections to the Mysql databaseCInstalling Mysql on the application server, and running the database and application on the same serverDStarting the server with – bind- address=0.0.0.0 specifiedERunning the server with – skip-networking specifiedFLimiting logins to originate from the application server or the server's subnet'” 相关考题
考题 You are a systems administrator responsible for configuring a Windows Server 2008 SMTP server. Yourorganization is currently using the default SMTP virtual server for sending order notifications from a single Web application called ContosoOrderManagement. Recently, you have noticed that a largenumber of messages have been sent to the SMTP virtual server from other computers and users. Which two methods can you use to prevent unauthorized access to the SMTP server?()A、Enable Basic Authentication.B、Configure a smart host for use by the SMTP virtual server.C、Add Connection Control entries to limit which IP addresses can use the SMTP server.D、Modify settings on the Security tab of the properties of the SMTP virtual server.

考题 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You have a Remote Desktop Session Host (RD Session Host) server an d a Remote Desktop Web Access (RD Web Access) server. You enable several RemoteApp applications on the RD Session Host server. You need to configure access to RemoteApp applications so that RD Web Access users see only applications to which they have been granted access. What should you do?()A、Use the RemoteApp Wizard to add to the RemoteApp Programs list setting.B、Assign domain users and domain security groups to each RemoteApp application.C、Use the RemoteApp Wizard to configure the RemoteApp program is a vailable through RD Web Access setting.D、Specify custom menu locations on the RD Session Host server for each domain security group by using a Group Policy object (GPO).

考题 Multiple users are trying to telnet to the AIX server. They are able to ping the server successfully, but are getting the following error message:  telnet: connect: A remote host refused an attempted connect operation   Which of the following could be the cause of this problem?()A、The routing table on the AIX server is incorrect.B、The IP address on the network adapter is incorrect.C、The portmap daemon is not running on the AIX server.D、The inetd daemon is not running on the AIX server.

考题 While reviewing the backup logs a server administrator notices that a backup job for an application server on the same subnet has failed. Which of the following is MOST likely the problem?()A、The remote agent was not running.B、The management card has failed.C、The proxy server was blocking access.D、The hardware firewall was blocking access.

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable

考题 The staff is not able to access a database server.  The server has an ’Operating System not found’error and is set to boot from a fiber channel SAN. All other database servers are set to boot from the SAN and access the same switch and data as this database server. Which of the following is the MOST likely cause of the problem?()A、The SAN is offlineB、Fiber channel switchC、Multiple failed drives in the SAND、HBA

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable

考题 Two new servers are purchased and need to be installed to allow sharing of a single external hard drive enclosure.  One server is configured as a local file server, and the other as a database server for a different network.  The onsite technician notices that when both servers are running at the same time, they each receive SCSI errors. When they are running individually, no errors are reported.   Which of the following is the BEST source of information to use for troubleshooting this problem?()A、 the server vendor’s FAQ websiteB、 the SCSI controller vendor’s user manualC、 the drive enclosure vendor’s user manualD、 the network operating system vendor’s website

考题 Company.com has a database application and a Web server application running on the same p5-570 server in a single partition. Recently there have been a number of instances where the increased load on the database server has impacted the performance of the Web server. What can the technical specialist recommend to keep the database application from impacting the performance of the Web server?()A、Create a VLAN between the web server and database server.B、Purchase APV and install the VIOS.C、Increase the priority of the Web server.D、Create separate LPARs for Web and database workloads.

考题 You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()A、All system users have access to the MySQL server via—login path localB、login-path can be used only for MySQL servers running on a local machineC、login-path allows you to provide login credentials without passing clear text passwords on the command lineD、When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later

考题 You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy.  What should you do?()A、Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.B、Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.C、Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.D、Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.E、Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.

考题 Your network consists of a single Active Directory domain. The remote access permission for all users is set to Control access through Remote Access Policy. You have a VPN server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). The current configuration allows all authenticated users to establish VPN connections to Server1. You create a global group named Group1.You need to prevent all members of Group1 from establishing VPN connections to Server1. What should you do?()A、From the local computer policy on Server1, modify the Account Policies settings. B、From Active Directory Users and Computers, modify the Security settings of Group1. C、From the Routing and Remote Access snap-in, create a new remote access policy. D、From the Routing and Remote Access snap-in, open the properties of Server1 and modify the security options.

考题 You are the network administrator for . The network consists of a single Active Directory forest containing two domains, and The functional level of both domains is Windows 2000 mixed contains two domain controllers running Windows 2003 and three domain controllers running Windows 2000 server. A member server named TestKing9 hosts applications and files that all company users need to access. You need to enable all users in to access the applications and files on TestKing9. Which three actions should you perform? ()(Each correct answer is a part of a complete solution. Select three.)A、Create a domain local group named DeutschUsers in ch.testking.com.B、Create a domain local group named DeutschUsers in de.testking.com.C、Add the Users group from ch.testking.com to DeutschUsers.D、Add the Users group from de.testking.com to DeutschUsers.E、On TestKing9, grant the appropriate permissions to the Users group from ch.testking.com.F、On TestKing9, grant the appropriate permissions to DeutschUsers.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The server hasTerminal Service Web Access (TS Web Access) installed. Several line-of-business applications areavailable on the server by using TS Web Access. You have a new application installed on the server. Youhave to make the application available through TS Web Access. In order to achieve this,What action should you perform?()A、In order to make the application available through TS Web Access, the data source for TS Web Accessshould be specified from the TS Web Access Web site.B、In order to make the application available through TS Web Access, the application should be added to the RemoteApp Programs list from TS RemoteApp Manager.C、In order to make the application available through TS Web Access, the users should be added to the TS Web Access Computers group from the Local Users and Groups snap-in.D、In order to make the application available through TS Web Access, the mstsc.exe command should be run and specify the /v parameter should be specified from the command prompt.

