多选题You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interface.BPhysically secure the interface.CCreate an access list and apply it to the virtual terminal interfaces with the access-group command.DConfigure a virtual terminal password and login process.EEnter an access list and apply it to the virtual terminal interfaces using the access-class command.

多选题
You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()
A

Administratively shut down the interface.

B

Physically secure the interface.

C

Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D

Configure a virtual terminal password and login process.

E

Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


参考解析

解析: 暂无解析

相关考题:

Your network consists of a single Active Directory forest that contains the domains shown in the following table.You create a universal security group named Contoso-All in the Contoso domain. You plan to use Contoso-All toassign permissions only on servers in the contoso.com domain.You add a group named Region1-All in the Region1 domain to Contoso\Contoso-All and receive the errormessage shown in the exhibit. (Click the Exhibit button.)You need to need to ensure that members of Region1\Region1-All can access resources that have been assigned to Contoso\Contoso-All.What should you change?()A. Contoso\Contoso-All to a domain local security groupB. Contoso\Contoso-All to a global security groupC. Region1\Region1-All to a domain local security groupD. Region1\Region-All to a universal distribution group

You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()A. OSPFB. RIPC. BGPD. static

Which routers must be configured with the same authentication string when configuring OSPFauthentication?() A. all routers on a linkB. all routers in an areaC. all external OSPF peersD. all routers in an OSPF domain

Refer to the exhibit. The Route.com company is running EIGRP between all the r outers. Currently, if one of the LAN links (LAN1 or LAN2) at the headquarters flaps (goes up and down), the HQRTR1 and HQ - RTR2 routers will experience high CPU usage and have a long EIGRP convergence time. As the new network administrator, you are asked to investigate this situation and determine if there is a quick way to resolve this issue. Which is the most important thing that you can quickly verify first to resolve this issue?()A. Verify that the bandwidth setting on all WAN links is correct.B. Verify that the HQ - RTR1 and HQ - RTR2 routers are configured to send only a default route to all the spoke routers.C. Verify that the HQ - RTR1 and HQ - RTR2 routers are configured for EIGRP Nonstop Forwarding.D. Verify that all the spoke routers are co nfigured for autosummarization.E. Verify that all the spoke routers are configured as EIGRP stub.

You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

You should be ______ with your movements because of all the security.A.usefulB.skillfulC.carefulD.helpful

When verifying the OSPF link state database, which type of LSAs should you expect to see within the different OS PF area types?()A、All OSPF routers in stubby areas can have type 3 LSAs in their database.B、All OSPF routers in stubby areas can have type 7 LSAs in their database.C、All OSPF routers in totally stubby areas can have type 3 LSAs in their database.D、All OSPF routers in totally stubby areas can have type 7 LSAs in their database.E、All OSPF routers in NSSA areas can have type 3 LSAs in their database.F、All OSPF routers in NSSA areas can have type 7 LSAs in their database.

Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()A、 UrlScan Security ToolB、 Enterprise Scan Tool (EST)C、 Malicious Removal Tool (MRT)D、 Microsoft Baseline Security Analyzer (MBSA)

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()A、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.B、Implement IEndpointldentityProvider in the message contract class.C、Implement ISecureConversationSession in the message contract class.D、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.

Which routers must be configured with the same authentication string when configuring OSPFauthentication?()A、all routers on a linkB、all routers in an areaC、all external OSPF peersD、all routers in an OSPF domain

Which routers must be configured with the same authentication string when configuring OSPF authentication?()A、all routers on a linkB、all routers in an areaC、all external OSPF peersD、all routers in an OSPF domain

TestKing.com uses SQL Server 2005. You are implementing a series of views that are used in ad hoc queries. The views are used to enforce TestKing.coms security policy of abstracting data. Some of these views perform slowly. You create indexes on those views to increase performance, while still maintaining the company’s security policy. One of the views returns the current date as one of the columns. The view returns the current date by using the GETDATE() function. This view does not allow you to create an index. You need to create an index on the view. Which two actions should you perform?()A、Remove all deterministic function calls from within the view.B、Remove all nondeterministic function calls from within the view.C、Schema-bind all functions that are called from within the view.D、Create the view and specify the WITH CHECK OPTION clause.

