While considering security, which of the following is the BEST place for a public web server accessible via the Internet? ()A、 Internal networkB、 VLANC、 VPND、 DMZ

While considering security, which of the following is the BEST place for a public web server accessible via the Internet? ()

  • A、 Internal network
  • B、 VLAN
  • C、 VPN
  • D、 DMZ

相关考题:

An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?() A. Update anti-virus, security patches, BIOS software, and then the web software.B. Update the web software, security patches, anti-virus, and then the BIOS.C. Update security patches, BIOS, web software, and then the anti-virus.D. The order does not matter, only one change at a time should be done.

Which of the following describes a secure connection over the Internet between two sites?() A. FTPB. VLANC. VPND. HTTP

Whileconsideringsecurity,whichofthefollowingistheBESTplaceforapublicwebserver accessibleviatheInternet?() A.InternalnetworkB.VLANC.VPND.DMZ

An IT manager is concerned about server administrators having to be cross-trained to work on every server. Which of the following is the BEST way to correct this problem?() A. Ensure that server baselines are documented for each server.B. Ensure that all server documentation is completed and up to date.C. Ensure that each server is accessible via a KVM over IP.D. Ensure that each server is processed through the change control board.

Which of the following authenticates a web server to the remote client in PKI?() A.FQDNB.DNS nameC.Public keyD.Private key

An IT manager is concerned about server administrators having to be cross-trained to work on everyserver. Which of the following is the BEST way to correct this problem?()A、 Ensure that server baselines are documented for each server.B、 Ensure that all server documentation is completed and up to date.C、 Ensure that each server is accessible via a KVM over IP.D、 Ensure that each server is processed through the change control board.

Which of the following authenticates a web server to the remote client in PKI?()A、FQDNB、DNS nameC、Public keyD、Private key

Which of the following describes a secure connection over the Internet between two sites?()A、FTPB、VLANC、VPND、HTTP

An administrator is creating a comprehensive backup system to backup a single web server. Which of the following is the BEST way to provide full restore?()A、 Take an image backup nightly while the server is online.B、 Take an incremental backup while the server is offline.C、 Take a monthly snapshot backup while the server is online.D、 Take a differential backup while the server is online.

An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?()A、Update anti-virus, security patches, BIOS software, and then the web software.B、Update the web software, security patches, anti-virus, and then the BIOS.C、Update security patches, BIOS, web software, and then the anti-virus.D、The order does not matter, only one change at a time should be done.

Which of the following is the BEST place to find the latest BIOS upgrade of the server system board?()A、Third-party vendorB、BIOS manufacture websiteC、Operating system manufacture websiteD、Server's manufacture website

A technician installs a local web server which is not accessible from the network. Which of the following is the local IP address that the web server should be using on the loopback adapter?()A、127.0.0.1B、172.31.146.1C、192.168.1.1D、10.1.1.1

Which of the following is the BEST place to find information about particular server software?()A、Vendor websiteB、Online support channelsC、Driver release notesD、HCL

An IT manager is concerned about server administrators having to be cross-trained to work on every server. Which of the following is the BEST way to correct this problem?()A、Ensure that server baselines are documented for each server.B、Ensure that all server documentation is completed and up to date.C、Ensure that each server is accessible via a KVM over IP.D、Ensure that each server is processed through the change control board.

A customer is considering BladeCenter H and S chassis. Which of the following is a reason to implement BladeCenter H?()A、Support for10Gb internal networkB、Support for SSDC、Support for integrated disk drivesD、Support for8Gb FC Switch Modules

A user has an application server LPAR with a physical Ethernet adapter. They want to have a database LPAR also connected to the application LPAR via virtual Ethernet. Their security policies require a firewall between the application LPAR and database LPAR. Which of the following virtual Ethernet configurations satisfies the customer’s requirements?()A、The application server,firewall,and database server on the same VLANB、The application server and firewall on one VLAN,and the database server on a second VLANC、The application server on one VLAN,and the database server and firewall on a second VLAND、The application server and firewall on one VLAN,and the firewall and database server on a second VLAN

