网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()
A

port 443 - SSL connection 

B

port 8080 ?http 

C

port 22 - SSH CLI 

D

port 427 - SLP connection


参考答案

参考解析
解析: 暂无解析
更多 “单选题A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()A port 443 - SSL connection B port 8080 ?http C port 22 - SSH CLI D port 427 - SLP connection” 相关考题
考题 Which type of cable should be used to make a connection between the Fa0/0 port on a router and the Fa0/0 port switch?A.Rollover cableB.Console cableC.Crossover cableD.Straight-through cableE.Serial cable

考题 Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?() A. Network layer firewallB. Stateful inspection firewallC. Zone aware firewallD. Application layer firewall

考题 A customer has a BladeCenter H chassis with a single AMM.  The AMM is defective. Which of the following is the method to backup the existing AMM so the new AMM automaticlally picks up the configuration? ()A、Back up the AMM configuration to a file B、Back up the AMM configuration to the chassis C、Back up the AMM using IBM Systems Director D、Back up the AMM using Tivoli Storage Manager

考题 On the WLSE, which of the following fault policies would be used to verify that access to thecommand-line interface of the access point is secure?()A、registration errorB、authentication failures thresholdC、HTTP disabledD、Telnet disabled

考题 Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A、Network layer firewallB、Stateful inspection firewallC、Zone aware firewallD、Application layer firewall

考题 Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN

考题 A storage specialist is assessing a customer’s tape backup environment. Which of the following questions would be the most appropriate question to identify the customer’s environment?()A、Has there been any recent loss of data?B、How many tape drives are in the Library?C、What tape technology is currently being used?D、What software is being used for restoring the data?

考题 A banking customer orders three IBM BladeCenter E chassis and thirty-four HS22 blades. The customer wants to fully populate the chassis with blades where possible. Which of the following is the minimum number of power cables required to provide redundancy?()A、6B、8C、10D、12

考题 A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()A、port 443 - SSL connection B、port 8080 ?http C、port 22 - SSH CLI D、port 427 - SLP connection

考题 A banking customer orders three IBM BladeCenter E chassis and thirty-four HS22 blades. Theustomer wants to fully populate the chassis with blades where possible. Which of the following is the minimum number of power cables required to provide redundancy? ()A、12 B、10 C、8 D、6

考题 Which type of cable should be used to make a connection between the Fa0/0 port on a router and the Fa0/0 port switch?()A、Rollover cableB、Console cab leC、Crossover cableD、Straight-through cableE、Serial cable

考题 A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()A、RouteB、IfconfigC、NetstatD、Nslookup

考题 A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()A、Upgrade the operating system to Windows XP Home.B、Have the customer convert to NTFS and enable data encryption.C、Tell the customer that a laptop should not be used for classified data.D、Configure the wireless adapter to only connect to secure networks.

考题 Which of the following traffic types would a network layer firewall be unable to filter?()A、SMTP trafficB、ICMP messagesC、HTTP trafficD、Email sender verification

考题 Which of the following tools can be used to securely connect to a remote system?()A、RCMDB、SSHC、TELNETD、HTTP

考题 Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor

考题 Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server.  Which type of connection should you configure? ()A、IPSECB、L2TPC、PPTPD、SSTP

考题 单选题A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()A Update the antivirus applicationB Install critical update security patchesC Adjust the software firewall settingsD Replace the current antivirus program

考题 单选题A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()A RouteB IfconfigC NetstatD Nslookup

考题 单选题A customer has a BladeCenter H chassis with a single AMM.  The AMM is defective. Which of the following is the method to backup the existing AMM so the new AMM automaticlally picks up the configuration? ()A Back up the AMM configuration to a file B Back up the AMM configuration to the chassis C Back up the AMM using IBM Systems Director D Back up the AMM using Tivoli Storage Manager

考题 单选题A banking customer orders three IBM BladeCenter E chassis and thirty-four HS22 blades. The customer wants to fully populate the chassis with blades where possible. Which of the following is the minimum number of power cables required to provide redundancy?()A 6B 8C 10D 12

考题 单选题A banking customer orders three IBM BladeCenter E chassis and thirty-four HS22 blades. Theustomer wants to fully populate the chassis with blades where possible. Which of the following is the minimum number of power cables required to provide redundancy? ()A 12 B 10 C 8 D 6

考题 单选题A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()A Upgrade the operating system to Windows XP Home.B Have the customer convert to NTFS and enable data encryption.C Tell the customer that a laptop should not be used for classified data.D Configure the wireless adapter to only connect to secure networks.

考题 单选题Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server.  Which type of connection should you configure? ()A IPSECB L2TPC PPTPD SSTP

考题 单选题A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()A port 443 - SSL connection B port 8080 ?http C port 22 - SSH CLI D port 427 - SLP connection

考题 单选题Which of the following would be used to monitor unauthorized access to data files?()A Performance Log and AlertsB Event ViewerC Security Configuration and AnalysisD IP Security Monitor

考题 单选题Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A Network layer firewallB Stateful inspection firewallC Zone aware firewallD Application layer firewall

考题 单选题A storage specialist is assessing a customer’s tape backup environment. Which of the following questions would be the most appropriate question to identify the customer’s environment?()A Has there been any recent loss of data?B How many tape drives are in the Library?C What tape technology is currently being used?D What software is being used for restoring the data?