网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()
A
port 443 - SSL connection
B
port 8080 ?http
C
port 22 - SSH CLI
D
port 427 - SLP connection
参考答案
参考解析
解析:
暂无解析
更多 “单选题A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()A port 443 - SSL connection B port 8080 ?http C port 22 - SSH CLI D port 427 - SLP connection” 相关考题
考题
Which type of cable should be used to make a connection between the Fa0/0 port on a router and the Fa0/0 port switch?A.Rollover cableB.Console cableC.Crossover cableD.Straight-through cableE.Serial cable
考题
Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()
A. Network layer firewallB. Stateful inspection firewallC. Zone aware firewallD. Application layer firewall
考题
A customer has a BladeCenter H chassis with a single AMM. The AMM is defective. Which of the following is the method to backup the existing AMM so the new AMM automaticlally picks up the configuration? ()A、Back up the AMM configuration to a file B、Back up the AMM configuration to the chassis C、Back up the AMM using IBM Systems Director D、Back up the AMM using Tivoli Storage Manager
考题
On the WLSE, which of the following fault policies would be used to verify that access to thecommand-line interface of the access point is secure?()A、registration errorB、authentication failures thresholdC、HTTP disabledD、Telnet disabled
考题
Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A、Network layer firewallB、Stateful inspection firewallC、Zone aware firewallD、Application layer firewall
考题
Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN
考题
A storage specialist is assessing a customer’s tape backup environment. Which of the following questions would be the most appropriate question to identify the customer’s environment?()A、Has there been any recent loss of data?B、How many tape drives are in the Library?C、What tape technology is currently being used?D、What software is being used for restoring the data?
考题
A banking customer orders three IBM BladeCenter E chassis and thirty-four HS22 blades. The customer wants to fully populate the chassis with blades where possible. Which of the following is the minimum number of power cables required to provide redundancy?()A、6B、8C、10D、12
考题
A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()A、port 443 - SSL connection B、port 8080 ?http C、port 22 - SSH CLI D、port 427 - SLP connection
考题
A banking customer orders three IBM BladeCenter E chassis and thirty-four HS22 blades. Theustomer wants to fully populate the chassis with blades where possible. Which of the following is the minimum number of power cables required to provide redundancy? ()A、12 B、10 C、8 D、6
考题
Which type of cable should be used to make a connection between the Fa0/0 port on a router and the Fa0/0 port switch?()A、Rollover cableB、Console cab leC、Crossover cableD、Straight-through cableE、Serial cable
考题
A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()A、RouteB、IfconfigC、NetstatD、Nslookup
考题
A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()A、Upgrade the operating system to Windows XP Home.B、Have the customer convert to NTFS and enable data encryption.C、Tell the customer that a laptop should not be used for classified data.D、Configure the wireless adapter to only connect to secure networks.
考题
Which of the following traffic types would a network layer firewall be unable to filter?()A、SMTP trafficB、ICMP messagesC、HTTP trafficD、Email sender verification
考题
Which of the following tools can be used to securely connect to a remote system?()A、RCMDB、SSHC、TELNETD、HTTP
考题
Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor
考题
Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server. Which type of connection should you configure? ()A、IPSECB、L2TPC、PPTPD、SSTP
考题
单选题A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()A
Update the antivirus applicationB
Install critical update security patchesC
Adjust the software firewall settingsD
Replace the current antivirus program
考题
单选题A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()A
RouteB
IfconfigC
NetstatD
Nslookup
考题
单选题A customer has a BladeCenter H chassis with a single AMM. The AMM is defective. Which of the following is the method to backup the existing AMM so the new AMM automaticlally picks up the configuration? ()A
Back up the AMM configuration to a file B
Back up the AMM configuration to the chassis C
Back up the AMM using IBM Systems Director D
Back up the AMM using Tivoli Storage Manager
考题
单选题A banking customer orders three IBM BladeCenter E chassis and thirty-four HS22 blades. The customer wants to fully populate the chassis with blades where possible. Which of the following is the minimum number of power cables required to provide redundancy?()A
6B
8C
10D
12
考题
单选题A banking customer orders three IBM BladeCenter E chassis and thirty-four HS22 blades. Theustomer wants to fully populate the chassis with blades where possible. Which of the following is the minimum number of power cables required to provide redundancy? ()A
12 B
10 C
8 D
6
考题
单选题A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()A
Upgrade the operating system to Windows XP Home.B
Have the customer convert to NTFS and enable data encryption.C
Tell the customer that a laptop should not be used for classified data.D
Configure the wireless adapter to only connect to secure networks.
考题
单选题Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server. Which type of connection should you configure? ()A
IPSECB
L2TPC
PPTPD
SSTP
考题
单选题A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()A
port 443 - SSL connection B
port 8080 ?http C
port 22 - SSH CLI D
port 427 - SLP connection
考题
单选题Which of the following would be used to monitor unauthorized access to data files?()A
Performance Log and AlertsB
Event ViewerC
Security Configuration and AnalysisD
IP Security Monitor
考题
单选题Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A
Network layer firewallB
Stateful inspection firewallC
Zone aware firewallD
Application layer firewall
考题
单选题A storage specialist is assessing a customer’s tape backup environment. Which of the following questions would be the most appropriate question to identify the customer’s environment?()A
Has there been any recent loss of data?B
How many tape drives are in the Library?C
What tape technology is currently being used?D
What software is being used for restoring the data?
热门标签
最新试卷