网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A company is looking to improve upon their current remote management capabilities.  Thecompany must ensure that access is removed from all systems when a user is terminated and that administrators can remotely manage a system’s BIOS.  Which of the following remote management systems would support both these requirements?()
A

Remote management card

B

Terminal services

C

Remote desktop

D

LDAP enabled IP KVM


参考答案

参考解析
解析: 暂无解析
更多 “单选题A company is looking to improve upon their current remote management capabilities.  Thecompany must ensure that access is removed from all systems when a user is terminated and that administrators can remotely manage a system’s BIOS.  Which of the following remote management systems would support both these requirements?()A Remote management cardB Terminal servicesC Remote desktopD LDAP enabled IP KVM” 相关考题
考题 You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A. The switch name must match the workgroup name of the local network.B. The switch must be configured with an IP address and default gateway.C. The remote workstations must have access to the management VLAN of the switch.D. CDP must be enabled on the switch so that it can be located by other devices on the network.

考题 In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权). An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources. In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.A.open B.monitor C.grant D.seek

考题 In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权). An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources. In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.A.remote B.native C.controlled D.automated

考题 Which two are benefits of using remote AAA services for Cisco Nexus products? ()A、 They make it easier to manage user logins and passwords across devices.B、 They enable automated configuration backup for devices.C、 They centrally manage user attributes and permissions.D、 Local console access is never included in AAA and can be used for access when the AAA servers are down.

考题 Which of the following can be used to manage a servers BIOS remotely? ()A、 Remote desktop softwareB、 Dedicated management cardC、 Telnet sessionD、 IP KVME、 VPN

考题 The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

考题 A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()A、Remotely connect to the user's laptop and review the network configuration settingsB、Ping the web server from inside the network to ensure it is still up and running.C、Check to make sure the company's website is accessible from the Internet.D、Ensure the Ethernet cable is securely plugged into the user's laptop

考题 You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A、The switch name must match the workgroup name of the local network.B、The switch must be configured with an IP address and default gateway.C、The remote workstations must have access to the management VLAN of the switch.D、CDP must be enabled on the switch so that it can be located by other devices on the network.

考题 A company is looking to improve upon their current remote management capabilities.  Thecompany must ensure that access is removed from all systems when a user is terminated and that administrators can remotely manage a system’s BIOS.  Which of the following remote management systems would support both these requirements?()A、Remote management cardB、Terminal servicesC、Remote desktopD、LDAP enabled IP KVM

考题 A user wants to be able to receive help from a coworker that is located outside the company’s local office. Which of the following MUST be enabled to allow the user to watch and interact with the coworker simultaneously?()A、Remote DesktopB、TelnetC、Computer ManagementD、Remote Assistance

考题 Which of the following statements is true regarding implementing Live Partition Mobility on two existing POWER6 based systems?()A、The systems must use internal storage for boot purposes. B、All virtualized ethernet adapters must be numbered below 10. C、The mobile partition's network and disk access must be virtualized. D、Each system must be controlled by a different Hardware Management Console (HMC). 

考题 An administrator is looking for the "Open Restricted Shell Terminal" option on the HMC GUI. Under which panel is this option available?() A、HMC Management, but only from a local connectionB、Service Management, but only from a local connection.C、Systems Management, but only from a local connection.D、Systems Management, but only from a remote connection.

考题 You are the domain administrator for TestKing's Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. A newly installed server was added to your domain. You need to administer this server remotely from your client computer. You need to configure the new server to ensure that it can be administered remotely. What should you do?()A、Install Terminal Server Licensing. Restart the server.B、Modify the system properties for the server. Enable Remote Desktop for the server by selecting the Allow users to connect remotely to this system check box.C、Start the Remote Access Connection Manager service and then configure the service to start automatically.D、Modify your user account properties to enable you to connect to the terminal server

考题 You are planning to deploy Windows 7 to all client computers in your network.    You need to ensure that domain administrators can manage domain Group Policy objects (GPOs) from their Windows 7 computers.   What should you provide to the domain administrators?()A、Administration Tools PackB、GPOAccelerator ToolC、Local Group Policy EditorD、Remote Server Administration Tools

考题 You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?() A、Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. B、Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. C、Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. D、Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. 

考题 Your company consists of a single Active Directory domain that is configured in Windows 2000 native mode. All servers run Windows Server 2003 Service Pack 2 (SP2). You deploy a Routing and Remote Access server to provide VPN access to the network.You need to ensure that only members of a group named Sales can access the network through the VPN. The solution must minimize the administrative effort required to manage remote access.  What should you do?()A、Allow dial-in access for the user accounts of all Sales group members. B、Deny dial-in access for the user accounts of all users except the Sales group members. C、Create a remote access policy and assign the Allow - Remote Access permission. Add the Windows-Groups condition and specify the Sales group. D、Create a remote access policy and assign the Deny - Remote Access permission. Add the Windows-Groups condition and specify all Active Directory groups except for Sales.

