单选题A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()Aport 443 - SSL connection Bport 8080 ?http Cport 22 - SSH CLI Dport 427 - SLP connection
单选题
A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()
A
port 443 - SSL connection
B
port 8080 ?http
C
port 22 - SSH CLI
D
port 427 - SLP connection
参考解析
解析:
暂无解析
相关考题:
Which type of cable should be used to make a connection between the Fa0/0 port on a router and the Fa0/0 port switch?A.Rollover cableB.Console cableC.Crossover cableD.Straight-through cableE.Serial cable
Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?() A. Network layer firewallB. Stateful inspection firewallC. Zone aware firewallD. Application layer firewall
A customer has a BladeCenter H chassis with a single AMM. The AMM is defective. Which of the following is the method to backup the existing AMM so the new AMM automaticlally picks up the configuration? ()A、Back up the AMM configuration to a file B、Back up the AMM configuration to the chassis C、Back up the AMM using IBM Systems Director D、Back up the AMM using Tivoli Storage Manager
On the WLSE, which of the following fault policies would be used to verify that access to thecommand-line interface of the access point is secure?()A、registration errorB、authentication failures thresholdC、HTTP disabledD、Telnet disabled
Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A、Network layer firewallB、Stateful inspection firewallC、Zone aware firewallD、Application layer firewall
Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN
A storage specialist is assessing a customer’s tape backup environment. Which of the following questions would be the most appropriate question to identify the customer’s environment?()A、Has there been any recent loss of data?B、How many tape drives are in the Library?C、What tape technology is currently being used?D、What software is being used for restoring the data?
A banking customer orders three IBM BladeCenter E chassis and thirty-four HS22 blades. The customer wants to fully populate the chassis with blades where possible. Which of the following is the minimum number of power cables required to provide redundancy?()A、6B、8C、10D、12
A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()A、port 443 - SSL connection B、port 8080 ?http C、port 22 - SSH CLI D、port 427 - SLP connection
A banking customer orders three IBM BladeCenter E chassis and thirty-four HS22 blades. Theustomer wants to fully populate the chassis with blades where possible. Which of the following is the minimum number of power cables required to provide redundancy? ()A、12 B、10 C、8 D、6
Which type of cable should be used to make a connection between the Fa0/0 port on a router and the Fa0/0 port switch?()A、Rollover cableB、Console cab leC、Crossover cableD、Straight-through cableE、Serial cable
A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()A、RouteB、IfconfigC、NetstatD、Nslookup
A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()A、Upgrade the operating system to Windows XP Home.B、Have the customer convert to NTFS and enable data encryption.C、Tell the customer that a laptop should not be used for classified data.D、Configure the wireless adapter to only connect to secure networks.
Which of the following traffic types would a network layer firewall be unable to filter?()A、SMTP trafficB、ICMP messagesC、HTTP trafficD、Email sender verification
Which of the following tools can be used to securely connect to a remote system?()A、RCMDB、SSHC、TELNETD、HTTP
Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor
Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server. Which type of connection should you configure? ()A、IPSECB、L2TPC、PPTPD、SSTP
单选题A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()AUpdate the antivirus applicationBInstall critical update security patchesCAdjust the software firewall settingsDReplace the current antivirus program
单选题A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()ARouteBIfconfigCNetstatDNslookup
单选题A customer has a BladeCenter H chassis with a single AMM. The AMM is defective. Which of the following is the method to backup the existing AMM so the new AMM automaticlally picks up the configuration? ()ABack up the AMM configuration to a file BBack up the AMM configuration to the chassis CBack up the AMM using IBM Systems Director DBack up the AMM using Tivoli Storage Manager
单选题A banking customer orders three IBM BladeCenter E chassis and thirty-four HS22 blades. The customer wants to fully populate the chassis with blades where possible. Which of the following is the minimum number of power cables required to provide redundancy?()A6B8C10D12
单选题A banking customer orders three IBM BladeCenter E chassis and thirty-four HS22 blades. Theustomer wants to fully populate the chassis with blades where possible. Which of the following is the minimum number of power cables required to provide redundancy? ()A12 B10 C8 D6
单选题A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()AUpgrade the operating system to Windows XP Home.BHave the customer convert to NTFS and enable data encryption.CTell the customer that a laptop should not be used for classified data.DConfigure the wireless adapter to only connect to secure networks.
单选题Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server. Which type of connection should you configure? ()AIPSECBL2TPCPPTPDSSTP
单选题A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()Aport 443 - SSL connection Bport 8080 ?http Cport 22 - SSH CLI Dport 427 - SLP connection
单选题Which of the following would be used to monitor unauthorized access to data files?()APerformance Log and AlertsBEvent ViewerCSecurity Configuration and AnalysisDIP Security Monitor
单选题Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()ANetwork layer firewallBStateful inspection firewallCZone aware firewallDApplication layer firewall
单选题A storage specialist is assessing a customer’s tape backup environment. Which of the following questions would be the most appropriate question to identify the customer’s environment?()AHas there been any recent loss of data?BHow many tape drives are in the Library?CWhat tape technology is currently being used?DWhat software is being used for restoring the data?