The use of network( ),systems that effectively isolate an organizations internal network structure from an( )network, such as the INTERNET is becoming increasingly popular. These firewall systems typically act as application-layer( )between networks, usually offering controlled TELNET, FTP, and SMTP access. With the emergence of more sophisticated( )layer protocols designed to facilitate global information discovery , there exists a need to provide a general ( )for these protocols to transparently and securely traverse a firewall.A.safeguardsB.firewallsC.routersD.switches A.exteriorB.InternalC.centreD.middle A.hostsB.routersC.gatewaysD.officesA.networkB.sessionC.transmissionD.application A.frameworkB.internetworkC.computerD.application
The use of network( ),systems that effectively isolate an organization&39;s internal network structure from an( )network, such as the INTERNET is becoming increasingly popular. These firewall systems typically act as application-layer( )between networks, usually offering controlled TELNET, FTP, and SMTP access. With the emergence of more sophisticated( )layer protocols designed to facilitate global information discovery , there exists a need to provide a general ( )for these protocols to transparently and securely traverse a firewall.
A.safeguardsB.firewallsC.routersD.switches A.exteriorB.InternalC.centreD.middle A.hostsB.routersC.gatewaysD.officesA.networkB.sessionC.transmissionD.application A.frameworkB.internetworkC.computerD.application
相关考题:
You must segement your internal 192.168.1.0/24 network into a minimun of 12 subnet, each containing a minimun of 12 hosts. Which network mask do you use?() A. /26B. /27C. /28D. /29
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
What is the principle reason to use a private IP address on an internal network?() A. Subnet strategy for private companies.B. Manage and scale the growth of the internal network.C. Conserve public IP addresses so that we do not run out of them.D. Allow access reserved to the devices.
To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise network. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(71). Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(72) activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access has been prohibitive. Fifty-two percent of surveyed CISOs stated that they currently use a moat and castle" security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch(73) of service attacks or steal(74) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with(75) and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.A.damageableB.susceptibleC.vulnerableD.changeable
Secure Shell (SSH) is a cryptographic network protocol for ( ) remote login and other secure network services over an(请作答此空)network.The standard( )port for SSH is 22. The best known example application is for remote login to computer systems by users.SSH provides a secure channel over an insecured network in a( ) architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.The most visible application of the protocol is for access to shell accounts on( )operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.A.secureB.insecureC.internetD.internal
work(请作答此空),systems that effectively isolate an organization's internal network structure from an ( ) network, such as the INTERNET is becoming increasingly popular. These firewall systems typically act as application-layer( )between networks, usually offering controlled TELNET, FTP, and SMTP access. With the emergence of more sophisticated( )layer protocols designed to facilitate global information discovery , there exists a need to provide a general ( )for these protocols to transparently and securely traverse a firewall.A.safeguardsB.firewallsC.routersD.switches
What is the principle reason to use a private IP address on an internal network?()A、Subnet strategy for private companies.B、Manage and scale the growth of the internal network.C、Conserve public IP addresses so that we do not run out of them.D、Allow access reserved to the devices.
To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks.These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(6) .Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(7)activity. For many organizations, however,the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle's security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch (8) of service attacks or steal (9) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (10) and worms acquired from unprotected public networks. Hackers masquer-ading as internal users can take advantage of weak internal security to gain access to confidential information.空白处(9)应选择()A、reservedB、confidentialC、completeD、mysterious
Which of the following statements is true regarding implementing Live Partition Mobility on two existing POWER6 based systems?()A、The systems must use internal storage for boot purposes. B、All virtualized ethernet adapters must be numbered below 10. C、The mobile partition's network and disk access must be virtualized. D、Each system must be controlled by a different Hardware Management Console (HMC).
A customer is buying 10 new Power 720 servers and will integrate them into their existing data center which also has two Power 595s and five Power 750s, taking the total number of systems to 17. All currently installed systems are managed by a single HMC.All the machines will have dual VIO Servers for redundancy, and 10 client LPARs. How can they manage the new machines for the least cost?()A、Purchase a second HMC and use this to manage the new servers.B、Connect all of the new servers to the existing private HMC network.C、Configure a second private network on their existing HMC for the new servers.D、Connect 9 of the new servers to the existing HMC and use Integrated Virtualization Manager on the 10th.
You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts. Which network mask do you use?()A、/26B、/27C、/28D、/29
All servers and client computers in your company are configured to use WINS for name resolution. The internal network is separated from a perimeter network (also known as DMZ) by a third-party firewall. Firewall rules do not allow name resolution between the internal network and the perimeter network. You move a Windows Server 2003 server named Server1 to the perimeter network. You need to ensure that all computers on the internal network can connect to Server1 by name. What should you do?()A、 Create an LMHOSTS file on Server1.B、 Create a static WINS entry for Server1.C、 Configure Server1 to use Broadcast (B-node) mode.D、 Configure Server1 to use Peer-to-Peer (P-node) mode.
