网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following specifies a set of consistent requirements for a workstation or server?()
A

Vulnerability assessment

B

Imaging software

C

Patch management

D

Configuration baseline


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following specifies a set of consistent requirements for a workstation or server?()A Vulnerability assessmentB Imaging softwareC Patch managementD Configuration baseline” 相关考题
考题 A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat() A. Incident responseB. Asset managementC. Patch managementD. Policies and procedures

考题 Which of the following monitors a server to see which protocols might be in use?() A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer

考题 ()describes the configurable items of the project and identifies itcms that will be recorded and updated so that the product of the project tins consistent and operable A.The configuration management plan B.The change management plan C.The requirements traceability matrix D.The change baseline

考题 Which of the following three service requirements are included in the Cisco UnifiedCommunications optimize phase()A、Business Case AlignmentB、Security AssessmentC、Incident managementD、Operations Readiness AssessmentE、Technology Assessment

考题 Which of the following best defines the Cisco Lifecycle Services approach()A、the minimum set of services that are needed to successfully deploy and manage technology solutionB、system design to help ensure selection of the most appropriate productsC、business requirements and investments as they pertain to asset lifecycle managementD、technology strategies and related product lifecycles that are required to ensure minimal risks and maximum return of investment

考题 You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountB、Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksC、Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateD、On the IIS server, run the gpresult command from a command prompt and analyze the output

考题 Which of the following should an administrator do after running a command from the console onthe perimeter router?()A、Update the configuration logsB、Update the network wiring schematicsC、Update the network configuration proceduresD、Compare the configuration with the baseline

考题 Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer

考题 Which of the following specifies a set of consistent requirements for a workstation or server?()A、Vulnerability assessmentB、Imaging softwareC、Patch managementD、Configuration baseline

考题 The company has two thousand servers located around the globe. Which of the following is the BEST method of patch management and deployment?()A、Set all servers to automatically download patches from the manufacturer’s website.B、Install an internal patch management system and deploy from the system.C、Install the patches on each server from a deployment disk.D、RDP into each server, manually download and install the patches.

考题 A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()A、Incident responseB、Asset managementC、Patch managementD、Policies and procedures

考题 The server administrator has just brought a new Windows server online. Permissions are set, but the server administrator cannot connect remotely. Which of the following is MOST likely the problem?()A、WMI was not enabled.B、Server service was not enabled.C、RDP was not enabled.D、Workstation service was not enabled.

考题 Companycom is moving their application to a p5 590 and at the same time moving to a new version of the application. The customer knows only about the resource requirements of the old version. Which of the following is the best method to migrate their application to POWER5?()A、Add CPU and memory COD so they have room to grow if requiredB、Make the server configuration twice as large as the current requirementC、Configure the server for the current capacity requirementsD、Make the server configuration a little larger than the current capacity requirements

考题 Which configuration command is used to make the ERX Edge Router an NTP server?()A、 set ntp-serverB、 set ntp serverC、 ntp-server enableD、 ntp server enable

考题 You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A、Microsoft Baseline Security Analyzer (MBSA)B、Microsoft Security Assessment Tool (MSAT)C、Resultant Set of Policy (RSoP)D、Security Configuration Wizard (SCW)

考题 单选题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()A Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountB Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksC Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateD On the IIS server, run the gpresult command from a command prompt and analyze the output

考题 单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A Microsoft Baseline Security Analyzer (MBSA)B Microsoft Security Assessment Tool (MSAT)C Resultant Set of Policy (RSoP)D Security Configuration Wizard (SCW)

考题 单选题Which of the following tools are used to apply a Security Template in Windows Server 2012 R2?()A Integration ServicesB Security Configuration and AnalysisC Resultant Set of PolicyD TS ManagerE Resource meteringF Active Directory Domains and Trusts

考题 单选题Which of the following tools can an administrator use to get a server baseline?()A System Resource MonitorB Microsoft Baseline Security Analyzer (MBSA)C Replication MonitorD Performance Monitor

考题 单选题Which of the following should an administrator do after running a command from the console onthe perimeter router?()A Update the configuration logsB Update the network wiring schematicsC Update the network configuration proceduresD Compare the configuration with the baseline

考题 单选题Companycom is moving their application to a p5 590 and at the same time moving to a new version of the application. The customer knows only about the resource requirements of the old version. Which of the following is the best method to migrate their application to POWER5?()A Add CPU and memory COD so they have room to grow if requiredB Make the server configuration twice as large as the current requirementC Configure the server for the current capacity requirementsD Make the server configuration a little larger than the current capacity requirements

考题 单选题Which of the following specifies a set of consistent requirements for a workstation or server?()A Vulnerability assessmentB Imaging softwareC Patch managementD Configuration baseline

考题 单选题The primary purpose of an SLA between the service provider and customer is to agree on which of the following?()A Monthly bandwidth limits, server configuration, and software baseline.B Number of dedicated technicians assigned to network issues.C Level of service including energy consumption, bandwidth and server color.D Level of service including time limits for service, repair and replacement.

考题 单选题Which of the following MUST be done when imaging a Windows Server that will be used as a template?()A Remove softwareB Run Windows UpdatesC Update driversD Sysprep

考题 单选题Which of the following will MOST likely cause major performance issues on an email server?()A  RAID 0 configurationB  PBX softwareC  DHCP serverD  Anti-virus software

考题 单选题Which configuration command is used to make the ERX Edge Router an NTP server?()A  set ntp-serverB  set ntp serverC  ntp-server enableD  ntp server enable

考题 单选题A customer is looking for a low cost System x Server solution that has a fairly robust set of software application workload requirements.  Which tool will assist you in making sure the hardware will match the workload?()A IBM Configuration  Options Guide (COG)B IBM Sizing GuidesC IBM xREF SheetsD IBM ServerProvenE IBM Standalone Solutions Configuration Tool (SSCT)

考题 单选题Which of the following environment variables specifies a non-default location for the listener configuration file?()A LSN_ADMINB TNS_ADMINC ADMIN_TNSD TSN_ADMIN