网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following specifies a set of consistent requirements for a workstation or server?()
A
Vulnerability assessment
B
Imaging software
C
Patch management
D
Configuration baseline
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following specifies a set of consistent requirements for a workstation or server?()A Vulnerability assessmentB Imaging softwareC Patch managementD Configuration baseline” 相关考题
考题
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()
A. Incident responseB. Asset managementC. Patch managementD. Policies and procedures
考题
Which of the following monitors a server to see which protocols might be in use?()
A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer
考题
()describes the configurable items of the project and identifies itcms that will be recorded and updated so that the product of the project tins consistent and operable
A.The configuration management plan
B.The change management plan
C.The requirements traceability matrix
D.The change baseline
考题
Which of the following three service requirements are included in the Cisco UnifiedCommunications optimize phase()A、Business Case AlignmentB、Security AssessmentC、Incident managementD、Operations Readiness AssessmentE、Technology Assessment
考题
Which of the following best defines the Cisco Lifecycle Services approach()A、the minimum set of services that are needed to successfully deploy and manage technology solutionB、system design to help ensure selection of the most appropriate productsC、business requirements and investments as they pertain to asset lifecycle managementD、technology strategies and related product lifecycles that are required to ensure minimal risks and maximum return of investment
考题
You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountB、Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksC、Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateD、On the IIS server, run the gpresult command from a command prompt and analyze the output
考题
Which of the following should an administrator do after running a command from the console onthe perimeter router?()A、Update the configuration logsB、Update the network wiring schematicsC、Update the network configuration proceduresD、Compare the configuration with the baseline
考题
Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer
考题
Which of the following specifies a set of consistent requirements for a workstation or server?()A、Vulnerability assessmentB、Imaging softwareC、Patch managementD、Configuration baseline
考题
The company has two thousand servers located around the globe. Which of the following is the BEST method of patch management and deployment?()A、Set all servers to automatically download patches from the manufacturer’s website.B、Install an internal patch management system and deploy from the system.C、Install the patches on each server from a deployment disk.D、RDP into each server, manually download and install the patches.
考题
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()A、Incident responseB、Asset managementC、Patch managementD、Policies and procedures
考题
The server administrator has just brought a new Windows server online. Permissions are set, but the server administrator cannot connect remotely. Which of the following is MOST likely the problem?()A、WMI was not enabled.B、Server service was not enabled.C、RDP was not enabled.D、Workstation service was not enabled.
考题
Companycom is moving their application to a p5 590 and at the same time moving to a new version of the application. The customer knows only about the resource requirements of the old version. Which of the following is the best method to migrate their application to POWER5?()A、Add CPU and memory COD so they have room to grow if requiredB、Make the server configuration twice as large as the current requirementC、Configure the server for the current capacity requirementsD、Make the server configuration a little larger than the current capacity requirements
考题
Which configuration command is used to make the ERX Edge Router an NTP server?()A、 set ntp-serverB、 set ntp serverC、 ntp-server enableD、 ntp server enable
考题
You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A、Microsoft Baseline Security Analyzer (MBSA)B、Microsoft Security Assessment Tool (MSAT)C、Resultant Set of Policy (RSoP)D、Security Configuration Wizard (SCW)
考题
单选题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()A
Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountB
Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksC
Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateD
On the IIS server, run the gpresult command from a command prompt and analyze the output
考题
单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A
Microsoft Baseline Security Analyzer (MBSA)B
Microsoft Security Assessment Tool (MSAT)C
Resultant Set of Policy (RSoP)D
Security Configuration Wizard (SCW)
考题
单选题Which of the following tools are used to apply a Security Template in Windows Server 2012 R2?()A
Integration ServicesB
Security Configuration and AnalysisC
Resultant Set of PolicyD
TS ManagerE
Resource meteringF
Active Directory Domains and Trusts
考题
单选题Which of the following tools can an administrator use to get a server baseline?()A
System Resource MonitorB
Microsoft Baseline Security Analyzer (MBSA)C
Replication MonitorD
Performance Monitor
考题
单选题Which of the following should an administrator do after running a command from the console onthe perimeter router?()A
Update the configuration logsB
Update the network wiring schematicsC
Update the network configuration proceduresD
Compare the configuration with the baseline
考题
单选题Companycom is moving their application to a p5 590 and at the same time moving to a new version of the application. The customer knows only about the resource requirements of the old version. Which of the following is the best method to migrate their application to POWER5?()A
Add CPU and memory COD so they have room to grow if requiredB
Make the server configuration twice as large as the current requirementC
Configure the server for the current capacity requirementsD
Make the server configuration a little larger than the current capacity requirements
考题
单选题Which of the following specifies a set of consistent requirements for a workstation or server?()A
Vulnerability assessmentB
Imaging softwareC
Patch managementD
Configuration baseline
考题
单选题The primary purpose of an SLA between the service provider and customer is to agree on which of the following?()A
Monthly bandwidth limits, server configuration, and software baseline.B
Number of dedicated technicians assigned to network issues.C
Level of service including energy consumption, bandwidth and server color.D
Level of service including time limits for service, repair and replacement.
考题
单选题Which of the following MUST be done when imaging a Windows Server that will be used as a template?()A
Remove softwareB
Run Windows UpdatesC
Update driversD
Sysprep
考题
单选题Which of the following will MOST likely cause major performance issues on an email server?()A
RAID 0 configurationB
PBX softwareC
DHCP serverD
Anti-virus software
考题
单选题Which configuration command is used to make the ERX Edge Router an NTP server?()A
set ntp-serverB
set ntp serverC
ntp-server enableD
ntp server enable
考题
单选题A customer is looking for a low cost System x Server solution that has a fairly robust set of software application workload requirements. Which tool will assist you in making sure the hardware will match the workload?()A
IBM Configuration Options Guide (COG)B
IBM Sizing GuidesC
IBM xREF SheetsD
IBM ServerProvenE
IBM Standalone Solutions Configuration Tool (SSCT)
考题
单选题Which of the following environment variables specifies a non-default location for the listener configuration file?()A
LSN_ADMINB
TNS_ADMINC
ADMIN_TNSD
TSN_ADMIN
热门标签
最新试卷