单选题An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()AMultilayer switchBCSUCProxy serverDIDS

单选题
An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()
A

Multilayer switch

B

CSU

C

Proxy server

D

IDS


参考解析

解析: 暂无解析

相关考题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode

A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?()A. Change the default administrator passwordB. Change the IP range of the wireless networkC. Hide the SSIDD. Disable WEP

Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A. net viewB. ipconfigC. digD. ifconfig

An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()A.NATB.DynamicC.SubnettingD.Static

What must an administrator do to prevent new telnet users from connecting to the system?() A.rmdev -l /dev/ptsB.touch /etc/nologinC.chdev -l sys0 -a nologinD.chuser -a login=false ALL

Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()A、 VLANB、 KVMC、 IP KVMD、 RAID

A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA、Power UsersB、UsersC、GuestsD、Administrato

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?()A、Change the default administrator passwordB、Change the IP range of the wireless networkC、Hide the SSIDD、Disable WEP

Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address.  Which of the following tools would allow the administrator to test name resolution?()A、 net viewB、 ipconfigC、 digD、 ifconfig

A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()A、remove all other groups from the systemB、run the command mkuser -default "GROUP=database"C、change the default group in /usr/lib/security/mkuser.defaultD、edit /etc/security/group to move all users to the database stanza

What must an administrator do to prevent new telnet users from connecting to the system?()A、rmdev -l /dev/ptsB、touch /etc/nologinC、chdev -l sys0 -a nologinD、chuser -a login=false ALL

An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A、/tmpB、/var/preserveC、/var/tmp/$USERD、$HOME/.vi

You administer a Windows 2000 network at Company's main office.  You have purchased 15 new Windows 2000 Professional computers that will be used in the finance department. The new computers are equipped with a fax modem. You install the Fax service with the default values and settings on each computer. You want to prevent users from using the Control Panel to remove the fax printer. What should you do?()A、Remove the users’ account from the DACL for the fax printer.B、Edit the local Computer Policy to prevent users from using Printers in Control Panel.C、Edit the local Computer Policy. Configure the Prevent deletion of printers setting to enabled.D、Edit the local Computer Policy. Configure the Prevent addition of printers setting to disabled

You are a system administrator at Company. The network includes 100 Windows 2000 Professional computers. A user named Peter wants to share a local printing device directly connected to his computer. Peter needs to share this device among three groups:  Engineering, Accounting, and Operations. Peter wants to delegate printer administration to one print administrator from each group. Each print administrator must be able to delete print jobs generated by their own group on the print device. They should not be able to delete print jobs from other groups. You want to configure Peter’s client computer to support these requirements.  What should you do? ()A、 Create a single shared printer to be used by all three groups.Allow each print administrator Manage Documents permission. B、 Create a separate shared printer for each group. For each shared printer, allow the respective      print administrator Manage Documents permission. C、 Create a single shared printer to be used by all three groups. Add the print administrator’s user      account from each group to the Power Users group on Peter’s client computer. D、 Create a separate shared printer for each group. Add the print administrator’s user account  from each group to the Power Users group on Peter’s client computer.

You install Microsoft Windows Vista on a computer.  You will share the computer with another user.  You need to prevent the user from making unauthorized changes to the computer.  What should you do? ()A、Add the user to the Guests group.B、Create a standard user account for the user.C、Create an administrator account for the user.D、Add the user to the Remote Desktop Users group.

单选题A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()Aremove all other groups from the systemBrun the command mkuser -default GROUP=databaseCchange the default group in /usr/lib/security/mkuser.defaultDedit /etc/security/group to move all users to the database stanza

单选题An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()AMultilayer switchBCSUCProxy serverDIDS

单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address.  Which of the following tools would allow the administrator to test name resolution?()A net viewB ipconfigC digD ifconfig

单选题Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()A VLANB KVMC IP KVMD RAID

单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()ADisable SSIDBWPACMAC filteringDRAS

单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()ABPDUBPort securityCRSTPDSTPEVTPFBlocking mode

单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()AIPBICMPCTCPDUDP

单选题A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsAPower UsersBUsersCGuestsDAdministrato

单选题You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()AUpgrade the switchesBConfigure BPDU guardCConfigure VLAN access listsDConfigure port securityEConfigure Dynamic ARP inspection

单选题A system administrator has filesystems that should not be mounted during system startup. How can the system administrator prevent the /data filesystem from being mounted during subsequent boots?()Amount -no /dataBchfs -A no /dataCmount -t nfs /dataDchfs -a type=nfs /data

单选题An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?()ANATBDynamicCSubnettingDStatic