单选题Which of the following specifies a set of consistent requirements for a workstation or server?()AVulnerability assessmentBImaging softwareCPatch managementDConfiguration baseline

单选题
Which of the following specifies a set of consistent requirements for a workstation or server?()
A

Vulnerability assessment

B

Imaging software

C

Patch management

D

Configuration baseline


参考解析

解析: 暂无解析

相关考题:

A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat() A. Incident responseB. Asset managementC. Patch managementD. Policies and procedures

Which of the following monitors a server to see which protocols might be in use?() A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer

()describes the configurable items of the project and identifies itcms that will be recorded and updated so that the product of the project tins consistent and operableA.The configuration management planB.The change management planC.The requirements traceability matrixD.The change baseline

Which of the following three service requirements are included in the Cisco UnifiedCommunications optimize phase()A、Business Case AlignmentB、Security AssessmentC、Incident managementD、Operations Readiness AssessmentE、Technology Assessment

Which of the following best defines the Cisco Lifecycle Services approach()A、the minimum set of services that are needed to successfully deploy and manage technology solutionB、system design to help ensure selection of the most appropriate productsC、business requirements and investments as they pertain to asset lifecycle managementD、technology strategies and related product lifecycles that are required to ensure minimal risks and maximum return of investment

You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountB、Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksC、Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateD、On the IIS server, run the gpresult command from a command prompt and analyze the output

Which of the following should an administrator do after running a command from the console onthe perimeter router?()A、Update the configuration logsB、Update the network wiring schematicsC、Update the network configuration proceduresD、Compare the configuration with the baseline

Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer

Which of the following specifies a set of consistent requirements for a workstation or server?()A、Vulnerability assessmentB、Imaging softwareC、Patch managementD、Configuration baseline

The company has two thousand servers located around the globe. Which of the following is the BEST method of patch management and deployment?()A、Set all servers to automatically download patches from the manufacturer’s website.B、Install an internal patch management system and deploy from the system.C、Install the patches on each server from a deployment disk.D、RDP into each server, manually download and install the patches.

A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()A、Incident responseB、Asset managementC、Patch managementD、Policies and procedures

The server administrator has just brought a new Windows server online. Permissions are set, but the server administrator cannot connect remotely. Which of the following is MOST likely the problem?()A、WMI was not enabled.B、Server service was not enabled.C、RDP was not enabled.D、Workstation service was not enabled.

Companycom is moving their application to a p5 590 and at the same time moving to a new version of the application. The customer knows only about the resource requirements of the old version. Which of the following is the best method to migrate their application to POWER5?()A、Add CPU and memory COD so they have room to grow if requiredB、Make the server configuration twice as large as the current requirementC、Configure the server for the current capacity requirementsD、Make the server configuration a little larger than the current capacity requirements

Which configuration command is used to make the ERX Edge Router an NTP server?()A、 set ntp-serverB、 set ntp serverC、 ntp-server enableD、 ntp server enable

You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A、Microsoft Baseline Security Analyzer (MBSA)B、Microsoft Security Assessment Tool (MSAT)C、Resultant Set of Policy (RSoP)D、Security Configuration Wizard (SCW)

单选题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()ALog on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountBRun the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksCRun Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateDOn the IIS server, run the gpresult command from a command prompt and analyze the output

单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()AMicrosoft Baseline Security Analyzer (MBSA)BMicrosoft Security Assessment Tool (MSAT)CResultant Set of Policy (RSoP)DSecurity Configuration Wizard (SCW)

单选题Which of the following tools are used to apply a Security Template in Windows Server 2012 R2?()AIntegration ServicesBSecurity Configuration and AnalysisCResultant Set of PolicyDTS ManagerEResource meteringFActive Directory Domains and Trusts

单选题Which of the following tools can an administrator use to get a server baseline?()ASystem Resource MonitorBMicrosoft Baseline Security Analyzer (MBSA)CReplication MonitorDPerformance Monitor

单选题Which of the following should an administrator do after running a command from the console onthe perimeter router?()AUpdate the configuration logsBUpdate the network wiring schematicsCUpdate the network configuration proceduresDCompare the configuration with the baseline

单选题Companycom is moving their application to a p5 590 and at the same time moving to a new version of the application. The customer knows only about the resource requirements of the old version. Which of the following is the best method to migrate their application to POWER5?()AAdd CPU and memory COD so they have room to grow if requiredBMake the server configuration twice as large as the current requirementCConfigure the server for the current capacity requirementsDMake the server configuration a little larger than the current capacity requirements

单选题Which of the following specifies a set of consistent requirements for a workstation or server?()AVulnerability assessmentBImaging softwareCPatch managementDConfiguration baseline

单选题The primary purpose of an SLA between the service provider and customer is to agree on which of the following?()AMonthly bandwidth limits, server configuration, and software baseline.BNumber of dedicated technicians assigned to network issues.CLevel of service including energy consumption, bandwidth and server color.DLevel of service including time limits for service, repair and replacement.

单选题Which of the following MUST be done when imaging a Windows Server that will be used as a template?()ARemove softwareBRun Windows UpdatesCUpdate driversDSysprep

单选题Which of the following will MOST likely cause major performance issues on an email server?()A RAID 0 configurationB PBX softwareC DHCP serverD Anti-virus software

单选题Which configuration command is used to make the ERX Edge Router an NTP server?()A set ntp-serverB set ntp serverC ntp-server enableD ntp server enable

单选题A customer is looking for a low cost System x Server solution that has a fairly robust set of software application workload requirements.  Which tool will assist you in making sure the hardware will match the workload?()AIBM Configuration  Options Guide (COG)BIBM Sizing GuidesCIBM xREF SheetsDIBM ServerProvenEIBM Standalone Solutions Configuration Tool (SSCT)

单选题Which of the following environment variables specifies a non-default location for the listener configuration file?()ALSN_ADMINBTNS_ADMINCADMIN_TNSDTSN_ADMIN