A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()A、IPSec and Kerberos AuthenticationB、Secure By Default and AIX Security ExpertC、Trusted Execution and Role Based Access ControlD、First Failure Data Capture and Storage Protection Keys

A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()

  • A、IPSec and Kerberos Authentication
  • B、Secure By Default and AIX Security Expert
  • C、Trusted Execution and Role Based Access Control
  • D、First Failure Data Capture and Storage Protection Keys

相关考题:

(a) Contrast the role of internal and external auditors. (8 marks)(b) Conoy Co designs and manufactures luxury motor vehicles. The company employs 2,500 staff and consistently makes a net profit of between 10% and 15% of sales. Conoy Co is not listed; its shares are held by 15 individuals, most of them from the same family. The maximum shareholding is 15% of the share capital.The executive directors are drawn mainly from the shareholders. There are no non-executive directors because the company legislation in Conoy Co’s jurisdiction does not require any. The executive directors are very successful in running Conoy Co, partly from their training in production and management techniques, and partly from their ‘hands-on’ approach providing motivation to employees.The board are considering a significant expansion of the company. However, the company’s bankers areconcerned with the standard of financial reporting as the financial director (FD) has recently left Conoy Co. The board are delaying provision of additional financial information until a new FD is appointed.Conoy Co does have an internal audit department, although the chief internal auditor frequently comments that the board of Conoy Co do not understand his reports or provide sufficient support for his department or the internal control systems within Conoy Co. The board of Conoy Co concur with this view. Anders Co, the external auditors have also expressed concern in this area and the fact that the internal audit department focuses work on control systems, not financial reporting. Anders Co are appointed by and report to the board of Conoy Co.The board of Conoy Co are considering a proposal from the chief internal auditor to establish an audit committee.The committee would consist of one executive director, the chief internal auditor as well as three new appointees.One appointee would have a non-executive seat on the board of directors.Required:Discuss the benefits to Conoy Co of forming an audit committee. (12 marks)

Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()A、assigning a private IP address to the APB、changing the default SSID valueC、configuring a new administrator passwordD、changing the mixed mode setting to single modeE、configuring traffic filtering

Companycom has a requirement to consolidate six web application servers. There is unused capacity of 2 CPUs on their new p5 570. Which operating systems and or features are required?()A、APV, AIX5.2ML4B、AIX5.3 or i5/OSC、APV, i5/OS, AIX5.3D、APV, AIX5.3 or SuSE9

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.  What should you do?()A、Enable logon auditing in both the new and the existing domainsB、Enable logon auditing only in the existing domainC、Enable logon auditing only in the new domainD、Enable logon auditing on only the Web server

You use a shared Windows 2000 Professional Computer. You notice, that some of your Microsoft Word documents that were on the local hard drive have been deleted. You restore the documents from a recent backup. Now, you want to be able to track all users who access your Word documents in the future. What should you do? ()A、Enable the local Group Policy for auditing object access events that are successful.B、Enable the local Group Policy for auditing object access events that are unsuccessful.C、Enable the local Group Policy for auditing process tracking events that are successful.D、Enable the local Group Policy for auditing process tracking events that are unsuccessful. E、Use Windows 2000 Explorer, to enable auditing for your files.F、Run the diskperf - y command. Use System Monitor to examine the logical I/O counter.  Restart the Computer.

There are several technicians working on various systems on a new workbench. Which of thefollowing should be reviewed to ensure all proper procedures are followed to help reduce anypossible issues?()A、MSDSB、OEMC、ESDD、EMI

Companycom is migrating from p670 systems running AIX 5.2 to p5 595 systems running AIX 5.3. They will be changing out only the system units. They will re-use the existing 61D drawers and adapters with the new p5 595 systems. What compatibility issue must be considered?() A、APV features are not supported for some legacy POWER4 adaptersB、APV will require the most current maintenance level for AIX 5.2C、APV features will require that legacy POWER4 adapters be updated with new microcodeD、The Virtual IO Server must run AIX 5.3 and the LPARs can run either AIX 5.2 or AIX 5.3

A Dell customer decided to use IBM Director and xSeries to manage their servers.  They purchased 10 IBM x336 servers and they already have 75 various Dell servers.  Which TWO steps need to be verified to be able to manage the mixed environment with IBM Director?()A、Verify that the Dell systems have TCP/IP enabledB、Verify that the systems are running the IBM Director AgentC、Verify that the managed systems are SMBIOS 2.1 and WfM 2.0 compliantD、Verify that the Dell systems have at least a 1GB of memory installedE、Install an SNMP agent on the Dell systems as IBM Director cannot manage Industry Standard non-IBM servers

