is a mechanism used for protecting the users outside of network from accessing some non-authorized computer resources.A.Network CardB.protocolC.FirewallD.Router

is a mechanism used for protecting the users outside of network from accessing some non-authorized computer resources.

A.Network Card

B.protocol

C.Firewall

D.Router


相关考题:

Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP addresses from the private 10.0.0.0 range. All the client computers on the network use Windows 2000 Professional. The network includes Windows 2000 Servers and UNIX Servers.Users' print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to the print devices attached directly to the network.You have a high-capacity print device that is attached to one of the UNIX Servers. The UNIX computer uses the LPR printing protocol, and its IP address is 10.1.1.99. The name of the printer queue is GIANT.You want users to be able to connect to this printer from their computers.What should you do?A.Install Microsoft Print Services for UNIX on PrintServ. Create a network printer on the users' computers, and specify that the printer URL is LPR://10.1.1.99/GIANT.B.Install Microsoft Print Services for UNIX on the users' computers. Create a network printer on the users' computers, and specify that the printer URL is LPR://10.1.1.99/GIANT.C.Create a network printer on PrintServ and specify that the printer name is \\10.1.1.99\GIANT. Share this printer and connect to it from the users' computers.D.Create a local printer on PrintServ. Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT. Share this printer and connect it from the users' computers.

Personal firewall is a technology that helps(66)intruders from accessing data on your PC via the Internet or another network, by keeping(67)data from entering or exiting your system.Hackers do not just target national security organizations for(68): They want your tax returns, network passwords, or bank account numbers. And you do not want the FBI kicking in your door because someone hijacked your PC to(69)in the latest denial-of-service attack on the Internet. Now that "always-on" broadband connections such as cable modems and digital subscriber line are becoming more popular, home users are at risk. Fortunately, you can protect your data. Firewalls can block(70)attacks and protect your PC from outside threats.A.allowB.preventC.inviteD.get

You are the administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of Ezonexam.com's client computers are connected to this server.A shared folder named Data on the server is on an NTFS partition. The data folder contains more than 200 files. The permissions for the data folder are shown in the following table.Type of permission Account PermissionShare Users ChangeNTFS Users Full ControlYou discover that users are connected to the Data folder. You have an immediate need to prevent 10 of the files in the Data folder from being modified. You want your actions to have the smallest possible effects on the users who are using other files on the server.What two actions should you take? (Choose Two)A.Modify the NTFS permissions for the 10 files.B.Modify the NTFS permissions for the Data folder.C.Modify the shared permissions for the Data folder.D.Log off the users from the network.E.Disconnect the users from the Data folder.

In enterprises, the gateway is the computer that(71) the traffic from a workstation to the outside network that is serving the Web pages. In homes ,the gateway is the(72) that connects the user to the internet.A.findsB.searchesC.routesD.tracks

What is the primary purpose of creating a Location Group Policy? () A. to associate more than one realm with an authentication serverB. to logically group network access devices and associate them with specific sign-in policiesC. to allow or prevent users from accessing resources in specific locations on the networkD. to define the URL that users of network access devices can use to access the Infranet Controller

Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()A.Configure a Windows Connect Now Group Policy.B.Configure a Wireless Network (IEEE 802.11) Policy.C.Delete the rogue network from the Network and Sharing Center on each computer.D.Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

Computer( )focuses on protecting information ,hardware ,and software from unauthorized use and damage.A.network B.virus C.security D.architecture

Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.A.network B.virus C.security D.architecture

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。 A.Allow unrestricted access to the console or VTY portsB.Use a firewall to restrict access from the outside to the network devicesC.Always use Telnet to access the device command line because its data is automatically encryptedD.Use SSH or another encrypted and authenticated transport to access device configurationsE.Prevent the loss of passwords by disabling password encryption

Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.A.networkB.vimsC.securityD.architecture

Computer______focuses on protecting information,hardware,and software from unauthorized use and damage.A.networkB.virusC.securityD.architecture

Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the networkA.complexB.uniqueC.catchyD.long

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。A、Allow unrestricted access to the console or VTY portsB、Use a firewall to restrict access from the outside to the network devicesC、Always use Telnet to access the device command line because its data is automatically encryptedD、Use SSH or another encrypted and authenticated transport to access device configurationsE、Prevent the loss of passwords by disabling password encryption

Which of the following should a technician do FIRST to troubleshoot a users network connectivity problem?()A、Run TRACERT from the users workstation.B、Start with the Last Known Good Configuration and reboot the computer.C、Replace the network interface card (NIC).D、PING the users workstation.