考题 Your network consists of a single Active Directory domain. Remote Assistance is enabled on all computers. You need to ensure that you can establish Remote Assistance connections to all computers without a Remote Assistance invitation. Which group policy setting should you configure? ()A、Offer Remote AssistanceB、Solicited Remote AssistanceC、Allow users to connect remotely using Terminal ServicesD、Sets rules for remote control of Terminal Services user sessions

考题 Your company has a main office and a branch office. All branch office administrators are members of a custom management role group.The role group is configured to allow members to manage recipients.The branch office administrators are also members of The Domain Admins security group. The organization contains one Exchange Server 2010 server. You discover that the branch office administrators can manage recipients in both offices. You need to ensure that the branch office administrators can manage recipients in their assigned branch office only.What should you do?()A、Create a new management role entry for the role group.B、Create a management role assignment policy and associate the policy to the role group.C、Create a management scope and associate the scope to the role group.Set a recipient filter for the management scope.D、Remove the branch office administrators from the Domain Admins group.Add the branch office recipients to the role group.

考题 单选题Your company has a main office and a branch office. All branch office administrators are members of a custom management role group.The role group is configured to allow members to manage recipients.The branch office administrators are also members of The Domain Admins security group. The organization contains one Exchange Server 2010 server. You discover that the branch office administrators can manage recipients in both offices. You need to ensure that the branch office administrators can manage recipients in their assigned branch office only.What should you do?()A Create a new management role entry for the role group.B Create a management role assignment policy and associate the policy to the role group.C Create a management scope and associate the scope to the role group.Set a recipient filter for the management scope.D Remove the branch office administrators from the Domain Admins group.Add the branch office recipients to the role group.

考题 单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB On all client computers, implement logon auditing for all user account logonsC On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD On all domain controllers, implement logon auditing for all user account logons

考题 单选题Which of the following statements is true regarding implementing Live Partition Mobility on two existing POWER6 based systems? ()A  The systems must use internal storage for boot purposes.B  All virtualized Ethernet adapters must be numbered below 10.C  The mobile partition’s network and disk access must be virtualized.D  Each system must be controlled by a different Hardware Management Console (HMC).

考题 单选题A company is looking to improve upon their current remote management capabilities.  Thecompany must ensure that access is removed from all systems when a user is terminated and that administrators can remotely manage a system’s BIOS.  Which of the following remote management systems would support both these requirements?()A Remote management cardB Terminal servicesC Remote desktopD LDAP enabled IP KVM

考题 单选题Your network consists of a single Active Directory domain. Remote Assistance is enabled on all computers. You need to ensure that you can establish Remote Assistance connections to all computers without a Remote Assistance invitation. Which group policy setting should you configure? ()A Offer Remote AssistanceB Solicited Remote AssistanceC Allow users to connect remotely using Terminal ServicesD Sets rules for remote control of Terminal Services user sessions

考题 多选题Which two are benefits of using remote AAA services for Cisco Nexus products? ()AThey make it easier to manage user logins and passwords across devices.BThey enable automated configuration backup for devices.CThey centrally manage user attributes and permissions.DLocal console access is never included in AAA and can be used for access when the AAA servers are down.

考题 单选题You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?()A Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. B Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. C Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. D Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. 

考题 单选题You are the domain administrator for TestKing's Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. A newly installed server was added to your domain. You need to administer this server remotely from your client computer. You need to configure the new server to ensure that it can be administered remotely. What should you do?()A Install Terminal Server Licensing. Restart the server.B Modify the system properties for the server. Enable Remote Desktop for the server by selecting the Allow users to connect remotely to this system check box.C Start the Remote Access Connection Manager service and then configure the service to start automatically.D Modify your user account properties to enable you to connect to the terminal server

考题 单选题A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()A Remotely connect to the user's laptop and review the network configuration settingsB Ping the web server from inside the network to ensure it is still up and running.C Check to make sure the company's website is accessible from the Internet.D Ensure the Ethernet cable is securely plugged into the user's laptop

考题 单选题Your company consists of a single Active Directory domain that is configured in Windows 2000 native mode. All servers run Windows Server 2003 Service Pack 2 (SP2).  You deploy a Routing and Remote Access server to provide VPN access to the network.You need to ensure that only members of a group named Sales can access the network through the VPN. The solution must minimize the administrative effort required to manage remote access.  What should you do?()A Allow dial-in access for the user accounts of all Sales group members.B Deny dial-in access for the user accounts of all users except the Sales group members.C Create a remote access policy and assign the Allow - Remote Access permission. Add the Windows-Groups condition and specify the Sales group.D Create a remote access policy and assign the Deny - Remote Access permission. Add the Windows-Groups condition and specify all Active Directory groups except for Sales.