A company runs very large database applications on multiple HP-UX servers. They recently upgraded the device drivers for their fibre channel HBAs and have suffered numerous crashes on several systems. Which feature of Power Systems running AIX would help eliminate this problem during pre-release testing of a new device driver?()A、Redundant VIO serversB、Storage Protection KeysC、Electronic Service AgentD、NPIV support in the kernel

A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()A、A DCE domainB、A Kerberos domainC、A PPP tunnel between the serversD、An IPSEC tunnel between the servers

New AIX systems arrive without a CDROM drive. All systems do not have the system hardware configuration. Which of the following options is the most appropriate way to install AIX on the systems?()A、Install CDROM drives or tape drives on the systems because that is the only way to install AIX.B、Install one system. Take a mksysb from the first system and resotre the mksysb to the remaining systems.C、Install one system. Mirror rootvg onto a disk from each of the remaining systems.D、Setup and NIM master and resources.

You installed Oracle Database 11g afresh. Which statements are true regarding the default audit settings in this database?() A、 The audit trail is stored in an operating system file.B、 Auditing is disabled for all privileges.C、 The audit trail is stored in the database.D、 Auditing is enabled for all privileges.E、 Auditing is enabled for certain privileges related to database security.

You are the senior systems engineer for your company. The network consists of a single Active Directory domain.  All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops.   Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network.   You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers.   You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources.   Which two actions should you take?()A、 Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.B、 Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.C、 Create a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.D、 Create a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.E、 Use System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.

You are a systems administrator responsible for deploying Windows SharePoint Services (WSS) for accessby users from an external business partner. You have installed the appropriate server role and have verified that the SharePoint Web site loads properly from the local server computer. All options are usingtheir installation default values. External users report that they cannot log on to the site. Which of thefollowing changes should you make to resolve the problem?()A、Create a new site within an existing site collection for the external users.B、Create a new site collection for the external users.C、Change the authentication mode for the Web application to Forms authentication.D、Modify the User Permissions For Web Applications settings.

You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files.D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to track all authentication attempts on Server1. What should you do?()A、Enable auditing of logon event events in Server1’s local policy.B、Enable auditing of logon event events in the Default Domain Controller Policy.C、Enable auditing of account logon event events in Server1’s local policy.D、Enable auditing of account logon event events in the Default Domain Controller Policy.

Your company has file servers located in an organizational unit named Payroll. The file servers  contain payroll files located in a folder named Payroll.    You create a GPO.   You need to track which employees access the Payroll files on the file servers.  What should you do()A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file  servers, configure Auditing for the Everyone group in the Payroll folder.B、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers,  configure Auditing for the Authenticated Users group in the Payroll folder.C、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit.  On the file servers, configure Auditing for the Authenticated Users group in the Payroll folder.D、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file  servers, configure Auditing for the Everyone group in the Payroll folder.

You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'. B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file. E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'. F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

多选题You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()ATurn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.BTurn on auditing for objects in the Local Security Policy and Select 'Object Access'.CUse Windows Explorer to turn on auditing for the specific files.DHave the administrator for domains log you on as an administrator and enable auditing for a  specific file.ETurn on auditing for objects in the Local Security Policy and Select 'Account Management'.FAllow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

单选题Companycom has a requirement to consolidate six web application servers. There is unused capacity of 2 CPUs on their new p5 570. Which operating systems and or features are required?()AAPV, AIX5.2ML4BAIX5.3 or i5/OSCAPV, i5/OS, AIX5.3DAPV, AIX5.3 or SuSE9

单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()AOn all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyBOn all client computers, implement logon auditing for all user account logonsCOn all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyDOn all domain controllers, implement logon auditing for all user account logons

单选题A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()AA DCE domainBA Kerberos domainCA PPP tunnel between the serversDAn IPSEC tunnel between the servers

单选题A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()AIPSec and Kerberos AuthenticationBSecure By Default and AIX Security ExpertCTrusted Execution and Role Based Access ControlDFirst Failure Data Capture and Storage Protection Keys

多选题Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()Aassigning a private IP address to the APBchanging the default SSID valueCconfiguring a new administrator passwordDchanging the mixed mode setting to single modeEconfiguring traffic filtering

单选题A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()AIPSec and Kerberos AuthenticationBSecure By Default and AIX Security ExpertCTrusted Execution and Role Based Access ControlDFirst Failure Data Capture and Storage Protection Keys

单选题You have just purchased a brand new router and wish to have the router prompt you through the initial configuration commands. Which router mode does this describe?()AROM Monitor modeBSETUP modeCAutoflash modeDRXBOOT modeENone of the above