多选题An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()ASetting up a custom community nameBConfiguring the network to block traffic on port 161CConfiguring the Windows Firewall to block port 161DSetting SNMP to read only on the devicesEInstalling new MIBs
多选题
An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()
A
Setting up a custom community name
B
Configuring the network to block traffic on port 161
C
Configuring the Windows Firewall to block port 161
D
Setting SNMP to read only on the devices
E
Installing new MIBs
参考解析
解析:
暂无解析
相关考题:
Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?() A. Admin loggingB. SNMP loggingC. Syslog server loggingD. Event logging
A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?() A.FTPB.SMTPC.POPD.SNMP
A workstation is having connectivity issues when being added to the domain. Which of the following commands would allow the administrator to see the DNS and WINS servers that are currently configured for the workstation?()A.IpconfigB.NslookupC.NetstatD.Nbtstat
How can a Ezonexam administrator determine if a router has been configured when it is first powered up?A.A configured router prompts for a passwordB.A configured router goes to the privileged mode promptC.An un configured router goes into the setup dialogD.An un configured router goes to the enable mode prompt
How can an administrator determine if a router has been configured when it is first powered up?() A. A configured router prompts for a passwordB. A configured router goes to the privileged mode promptC. An un configured router goes into the setup dialogD. An un configured router goes to the enable mode prompt
Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device(). SNMP is a component of the Internet Protocol Suiteas defined by the Internet( )Task Force. SNMP operates in the( )layer of the Internet protocol suite. All SNMP messages are transported via User(请作答此空)Protocol. An SNMP-managed network consists of three key components: a) Managed devices, b) ( )(i.e.,software which runs on managed devices), and c) Network management station (NMS) (i.e., software which runs on the manager).A.DatumB.DatagramC.DatA.PacketD.DatA.Message
The administrator wants to backup the existing VIO server software and its current configuration before applying an update. What command will the administrator use to backup the VIO server software so that the backup can be restored from a Network Installation Manager (NIM) server or a Hardware Management Console (HMC)?()A、 mksysb -t vio /mountpointB、 backupios -file /mountpointC、 mksysb -i /mountpoint/vio.mksysbD、 backupios -mksysb -file /mountpoint/vio.mksysb
Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()A、Admin loggingB、SNMP loggingC、Syslog server loggingD、Event logging
How can an administrator determine if a router has been configured when it is first powered up?()A、A configured router prompts for a passwordB、A configured router goes to the privileged mode promptC、An un configured router goes into the setup dialogD、An un configured router goes to the enable mode prompt
Which two statements are true about the configuration of voice VLANs?()A、Static secure MAC addresses can be configured in conjunction with voice VLANs.B、PortFast is automatically enabled when voice VLANs are configured.C、PortFast must be manually configured when voice VLANs are configured.D、Voice VLANs are typically configured on uplink ports.E、Voice VLANs are typically configured on access ports.
An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs
An administrator has purchased monitoring software that can be configured to send alerts when hardware and applications are having issues. Which of the following must be installed on the monitoring server so that it can properly monitor details on vendor specific devices?()A、 MIBsB、 SMTPC、 WMID、 DHCP
An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?()A、The administrator improperly configured the virtual memory settings on the server.B、The administrator is using incorrect patch switches for the install.C、The administrator is trying to install security patches for software that is not installed.D、The administrator is trying to install patches that require hard drive encryption on the server.
A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?()A、FTPB、SMTPC、POPD、SNMP
While discussing the specifications of replacement servers, the administrator’s manager asks what can be done to avoid the down time associated with failed hard drives on the servers. Which of the following should the administrator recommend?()A、Mirror all disks to avoid replacementB、Purchase servers with hot swappable drives configured in a RAIDC、Purchase servers with duplicate drives configured as RAID 0D、Perform timely backups
An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs
A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A、NIC filtering is enabled.B、Port security is configured.C、NIC is not in promiscuous mode.D、NIC is in promiscuous mode.
A workstation is having connectivity issues when being added to the domain. Which of the following commands would allow the administrator to see the DNS and WINS servers that are currently configured for the workstation?()A、IpconfigB、NslookupC、NetstatD、Nbtstat
An administrator wants to record details of all logical volumes mapped as virtual disks on a VIO server partition and the associated virtual target devices and mappings. Which IOS command can the administrator use to achieve this?()A、 lssp -detailB、 lsvdev -s vtd -c lvC、 lsmap -type lv -allD、 lsdev -Cs virtual -t lv
System, machine, and user policies can be configured though AccessAdmin. How are changes synchronized with the AccessAgent?()A、written by the Administrators on the INI filesB、propagated only with the Active Directory network serviceC、propagated to the clients on the next Administrator accessD、propagated to clients the next time AccessAgent synchronizes with the IMS Server
An AIX server has 2 network interfaces and the system administrator wants to enable the users on the locally configured network interface to be able to connect to systems configured on the global network interface. How is it accomplished?()A、Enable routed on the serverB、Enable gated on the serverC、Enable ipforwarding on the serverD、Set network options back to default
多选题Which two statements are true about the configuration of voice VLANs?()AStatic secure MAC addresses can be configured in conjunction with voice VLANs.BPortFast is automatically enabled when voice VLANs are configured.CPortFast must be manually configured when voice VLANs are configured.DVoice VLANs are typically configured on uplink ports.EVoice VLANs are typically configured on access ports.
单选题An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?()A The administrator improperly configured the virtual memory settings on the server.B The administrator is using incorrect patch switches for the install.C The administrator is trying to install security patches for software that is not installed.D The administrator is trying to install patches that require hard drive encryption on the server.
单选题An administrator wants to record details of all logical volumes mapped as virtual disks on a VIO server partition and the associated virtual target devices and mappings. Which IOS command can the administrator use to achieve this?()A lssp -detailB lsvdev -s vtd -c lvC lsmap -type lv -allD lsdev -Cs virtual -t lv
多选题An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()ASetting up a custom community nameBConfiguring the network to block traffic on port 161CConfiguring the Windows Firewall to block port 161DSetting SNMP to read only on the devicesEInstalling new MIBs
单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()A NIC filtering is enabled.B Port security is configured.C NIC is not in promiscuous mode.D NIC is in promiscuous mode.
单选题An administrator has purchased monitoring software that can be configured to send alerts when hardware and applications are having issues. Which of the following must be installed on the monitoring server so that it can properly monitor details on vendor specific devices?()A MIBsB SMTPC WMID DHCP