You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling

You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A、Microsoft Baseline Security Analyzer (MBSA)B、Microsoft Security Assessment Tool (MSAT)C、Resultant Set of Policy (RSoP)D、Security Configuration Wizard (SCW)

You need to design a password policy that meets business requirements. What should you do? Select all that apply.()A、Increase the number of passwords that are rememberedB、Disable reversible encryptionC、Set the minimum password age to zero daysD、Increase the maximum password age

You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainB、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateC、Create a logon script to run the secedit command to analyze all servers in the domainD、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

单选题You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()AOSPFBRIPCBGPDstatic

单选题You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()AFor all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.BImplement IEndpointldentityProvider in the message contract class.CImplement ISecureConversationSession in the message contract class.DFor all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.

单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()AMicrosoft Baseline Security Analyzer (MBSA)BMicrosoft Security Assessment Tool (MSAT)CResultant Set of Policy (RSoP)DSecurity Configuration Wizard (SCW)

单选题You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()AConfigure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patchesBConfigure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)CDeploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the serverDConfigure a batch file to download security patches daily. Manually install the security patches on all computers

单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()AOn all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyBOn all client computers, implement logon auditing for all user account logonsCOn all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyDOn all domain controllers, implement logon auditing for all user account logons

单选题You established access to menu modules using roles. While testing the application, you need access to all the menus in the SALES form module for all the roles. Which method will override the Menu Module Roles property to allow you to access all the menu items?()ADisable the values for the Menu Module Roles property. BSet the Use Security value in the form module Property Palette to 'True'. CSet the Use Security value in the form module Property Palette to 'False'. DSet the Use Security value in the menu module Property Palette to 'True'. ESet the Use Security value in the menu module Property Palette to 'False'.

多选题You are the systems engineer for your company. The network consists of three physical networks connected by hardware-based routers. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.   Each physical network contains at least one domain controller and at least one DNS server. One physical network contains a Microsoft Internet Security and Acceleration (ISA) Server array that provides Internet access for the entire company. The network also contains a certificate server.   Company management wants to ensure that all data is encrypted on the network and that all computers transmitting data on the network are authenticated.   You decide to implement IPSec on all computers on the network. You edit the Default Domain Policy Group Policy object (GPO) to apply the Secure Server (Require Security) IPSec policy.   Users immediately report that they cannot access resources located in remote networks. You investigate and discover that all packets are being dropped by the routers. You also discover that Active Directory replication is not functioning between domain controllers in different networks.   You need to revise your design and implementation to allow computers to communicate across the entire network. You also need to ensure that the authentication keys are stored encrypted.   Which two actions should you take?()AConfigure the routers to use IPSec and a preshared key for authentication.BConfigure the routers to use IPSec and a certificate for authentication.CConfigure the routers to use IPSec and Kerberos for authenticationDReconfigure the GPOs to require a preshared key for IPSec authentication.EReconfigure the GPOs to require a certificate for IPSec authentication.

单选题Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A Configure a directory service access audit policy. Increase the maximum size of the security log.B Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C Configure an object access audit policy for the directory. Increase the maximum size of the system log.D Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

多选题Your company uses SQL Server 2005. You are implementing a series of views that are used in ad hoc queries. The views are used to enforce your companys security policy of abstracting data.  Some of these views perform slowly. You create indexes on those views to increase performance, while still maintaining the companys security policy. One of the views returns the current date as one of the columns. The view returns the current date by using the GETDATE( ) function. This view does not allow you to create an index. You need to create an index on the view.  Which two actions should you perform?()ARemove all deterministic function calls from within the view.BRemove all nondeterministic function calls from within the view.CSchema-bind all functions that are called from within the view.DCreate the view and specify the WITH CHECK OPTION clause.

单选题You need to improve the company’s security patch management process. Your solution must meet existing business requirements and it cannot increase the number of employees or unnecessarily increase ongoing administrative effort. What should you do?()AProvide all users with the ability to access and use the Windows Update Web siteBUpgrade all client computers to either Windows 2000 Professional or Windows XP Professional. Implement Software Update Services (SUS)CUpgrade all client computers to either Windows 2000 Professional or Windows XP Professional.Make all users members of the Power Users group on their client computersDInstall the Active Directory Client Extensions on all Windows 95, Windows 98, and Windows NT Workstation 4.0 computers. Manually download all security patches to a Distributed File System (DFS) replica. Instruct all users to use the DFS replica to install security patchesEInstall the Active Directory Client Extensions on all Windows 95, Windows 98, and Windows NT Workstation 4.0 computers. Install a Software Update Services (SUS) server and make all users local administrators on their client computers