单选题An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()ANIPSBHoneypotCDMZDNIDS

单选题
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
A

NIPS

B

Honeypot

C

DMZ

D

NIDS


参考解析

解析: 暂无解析

相关考题:

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS

Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A. net viewB. ipconfigC. digD. ifconfig

Using network monitoring tools would allow an administrator to do which of the following?() A. Configure offline devicesB. Examine performance issuesC. Install additional software and updatesD. View syslog events

An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()A. WMIB. RISC. DNSD. SNMPE. SMTP

Anadministratorwantstoproactivelycollectinformationonattackersandtheirattemptedmethodsofgainingaccesstotheinternalnetwork.Whichofthefollowingwouldallowtheadministratortodothis?() A.NIPSB.HoneypotC.DMZD.NIDS

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network.Which of the following would allow you accomplish this?()A.STPB.GVRPC.SNMPD.VTPE.DHCP

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption

Using network monitoring tools would allow an administrator to do which of the following?()A、Configure offline devicesB、Examine performance issuesC、Install additional software and updatesD、View syslog events

Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()A、 VLANB、 KVMC、 IP KVMD、 RAID

An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A、Disable SSIDB、WPAC、MAC filteringD、RAS

An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()A、WMIB、RISC、DNSD、SNMPE、SMTP

Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A、net viewB、ipconfigC、digD、ifconfig

An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS

An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()A、auditB、syslogC、TCBD、sysck

单选题An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()AauditBsyslogCTCBDsysck

单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()Anet viewBipconfigCdigDifconfig

单选题An administrator has encountered an error while patching a virtualized guest machine. Which of the following technologies would allow the administrator to restore to a pre-patched state the FASTEST?()ACloningBBare Metal RestoreCOS RestoreDSnapshot

单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP

单选题Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()A VLANB KVMC IP KVMD RAID

单选题Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()AWPA-PSK encryptionBSSID broadcastCPort forwardingDMAC filtering

单选题Using network monitoring tools would allow an administrator to do which of the following?()AConfigure offline devicesBExamine performance issuesCInstall additional software and updatesDView syslog events

单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()ADisable SSIDBWPACMAC filteringDRAS

单选题Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()ANetwork managementBProtocol analyzerCNetwork monitoringDSystem diagnostic

单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address.  Which of the following tools would allow the administrator to test name resolution?()A net viewB ipconfigC digD ifconfig

单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()AWEP encryptionBChannel rotationCDisable SSIDDWPA encryption

多选题An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()AWMIBRISCDNSDSNMPESMTP