单选题An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()AIDSBIPSCFirewallDManaged PKI
单选题
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()
A
IDS
B
IPS
C
Firewall
D
Managed PKI
参考解析
解析:
暂无解析
相关考题:
Which of the following is NOT true?A) When a person tries to help others, he must be clear that there is a real emergency.B) When a person tries to help others, he should know whether they are worth his help.C) A person must take the full responsibility for the safety of those in emergencies if he wants to help.D) A person with a heart attack needs help.
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?() A.IDSB.IPSC.FirewallD.Managed PKI
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?() A.netstatB.tracerouteC.nbtstatD.ping
The Cisco network-based virtual firewall service solution helps service providers to deliver costeffective, scalable, integrated security services for enterprise customers using Cisco platforms .What is a virtual firewall?()A. another name for a firewall deployed in routed modeB. another name for a firewall deployed in transparent modeC. a separation of multiple firewall security contexts on a single firewallD. a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
The Cisco network-based virtual firewall service solution helps service providers to deliver cost-effective, scalable, integrated security services for enterprise customers using Cisco platforms.What is a virtual firewall?()A、 another name for a firewall deployed in routed modeB、 another name for a firewall deployed in transparent modeC、 a separation of multiple firewall security contexts on a single firewallD、 a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption
You need to recommend which role services must be deployed to support the company’s planned changes. Which two role services should you recommend?()A、Health Registration Authority (HRA)B、Host Credential Authorization Protocol (HCAP)C、Network Policy Server (NPS)D、Routing and Remote Access service (RRAS)
A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years. Which of the following locations should an administrator configure when complying with the new policy?()A、 Local workstationsB、 Backup tapesC、 Domain controllersD、 Email serverE、 SMTP gatewayF、 Proxy server
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode
An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()A、netstatB、tracerouteC、nbtstatD、ping
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS
ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU. You need to verify that users are connecting to the two servers by using encrypted connections. What should you do?()A、Run the net view command.B、Run the gpresult command.C、Use the IP Security Monitor console.D、Use the IPSec Policy Management console.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Outlook Web App to have access to their e-mail.A new Company.com policy prohibits the employees from downloading ZIP files from Outlook Web App.The CIO wants the employees to use Microsoft Office Outlook to download ZIP files.What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy.B、The best option is to set up the Content Filter agent.C、The best option is to set up a managed folder mailbox policy.D、The best option is to set up the Attachment Filter agent.
A System p administrator is looking at changing attributes of a logical volume. Which of the following must be defined when it is created()A、placement of the logical volumeB、stripe size of the logical volumeC、inter-disk policy of the logical volumeD、intra-disk policy of the logical volume
多选题A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years. Which of the following locations should an administrator configure when complying with the new policy?()ALocal workstationsBBackup tapesCDomain controllersDEmail serverESMTP gatewayFProxy server
单选题The Cisco network-based virtual firewall service solution helps service providers to deliver cost-effective, scalable, integrated security services for enterprise customers using Cisco platforms.What is a virtual firewall?()A another name for a firewall deployed in routed modeB another name for a firewall deployed in transparent modeC a separation of multiple firewall security contexts on a single firewallD a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.A new Xxx usage policy prohibits the employees from using certain words in internal e-mail messaging.What actions must you take to have the policy implemented?()AYou must set up an IP Block list.BYou must set up sender filtering.CYou must set up managed folders.DYou must build a transport rule
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Outlook Web App to have access to their e-mail.A new Company.com policy prohibits the employees from downloading ZIP files from Outlook Web App.The CIO wants the employees to use Microsoft Office Outlook to download ZIP files.What should you do?()AThe best option is to set up an Outlook Web App Mailbox policy.BThe best option is to set up the Content Filter agent.CThe best option is to set up a managed folder mailbox policy.DThe best option is to set up the Attachment Filter agent.
单选题An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()ANIPSBHoneypotCDMZDNIDS
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()AWEP encryptionBChannel rotationCDisable SSIDDWPA encryption
单选题ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU. You need to verify that users are connecting to the two servers by using encrypted connections. What should you do?()ARun the net view command.BRun the gpresult command.CUse the IP Security Monitor console.DUse the IPSec Policy Management console.
单选题An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()AnetstatBtracerouteCnbtstatDping
单选题A System p administrator is looking at changing attributes of a logical volume. Which of the following must be defined when it is created()Aplacement of the logical volumeBstripe size of the logical volumeCinter-disk policy of the logical volumeDintra-disk policy of the logical volume