单选题Which of the following allows a program or port through a software firewall?()AExceptionBPass-throughCPort-forwardingDPunch-through

单选题
Which of the following allows a program or port through a software firewall?()
A

Exception

B

Pass-through

C

Port-forwarding

D

Punch-through


参考解析

解析: 暂无解析

相关考题:

Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO). A.22B.23C.143D.161E.162F.8080

Which of the following technologies allows an administrator to submit traffic to an IDS for review?() A. Spanning treeB. VLANC. PoED. Port mirroring

Which of the following is the BEST way to allow web software through the server firewall?() A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.

A technician is able to connect to the Internet but cannot connect to a remote machine through Remote Desktop in Windows XP. Each time the technician attempts to connect to a remote location, the software times out. Which of the following is the MOST likely problem?()A、The Java applet is disabled in the web browser.B、Deny all has not been configured in the firewall.C、Wireless network drivers are corrupt.D、Port forwarding settings are not correct

Which of the following allows verification of the port that a printer is currently using?()A、The print queue window from system trayB、Properties of the printer from the Printers Control PanelC、Print spooler view in the Printers Control PanelD、Properties of the port within Device Manager

A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()A、Update the antivirus applicationB、Install critical update security patchesC、Adjust the software firewall settingsD、Replace the current antivirus program

Which of the following allows a program or port through a software firewall?()A、ExceptionB、Pass-throughC、Port-forwardingD、Punch-through

Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.

Which of the following ports should be allowed through a firewall for Telnet to function?()A、23B、25C、50D、110

Which of the following allows a WAP to be installed in a location where there are no power outletsavailable?()A、Port authenticationB、PoEC、PPTPD、Trunking

Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).A、22B、23C、143D、161E、162F、8080

Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A、Protocol analyzerB、Vulnerability scannerC、Port scannerD、Penetration test

Which of the following technologies allows an administrator to submit traffic to an IDS for review?()A、Spanning treeB、VLANC、PoED、Port mirroring

Which of the following virtualization options are unique to AIX and PowerVM compared to other UNIX based offerings?()A、Software virtualization through PowerVM and hardware virtualization through IBM Systems Director.B、Hardware virtualization through Workload Partitions (WPARS) and software virtualization through PowerVM.C、Software virtualization through Workload Partitions (WPARS) and hardware virtualization through PowerVM.D、Hardware virtualization through Workload Partitions (WPARS) and software virtualization through IBM Systems Director.

Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: °Error 721: The remote computer is not responding.You need to ensure that users can establish a VPN connection. What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.

单选题A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()AUpdate the antivirus applicationBInstall critical update security patchesCAdjust the software firewall settingsDReplace the current antivirus program

多选题Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).A22B23C143D161E162F8080

单选题Which of the following is the BEST way to allow web software through the server firewall?()AImplement an application exception.BImplement an access control list (ACL).COpen the corporate firewall to allow port 80.DImplement port blocking on port 80.

单选题Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()AOpen port 1423 on the firewallBOpen port 1723 on the firewallCOpen port 3389 on the firewallDOpen port 6000 on the firewall

单选题Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()A21B443C3389D8080

多选题An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic.  Which of the following settings would BEST provide additional monitoring security?()ASetting up a custom community nameBConfiguring the network to block traffic on port 161CConfiguring the Windows Firewall to block port 161DSetting SNMP to read only on the devicesEInstalling new MIBs

单选题Which of the following allows verification of the port that a printer is currently using?()AThe print queue window from system trayBProperties of the printer from the Printers Control PanelCPrint spooler view in the Printers Control PanelDProperties of the port within Device Manager

单选题Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: °Error 721: The remote computer is not responding.You need to ensure that users can establish a VPN connection. What should you do?()AOpen port 1423 on the firewall.BOpen port 1723 on the firewall.COpen port 3389 on the firewall.DOpen port 6000 on the firewall.

单选题Which of the following virtualization options are unique to AIX and PowerVM compared to other UNIX based offerings?()ASoftware virtualization through PowerVM and hardware virtualization through IBM Systems Director.BHardware virtualization through Workload Partitions (WPARS) and software virtualization through PowerVM.CSoftware virtualization through Workload Partitions (WPARS) and hardware virtualization through PowerVM.DHardware virtualization through Workload Partitions (WPARS) and software virtualization through IBM Systems Director.

单选题A technician has fixed a reported issue with a heavily used software program and users have verified that the program is working correctly. Which of the following should the technician do NEXT?()ADocument the process and update the baseline.BTest the theory of probable cause and verify with the software vendor.CEstablish a plan of action to be included in the business impact analysis.DImplement the software manufacturer workaround.

单选题Which of the following ports should be allowed through a firewall for Telnet to function?()A23B25C50D110

单选题Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()ANetwork layer firewallBStateful inspection firewallCZone aware firewallDApplication layer firewall