考题 You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()A、Configure a Client Access server array.B、Deploy a second ISA server and create an ISA server array.C、Implement Windows Network Load Balancing for the Client Access servers.D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you.  So what action should you perform to achieve this goal?()  A、All the SQL Server logins of the application developers have to be added to a fixed server role. B、All the database users of the application developers have to be added to a fixed database role C、All SQL Server logins of the application developers should be given the appropriate server-level permissions. D、All database users of the application developers should be given the appropriate database-level permissions. 

考题 You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()A、 Configure Internet Authentication Service (IAS) for accounting.B、 Configure the server running Routing and Remote Access to support L2TP.C、 Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、 Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

考题 单选题Company.com has a database application and a Web server application running on the same p5-570 server in a single partition. Recently there have been a number of instances where the increased load on the database server has impacted the performance of the Web server. What can the technical specialist recommend to keep the database application from impacting the performance of the Web server?()A Create a VLAN between the web server and database server.B Purchase APV and install the VIOS.C Increase the priority of the Web server.D Create separate LPARs for Web and database workloads.

考题 单选题You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()A  Configure Internet Authentication Service (IAS) for accounting.B  Configure the server running Routing and Remote Access to support L2TP.C  Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D  Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

考题 单选题Two new servers are purchased and need to be installed to allow sharing of a single external hard drive enclosure.  One server is configured as a local file server, and the other as a database server for a different network.  The onsite technician notices that when both servers are running at the same time, they each receive SCSI errors. When they are running individually, no errors are reported.   Which of the following is the BEST source of information to use for troubleshooting this problem?()A  the server vendor’s FAQ websiteB  the SCSI controller vendor’s user manualC  the drive enclosure vendor’s user manualD  the network operating system vendor’s website

考题 多选题A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()ADisabling connections from named pipes or socket files (depending on the operating system of the server)BEnabling and using SSL for connections to the Mysql databaseCInstalling Mysql on the application server, and running the database and application on the same serverDStarting the server with – bind- address=0.0.0.0 specifiedERunning the server with – skip-networking specifiedFLimiting logins to originate from the application server or the server's subnet'

考题 单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A Default gatewayB The ports on the switchC Port security on the server's switch portD Ethernet cable

考题 多选题You are a systems administrator responsible for configuring a Windows Server 2008 SMTP server. Yourorganization is currently using the default SMTP virtual server for sending order notifications from a single Web application called ContosoOrderManagement. Recently, you have noticed that a largenumber of messages have been sent to the SMTP virtual server from other computers and users. Which two methods can you use to prevent unauthorized access to the SMTP server?()AEnable Basic Authentication.BConfigure a smart host for use by the SMTP virtual server.CAdd Connection Control entries to limit which IP addresses can use the SMTP server.DModify settings on the Security tab of the properties of the SMTP virtual server.

考题 多选题You need to ensure that the stored procedure that inserts new loan requests can access data in tables that are stored in another database on the same SQL Server instance. Which two actions should you perform?()AEnsure that the stored procedure and the tables are owned by users that are associated with the same SQL Server login.BEnsure that the stored procedure and the tables are owned by the same database user.CEnsure that the stored procedure and the tables use the same database schema.DConfigure the multiuser database option on both databases.EConfigure the cross-database ownership chaining option on both databases.

考题 单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A  Default gatewayB  The ports on the switchC  Port security on the servers switch portD  Ethernet cable

考题 多选题You are the network administrator for . The network consists of a single Active Directory forest containing two domains, and The functional level of both domains is Windows 2000 mixed contains two domain controllers running Windows 2003 and three domain controllers running Windows 2000 server. A member server named TestKing9 hosts applications and files that all company users need to access. You need to enable all users in to access the applications and files on TestKing9. Which three actions should you perform? ()(Each correct answer is a part of a complete solution. Select three.)ACreate a domain local group named DeutschUsers in ch.testking.com.BCreate a domain local group named DeutschUsers in de.testking.com.CAdd the Users group from ch.testking.com to DeutschUsers.DAdd the Users group from de.testking.com to DeutschUsers.EOn TestKing9, grant the appropriate permissions to the Users group from ch.testking.com.FOn TestKing9, grant the appropriate permissions to DeutschUsers.

考题 单选题While reviewing the backup logs a server administrator notices that a backup job for an application server on the same subnet has failed. Which of the following is MOST likely the problem?()A The remote agent was not running.B The management card has failed.C The proxy server was blocking access.D The hardware firewall was blocking access.