网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A small business has had unauthorized people enter their server room and damage their servers.Which of the following locks for the door would BEST prevent unauthorized people from accessing the server room?()

  • A、Biometric
  • B、Keypad
  • C、Barcode
  • D、Key lock

参考答案

更多 “A small business has had unauthorized people enter their server room and damage their servers.Which of the following locks for the door would BEST prevent unauthorized people from accessing the server room?()A、BiometricB、KeypadC、BarcodeD、Key lock” 相关考题
考题 The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

考题 Asmallbusinesshashadunauthorizedpeopleentertheirserverroomanddamagetheirservers.WhichofthefollowinglocksforthedoorwouldBESTpreventunauthorizedpeoplefromaccessing theserverroom?() A.BiometricB.KeypadC.BarcodeD.Keylock

考题 Why would a network administrator configure port security on a switch?() A. To prevent unauthorized Telnet access to a switch port.B. To limit the number of Layer 2 broadcasts on a particular switch port.C. To prevent unauthorized hosts from accessing the LAN.D. To protect the IP and MAC address of the switch and associated ports.E. To block unauthorized access to the switch management interfaces over common TCP ports.

考题 Why would a network administrator configure port security on a switch()。 A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports

考题 At the University of Kansas art museum,scientists tested the effect of different colored walls on two groups of visitors to an exhibit of paintings.For the first group the room was painted white;for the second,dark brown.Movement of each group was followed by an electrical equipment under the carpet.The experiment showed that those who entered the dark brown walked more quickly,covered more area,and spent less time in the room than people in the white one.Dark brown made people more active,but the activity ended sooner.Not only the choice of colors but also the general appearance of a room affects those inside.Another experiment presented people with photographs of faces whose energy was to be commented.Three groups of people were used;each was shown the same photos,but each group was in an ordinary room—a nice office.The third was in a tastefully designed living room with carpeting.Results showed that the people in the beautiful room tend to give higher marks to the faces than those in the ugly room did.Other studies that students do better on tests taken in comfortable room than in ordinary-looking or ugly rooms. Which of the following is the best expression of the main idea of this passage A.People in beautiful rooms tend to give higher marks to photos of faces than people in ugly rooms B.The color and general appearance of a room have a deeper effect on the behavior of the people in it C.The University of Kansas has studied the effects of the color of room on people’s behavior D.Beautifully furnished,light-coloured rooms make people more comfortable than ugly,dark rooms

考题 A technician at a small business goes into the server room to perform maintenance on a server and notices it is very hot and audible alarms are going off. The technician is unsure of how to remedy the situation. Which of the following should the technician do?()A、Turn off all the equipment in the server closetB、Install a fan in the server closetC、Turn off the power to the server closetD、Follow escalation procedures for emergencies

考题 Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

考题 When a technician left the server room Monday evening everything was operational. When the technician returned Tuesday morning, the front bezel was off of the mail server, and it had been powered off. Which of the following should be checked FIRST?()A、TCP/IP settingsB、RAID configurationC、Whether the power cord is attachedD、Server room access log

考题 An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

考题 Which of the following should be included in the network diagram?()A、Server room access logB、Server typesC、OEM contact informationD、Temperature reading

考题 Which of the following is the BEST reason to label servers within the server room?()A、 To ensure server documentation is kept up to dateB、 To ensure administrators avoid duplicate server namesC、 To ensure server power requirements are metD、 To ensure the servers can be identified quickly and easily

考题 A small business currently has a server room with a large cooling system that is appropriate for its size. The location of the server room is the top level of a building.  The server room is filled with incandescent lighting that needs to continuously stay on for security purposes. Which of the following would be the MOST cost-effective way for the company to reduce the server rooms energy footprint?()A、Replace all incandescent lighting with energy saving neon lighting.B、Set an auto-shutoff policy for all the lights in the room to reduce energy consumption after hours.C、Replace all incandescent lighting with energy saving fluorescent lighting.D、Consolidate server systems into a lower number of racks,centralizing airflow and cooling in the room.

