单选题A technician wants to decrease the overall attack surface of the servers in a data center through decreasing the number of open network ports on each server. Which of the following could the technician implement to increase security?()AHost based intrusion detection softwareBSoftware firewallCNTFSDACL

单选题
A technician wants to decrease the overall attack surface of the servers in a data center through decreasing the number of open network ports on each server. Which of the following could the technician implement to increase security?()
A

Host based intrusion detection software

B

Software firewall

C

NTFS

D

ACL


参考解析

解析: 暂无解析

相关考题:

Management reserves are normally defined as a % of the total budget. As a project progresses, the project manager wants the $ value of management reserve to _____, whereas the customer wants the management reserve to _____.A . Increase, increase.B . Increase, decrease.C . Decrease, decrease.D . Decrease, increase.E . Remain the same, return to customer.

6 Management reserves are normally defined as a % of the total budget. As a project progresses, the project manager wants the $ value of management reserve to _____, whereas the customer wants the management reserve to _____.A. Increase, increase.B. Increase, decrease.C. Decrease, decrease.D. Decrease, increase.E. Remain the same, return to customer

Serious loss of reserve buoyancy resulting from flooding any compartment of a ship will always ______.A.increase the trimB.change the free surface effectC.cause a serious listD.decrease ship stability

A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? () A. ESD matB. ESD wrist strapC. Sealable plastic bagD. Anti-static bag

A network technician wants to use a packet analyzer to troubleshoot a reported problem with auser‘s workstation with IP address 192.168.1.45. To identify the workstation‘s packets thetechnician wants to use the workstation‘s MAC address.Which of the following protocols would provide the needed information?()A.DHCPB.ARPC.DNSD.PING

An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?() A.IDSB.IPSC.FirewallD.Managed PKI

A technician wants to compare a new server performance over a period of time. Which of the following should the technician do FIRST?() A. Monitor processor performance logsB. Constantly check the task managerC. Use performance server logsD. Establish a baseline for the server

Coalescence(聚合) is the breakdown of surface tension between oil droplets in an oil/water mixture, which causes them to join and ______in size.A.expandB.extractC.increaseD.decrease

Which factor(s) might indicate that a towline should be removed from service?A.Visible damage to the towline,including fishhooksB.Measurements showing a decrease in diameterC.A surface condition of corrosion and discolorationD.All of the above

The free surface effects of a partially full liquid tank decrease with increased ______.A.Density of the liquidB.Placement of the tank above the keelC.Displacement volume of the shipD.Size of the surface area in the tank

A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()A、Logging detect fail-loginB、Login on-failure logC、Login detect login-failure logD、Logging login on-failureE、none of the above

A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA、Power UsersB、UsersC、GuestsD、Administrato

A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()A、ESD matB、ESD wrist strapC、Sealable plastic bagD、Anti-static bag

A technician wants to compare a new server performance over a period of time. Which of the following should the technician do FIRST?()A、Monitor processor performance logsB、Constantly check the task managerC、Use performance server logsD、Establish a baseline for the server

A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING

A technician is setting up a network and wants to automatically assign IP addresses. Which of the following will need to be configured to automatically assign IP addresses?()A、WINSB、DNSC、DHCPD、NTP

A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?()A、DHCP serverB、Proxy serverC、RepeaterD、DHCP relay

A technician wants to create a spanned volume on a set of hard drives. Which of the following tools will identify if the drives will support a spanned volume?()A、System InformationB、Disk ManagementC、Device ManagerD、Task Manager

An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI

Which components are designed to be conveniently replaced by a service technician?()A、SMDs(surface mounted devices)B、FRUs(field replacement units)C、FESsD、BEMs

A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A、 Guest user accountB、 Limited user accountC、 Power user accountD、 Administrator user account

单选题A(n) () is a mechanical attack on the metal surface which may be due to a disturbance in the flow of the water over the blade of the propeller.AerosionBcorrosionCpittingDdezincification

单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A Guest user accountB Limited user accountC Power user accountD Administrator user account

单选题A (n) () is a chemical or electro-chemical attack on the metal surface which may be further increased if the sea-water is polluted.AerosionBcorrosionCcavityDscouring

单选题As the displacement of a vessel increases, the detrimental effect of free surface().AincreasesBdecreasesCremains the sameDmay increase or decrease depending on the fineness of the vessel's form

单选题Which factor(s) might indicate that a towline should be removed from service? ()AVisible damage to the towline,including fishhooksBMeasurements showing a decrease in diameterCA surface condition of corrosion and discolorationDAll of the above

单选题A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()ALogging detect fail-loginBLogin on-failure logCLogin detect login-failure logDLogging login on-failureEnone of the above