You are a network administrator for Alpine Ski House. The internal network has an Active Directory-integrated zone for the alpineskihouse.org domain. Computers on the internal network use the Active Directory-integrated DNS service for all host name resolution. The Alpine Ski House Web site and DNS server are hosted at a local ISP. The public Web site for Alpine Ski House is accessed at www.alpineskihouse.com. The DNS server at the ISP hosts the alpineskihouse.com domain. To improve support for the Web site, your company wants to move the Web site and DNS service from the ISP to the company’s perimeter network. The DNS server on the perimeter network must contain only the host (A) resource records for computers on the perimeter network. You install a Windows Server 2003 computer on the perimeter network to host the DNS service for the alpineskihouse.com domain. You need to ensure that the computers on the internal network can properly resolve host names for all internal resources, all perimeter resources, and all Internet resources. Which two actions should you take? ()A、 On the DNS server that is on the perimeter network, install a primary zone for alpineskihouse.com.B、 On the DNS server that is on the perimeter network, install a stub zone for alpineskihouse.com.C、 Configure the DNS server that is on the internal network to conditionally forward lookup requests to the DNS server that is on the perimeter network.D、 Configure the computers on the internal network to use one of the internal DNS servers as the preferred DNS server. Configure the the TCP/IP settings on the computers on the internal network to use the DNS server on the perimeter network as an alternate DNS server.E、 On the DNS server that is on the perimeter network, configure a root zone.
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()A、The best option is to use port 3309 and 25 from the internal network to the perimeter network.B、The best option is to use port 3309 and 636 from the internal network to the perimeter network.C、The best option is to use port 50636 and 25 from the internal network to the perimeter network.D、The best option is to use port 50636 and 135 from the internal network to the perimeter network.
You are designing the DNS name resolution strategy for the internal network. What should you do?()A、Configure all internal DNS servers to use the default root hints.B、Disable recursion on the DNS server in Seattle. Configure the Seattle DNS to use Dallas DNS server as a forwarder.C、Create a root zone on the DNS server in Dallas. Configure the Seattle DNS server to use the Dallas DNS server as a forwarder.D、Create a root zone on the DNS server in both Dallas and Seattle.
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()AWEP encryptionBChannel rotationCDisable SSIDDWPA encryption
单选题Which of the following statements is true regarding implementing Live Partition Mobility on two existing POWER6 based systems? ()A The systems must use internal storage for boot purposes.B All virtualized Ethernet adapters must be numbered below 10.C The mobile partition’s network and disk access must be virtualized.D Each system must be controlled by a different Hardware Management Console (HMC).
单选题You must segement your internal 192.168.1.0/24 network into a minimun of 12 subnet, each containing a minimun of 12 hosts. Which network mask do you use?()A/26B/27C/28D/29
单选题You need to design a patch management strategy that meets business requirements. What should you do?()AInstall Systems Management Server (SMS) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the SMS client software to all computers in the domainBInstall Microsoft Operations Manager (MOM) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the MOM client software to all computers in the domainCInstall Software Update Services (SUS) on a Web server, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the Web server. Ensure that users restart their client computers dailyDInstall Software Update Services (SUS) on a domain controller, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the domain controller. Ensure that users restart their client computers daily
单选题You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The network contains an internal root certification authority (CA).Users on the network use Outlook Anywhere.A Client Access server uses a wildcard certificate issued by a trusted third-party root CA.You need to ensure that users can send and receive encrypted e-mail messages by using S/MIME. What should you do?()AInstruct all users to import the third-party root CA certificate.BImport the internal root CA certificate to the Client Access server.CInstruct all users to import the internal root CA certificate.DIssue a certificate to each user from the internal root CA
单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()AThe best option is to use port 3309 and 25 from the internal network to the perimeter network.BThe best option is to use port 3309 and 636 from the internal network to the perimeter network.CThe best option is to use port 50636 and 25 from the internal network to the perimeter network.DThe best option is to use port 50636 and 135 from the internal network to the perimeter network.
单选题An organization has Exchange server 2010.Network contains internal root Certification Authorization (CA).Users on network use Outlook Anywhere.A CAS server uses a wildcard certificate issued by a trusted third party root CA.You need to ensure that users can send and receive encrypted e-mail messages by using S/MIME.What should you do?()AInstruct all users to import the 3d-party root CA certificationBConfigure CAS server to use a certificate issued by a third-party CACInstruct all users to import an internal root CA certificateDDeploy Outlook Web Access with the S/MIME control to the client system
单选题You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts. Which network mask do you use?()A/26B/27C/28D/29
单选题All servers and client computers in your company are configured to use WINS for name resolution. The internal network is separated from a perimeter network (also known as DMZ) by a third-party firewall. Firewall rules do not allow name resolution between the internal network and the perimeter network. You move a Windows Server 2003 server named Server1 to the perimeter network. You need to ensure that all computers on the internal network can connect to Server1 by name. What should you do?()A Create an LMHOSTS file on Server1.B Create a static WINS entry for Server1.C Configure Server1 to use Broadcast (B-node) mode.D Configure Server1 to use Peer-to-Peer (P-node) mode.