考题 An administrator is troubleshooting issues on an application server.After a root cause analysis,the administrator has determined that there were some unauthorized logins to the server.Which of the following locations would BEST help to determine details about the unauthorized logins?()A、Active DirectoryB、DHCP logsC、Security logsD、System logs

考题 A file server is setup in a RAID 5 configuration.Recently there was a power failure in the server room while a user was transferring a document from one drive on the server to another drive on the same server.Unfortunately their UPS was in repair during this outage, and the file is now corrupt.Which of the following can be done to prevent this situation in the future?()A、Increase the memory on the server.B、Reconfigure drives to a RAID 0+1.C、Install a battery backed write cache module in the system.D、Instruct the user to save to the local system instead of to the server.

考题 The server room that an administrator manages has just caught fire. Which of the following is the FIRST thing that the administrator should do?()A、 Evacuate all personnel.B、 Notify staff of the potential service outage.C、 Use fire suppression techniques until the fire department arrives.D、 Grab the backup tapes and exit the server room.

考题 A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()A、SSLB、PGPC、File encryption programD、Public key encryption

考题 Your network contains an Active Directory domain. The domain contains a DHCP server named Server1.You create a scope named Scope1 on Server1.You need to prevent unauthorized DHCP clients from receiving addresses from Server1.What should you do?()A、From the DHCP console, configure filters.B、From the Local Security Policy console, modify the network settings.C、From the Local Users and Groups console, modify the membership of the DHCP Users group.D、From the Netsh tool, change to the DHCP Server context, and then run the initiate auth command.

考题 You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed.   The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts.  You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site.  Which Web site feature should you configure?()A、AuthenticationB、Authorization RulesC、IIS Manager PermissionsD、SSL Settings

考题 Which of the following ensures the MOST secure access to a server room?()A、 ID card readersB、 Server rack doorsC、 Biometric devicesD、 Locked doors

考题 单选题Why would a network administrator configure port security on a switch?()A to prevent unauthorized Telnet access to a switch portB to limit the number of Layer 2 broadcasts on a particular switch portC to prevent unauthorized hosts from accessing the LAND to protect the IP and MAC address of the switch and associated portsE to block unauthorized access to the switch management interfaces over common TCP ports

考题 单选题Which of the following is the BEST reason to label servers within the server room?()A  To ensure server documentation is kept up to dateB  To ensure administrators avoid duplicate server namesC  To ensure server power requirements are metD  To ensure the servers can be identified quickly and easily

考题 单选题A small business has had unauthorized people enter their server room and damage their servers.Which of the following locks for the door would BEST prevent unauthorized people from accessing the server room?()A BiometricB KeypadC BarcodeD Key lock

考题 单选题Why would a network administrator configure port security on a switch?()A To prevent unauthorized Telnet access to a switch port.B To limit the number of Layer 2 broadcasts on a particular switch port.C To prevent unauthorized hosts from accessing the LAN.D To protect the IP and MAC address of the switch and associated ports.E To block unauthorized access to the switch management interfaces over common TCP ports.

考题 单选题According to the passage, which of the following did NOT happen in the room where the college entrance exam was going on?A The teachers in the exam hall tried to stop the police from entering into the room.B Some examinees sent answers with mobile phones to people outside the room to make profits.C The mobile phones were confiscated by the police.D Some examinees forwarded answers to people who have paid a lot of money.

考题 单选题When a technician left the server room Monday evening everything was operational. When the technician returned Tuesday morning, the front bezel was off of the mail server, and it had been powered off. Which of the following should be checked FIRST?()A TCP/IP settingsB RAID configurationC Whether the power cord is attachedD Server room access log

考题 单选题The server room that an administrator manages has just caught fire. Which of the following is the FIRST thing that the administrator should do?()A  Evacuate all personnel.B  Notify staff of the potential service outage.C  Use fire suppression techniques until the fire department arrives.D  Grab the backup tapes and exit the server room.

考题 单选题You have two listener processes, named L1 and L2. Both the listener processes are currently functional. While viewing the listener.ora file on your database server, you find the following entry: PASSWORDS_L1 = (1sanfrjp43) What would be the impact of this setting?()A The listener process named L1 will disconnect the unauthorized users.B The listener process named L1 will be prevented from being started by unauthorized users. C The listener process named L1 will be prevented from being stopped by unauthorized users. D The listener process named L1 will be prevented from being reloaded by unauthorized users.E The listener process named L1 will be prevented from accepting connections from unauthorized users.