考题
________ head of the Research & Development Department, he has been ________ developing new products.
A.Working as...working onB.Working for...working onC.Working as...working atD.Working on...working at
考题
The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above
考题
You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A.14B.16C.30D.32E.62F.64
考题
The defense works_________long ago to keep the enemy away.
A.were built
B.has been built
C.had been built
D.was built
考题
You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A、14B、16C、30D、32E、62F、64
考题
In the plan phase, network readiness assessment addresses which customer need? Select exactly 1 answer(s) from the following:()。A、an assessment of the preparedness of the customers existing system infrastructure to support a propose solutionB、a comprehensive design that has been customized based on the operations processes, network management processes, and tools of its systemC、an in-depth assessment of the operational environment required to support the operation of both the current and planned solutionsD、the optimal technologies for supporting its business requirements and objectives
考题
The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()A、 intrusion protectionB、 identityC、 secure connectivityD、 security management
考题
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A、intrusion protectionB、identityC、secure connectivityD、security management
考题
To ensure device security, Cisco Network Admission Control works with antivirus software onwhich two endpoints? ()A、 portB、 serverC、 laptopD、 wireless client
考题
Router R1 exists in an Enterprise that uses EIGRP as its routing protocol. The show ip route command output on router R1 lists the following phrase: "Gateway of last resort is 1.1.1.1 to network 2.0.0.0". Whic h of the following is most likely to have caused this output to occur on R1?()A、R1 has been configured with an ip default- network 2.0.0.0 command.B、R1 has been configured with an ip route 0.0.0.0 0.0.0.0 1.1.1.1 command.C、R1 has been configured with an ip route 2.0.0.0 255.0.0.0 1.1.1.1 command.D、Another router has been configured with an ip default - network 2.0.0.0 command.E、Another router has been configured with an ip route 2.0.0.0 255.0.0.0 1.1.1.1 command.
考题
A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A、The website has updated the security policies.B、The user’s identity has been stolen.C、The browser has been hijacked.D、The user typed the website address incorrectly.
考题
A customer has been working with your company to purchase an iDataPlex cluster. They have a configuration from IBM and are getting ready to place an order. Which should be done of the following?()A、A solution sizing questionnaireB、Verify the customer has the proper racksC、A Technical Delivery AssessmentD、Verify the customer has enough cooling in the computer room
考题
You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()A、Microsoft Baseline Security Analyzer (MBSA)B、Security Configuration and Analysis consoleC、gpresult.exeD、Resultant Set of Policy console in planning mode
考题
单选题A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A
The website has updated the security policies.B
The user’s identity has been stolen.C
The browser has been hijacked.D
The user typed the website address incorrectly.
考题
单选题A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()A
Update the antivirus applicationB
Install critical update security patchesC
Adjust the software firewall settingsD
Replace the current antivirus program
考题
单选题Hannah finished building her new all-purpose projects room last year, and she has been working in the room ever since.A
and she has been working in the room ever sinceB
and since that time she has worked thereC
where always since she worksD
she has been working in that room ever sinceE
and since then is working there
考题
单选题Cast irons weakness in tension and under shock loading limits its use to low pressure steam, air, oil and low speed water fittingsThe above sentence, most probably means ().A
cast iron has weaknessB
cast iron can stand up shock loadingC
cast iron fittings are only suitable in low pressure situationD
east iron fittings are not suitable in low pressure situation
考题
单选题You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()A
Microsoft Baseline Security Analyzer (MBSA)B
Security Configuration and Analysis consoleC
gpresult.exeD
Resultant Set of Policy console in planning mode
考题
单选题You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A
14B
16C
30D
32E
62F
64
考题
单选题Which of the following is the best version of sentences 10 and 11 (reproduced below) ?It is easy to see why this disease has been dismissed and ignored. Its because of it’s vagueness and mystery.A
This disease has been dismissed and ignored because of its vagueness and mystery.B
It is easy to see why this disease has been dismissed and ignored. It’s because of the vagueness and the mystery.C
Vagueness and mystery dismiss and ignore this disease.D
Why this disease has been dismissed and ignored is because of its vagueness and mystery.E
It is easy for you to see why this disease has been dismissed and ignored. It is because of the vagueness and mystery.
考题
单选题Wrought iron has an inherent resistance to corrosion but is not to be had freely , its place has been taken by the cuprous alloysAccording to the above sentence , which of the following statements is true?()A
Wrought iron can resist liquids flowB
It is difficult to attain the wrought ironC
Wrought iron should be combined with cuprous alloysD
The cuprous alloys have mere disadvantages than wrought iron
考题
单选题Its business culture,()has brought the world “shareholder value” and “IPOs”,()commercial thinking in recent years and will continue to do so.A
which; has leadedB
which; has been leadingC
that; has leadedD
that; has been leading
考题
单选题A customer has been working with your company to purchase an iDataPlex cluster. They have a configuration from IBM and are getting ready to place an order. Which should be done of the following?()A
A solution sizing questionnaireB
Verify the customer has the proper racksC
A Technical Delivery AssessmentD
Verify the customer has enough cooling in the computer room
考题
多选题The Schuyler and Livingston Iron Works has been working on getting its network security under control.It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures. Which two areas of security would you advise the company to strengthen?()Aintrusion protectionBidentityCsecure connectivityDsecurity management
考题
多选题The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()Aintrusion protectionBidentityCsecure connectivityDsecurity management
考题
单选题Mr. White works for a chemicals import and export company, but he has been working for this industrial fair, while he is _______ from that company.A
on leaveB
on duty C
on patrol D
on guard
考题
多选题TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()A199.141.27.33B199.141.27.112C199.141.27.119D199.141.27.126E199.141.27.175F199.141.27.208