网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
While considering security, which of the following is the BEST place for a public web server accessible via the Internet? ()
A
Internal network
B
VLAN
C
VPN
D
DMZ
参考答案
参考解析
解析:
暂无解析
更多 “单选题While considering security, which of the following is the BEST place for a public web server accessible via the Internet? ()A Internal networkB VLANC VPND DMZ” 相关考题
考题
Which of the following is BEST for providing network security?()
A.FirewallB.DMZC.SwitchD.IDS
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
考题
Which of the following are benefits of VLANs?()
A. They increase the size of collision domains.B. They allow logical grouping of users by function.C. They can enhance network security.D. They increase the size of broadcast domains while decreasing the number of collision domains.E. They increase the number of broadcast domains while decreasing the size of the broadcast domains.F. They simplify switch administration.
考题
While considering security, which of the following is the BEST place for a public web server accessible via the Internet? ()A、 Internal networkB、 VLANC、 VPND、 DMZ
考题
When considering SAN to SAN replication between sites, which of the following is the MOST important concern?()A、 WAN link speedB、 Block sizeC、 Disk sizeD、 File system type
考题
Which of the following are benefits of VLANs?()A、They increase the size of collision domains.B、They allow logical grouping of users by function.C、They can enhance network security,D、The increase the size of broadcast domains while decreasing the number of the broadcast domains.E、The increase the number of broadcast domains while decreasing the size of the broadcast domains.F、They simplify switch administration.
考题
Which of the following a true statements regarding the use of VLANs to segment anetwork? ()A、They increase the size of collision domainsB、They allow logical grouping of users by function.C、They can enhance network security.D、They increase the size of the broadcast domain while decreasing the number of collision domains.E、They increase the number of broadcast domains while decreasing the size of the broadcast domains.F、They simplify switch administration.
考题
Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS
考题
Which of the following security threats involves making phone calls?()A、PhishingB、VishingC、DDoSD、Xmas attack
考题
Which of the following provides the BEST security and accountability for a Data Center?()A、Entry loggingB、Combination locksC、Card keysD、Dead bolts
考题
A restaurant is considering placing a server to run their restaurant software in the kitchen of the restaurant. Which of the following environmental considerations is of MOST concern?()A、TemperatureB、PowerC、HumidityD、Dust
考题
Which of the following does not affect security on a wireless access point?()A、EncryptionB、DHCPC、PasswordD、SSID
考题
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals
考题
Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
考题
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A、fwtmp /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o
考题
Which of the following options should be used to obtain the latest security patches for AIX?()A、FixDistB、The Bonus Pack CDC、OPSD、The Security Maintenance CD
考题
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user
考题
多选题Which of the following are examples of physical security measures?()APolicies and proceduresBEncryptionCLocked doorsDSecurity personnelEBackup tapes
考题
单选题The ISPS Code consists of a mandatory section-Part A, which shows()A
the detailed security-related requirementsB
guidelines to meet security-related requirementsC
the detailed security-related requirements and the guidelines to meet themD
how to run a shipping company considering the potential terrorism action
考题
多选题Which of the following a true statements regarding the use of VLANs to segment anetwork? ()AThey increase the size of collision domainsBThey allow logical grouping of users by function.CThey can enhance network security.DThey increase the size of the broadcast domain while decreasing the number of collision domains.EThey increase the number of broadcast domains while decreasing the size of the broadcast domains.FThey simplify switch administration.
热门标签
最新试卷