Which of the following is the correct path to add new local user accounts to a Windows 7computer?()A、Click on the Start button Right click on Computer Select Manage Expand Local Users and Groups Right click on Users Select New UserB、Click on the Start button Right click on My Computer Select Manage Right click on Local Users and Groups Select Add Users from the menuC、Click on the Start button Right click on Computer Select Manage Right click on Local Users and Computers Select New UserD、Click on the Start button Right click on Network Neighborhood Select Manage Right click on Users Select New User

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()A、Allow unrestricted access to the console or VTY ports.B、Use a firewall to restrict access from the outside to the network devices.C、Always use Telnet to access the device command line because its data is automatically encrypted.D、Use SSH or another encrypted and authenticated transport to access device configurations.E、Prevent the loss of passwords by disabling password encryption.

The technician needs to map a network share to the user’s Windows 7 computer from thecommand prompt. Which of the following commands will the technician execute?()A、NET SENDB、NET CONFIGC、NET USED、NET NAME

What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller

You administer a Windows 2000 network at Company's main office.  You have purchased 15 new Windows 2000 Professional computers that will be used in the finance department. The new computers are equipped with a fax modem. You install the Fax service with the default values and settings on each computer. You want to prevent users from using the Control Panel to remove the fax printer. What should you do?()A、Remove the users’ account from the DACL for the fax printer.B、Edit the local Computer Policy to prevent users from using Printers in Control Panel.C、Edit the local Computer Policy. Configure the Prevent deletion of printers setting to enabled.D、Edit the local Computer Policy. Configure the Prevent addition of printers setting to disabled

You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? () A、Enable the Require domain controller to unlock policy.B、Set the Number of previous logons to cache policy to 0.  C、Remove all user and group accounts from the Log on locally user right. D、Remove all user and group accounts from the Access this computer from the network user right.

Your network contains a server named Server1. Server1 has DirectAccess deployed. A group named Group1 is enabled for DirectAccess. Users report that when they log on to their computers, the computers are not configured to use DirectAccess. You need to ensure that the users computers are configured to use DirectAccess. What should you do first?()A、On each client computer, add Group1 to the Distributed COM Users group.B、On each client computer, add Group1 to the Network Configuration Operators group.C、From Active Directory Users and Computers, add the users user accounts to Group1.D、From Active Directory Users and Computers, add the users computer accounts to Group1.

Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer.  What should you do?()A、Remove all generic credentials from Windows Vault.B、Remove all Windows credentials from Windows Vault.C、Modify the Windows Internet Explorer certificates settings.D、Modify the Windows Internet Explorer AutoComplete settings.

Your network contains an Active Directory forest. The forest contains multiple sites.     You need to enable universal group membership caching for a site.  What should you do()A、From Active Directory Sites and Services, modify the NTDS Settings.B、From Active Directory Sites and Services, modify the NTDS Site Settings.C、From Active Directory Users and Computers, modify the properties of all universal groups used in the site.D、From Active Directory Users and Computers, modify the computer objects for the domain controllers in the site.

You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()A、Use a password generator application to create a preshared key, and distribute it to all mobile usersB、Use computer autoenrollment to create digital certificates that can be used to authenticate to a VPN serverC、Acquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connectionD、Configure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates

单选题Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()AIPSec VPNBSSL VPNCport securityDport security with statically configured MAC addressesEprivate VLANs

单选题You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network. What should you do?()AOn Folder1, modify the share permissions.BOn Folder1, modify the NTFS permissions.CAdd all local user accounts to the Guests group. DAdd all local user accounts to the Network Configuration Operators group.