You are the network administrator for your company. All servers run Windows Server 2003.  Twenty company employees connect to a terminal server named Server2 to run applications and to gain access to the Internet.The 20 employees report that they receive security messages while browsing Internet Web sites.  The employees report that they cannot modify the Internet Explorer security settings on their client computers while connected to Server2.You need to allow these 20 employees to modify the Internet Explorer security settings on their client computers while connected to Server2. What should you do?()A、Log on to Server2 as Administrator and add http:// to the list of trusted sites in Internet Explorer.B、Instruct the 20 employees to add http:// to the list of trusted sites in Internet Explorer on their client computers.C、Instruct the 20 employees to change the Internet Explorer privacy settings on their client computers to Low.D、Uninstall Internet Explorer Enhanced Security Configuration on Server2.

Your company named Contoso, Ltd. has a Web server named WEB1.   The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com.  The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site.  You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()A、Contoso, Ltd.B、owa.contoso.comC、WEB1D、web1.contoso.com

Your company runs Remote Desktop Services. You have a Remote Desktop Web Access (RD Web Access) server. You publish several applications on the internal networ k by using RD Web Access. You need to ensure that the published applications are accessible from the Internet via an HTTPS connection over port 443. What should you do first?()A、Use Internet Information Services (IIS) Manager to disable Forms Authentication .B、Use Internet Information Services (IIS) Manager to enable Windows Authentication.C、Install and configure the Remote Desktop Gateway (RD Gateway) role service on the RD Web Access server.D、Install and configure the Remote Desktop Connection Broker (RD Connection Broker) role service on the RD Web Access server.

You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()A、Install  a Web server certificate on WEB1B、Enable Internet Connection Firewalll (ICF) on WEB1C、Configure IIS on WEB1 to operate in IIS 5.0 isolation modeD、Install and configure the URLScan ISAPI filer on WEB1

Your network contains the servers configured as shown in the following table. Name Server role Private IP address Public IP address Server1Routing and Remote Access server192.168.1.1 131.107.0.1 Web1 Web server 192.168.1.2 ? Your company is assigned the public IP addresses from 131.107.0.1 to 131.107.0.31.You need to ensure that Web1 is accessible from the Internet by using https://131.107.0.2.What should you do from the Routing and Remote Access console?()A、From the Static Routes node, configure a static route.B、From the server properties, configure SSL Certificate Binding.C、From the NAT interface, add an address pool and a reservation.D、From the NAT interface, configure the Secure Web Server (HTTPS) service.

You have a Web server named Web1 that runs Windows Server 2003 Service Pack 2 (SP2). Users on the internal network connect to the Web site on Web1 by using the URLhttp://www.contoso.com.  From the Internet, you cannot connect to the Web site by using the URL http://www.contoso.com. You can connect to the Web site by using the public IP address of Web1.You need to ensure that users on the Internet can connect to the Web site on Web1 by using the URL http://www.contoso.com. You deploy a DNS server that is accessible on the Internet.  What should you do next?()A、Create a stub zone for contoso.com. B、Create a primary zone for contoso.com. C、Create a secondary zone for contoso.com. D、Configure a conditional forwarder for contoso.com.

单选题An IT manager is concerned about server administrators having to be cross-trained to work on everyserver. Which of the following is the BEST way to correct this problem?()A Ensure that server baselines are documented for each server.B Ensure that all server documentation is completed and up to date.C Ensure that each server is accessible via a KVM over IP.D Ensure that each server is processed through the change control board.

单选题A technician installs a local web server which is not accessible from the network. Which of the following is the local IP address that the web server should be using on the loopback adapter?()A127.0.0.1B172.31.146.1C192.168.1.1D10.1.1.1

单选题An administrator is creating a comprehensive backup system to backup a single web server. Which of the following is the BEST way to provide full restore?()A Take an image backup nightly while the server is online.B Take an incremental backup while the server is offline.C Take a monthly snapshot backup while the server is online.D Take a differential backup while the server is online.

单选题While considering security, which of the following is the BEST place for a public web server accessible via the Internet? ()A Internal networkB VLANC VPND DMZ

单选题Your company named Contoso, Ltd. has a Web server named WEB1.   The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com.  The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site.  You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()AContoso, Ltd.Bowa.contoso.comCWEB1Dweb1.contoso.com