网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A small business has had unauthorized people enter their server room and damage their servers.Which of the following locks for the door would BEST prevent unauthorized people from accessing the server room?()
- A、Biometric
- B、Keypad
- C、Barcode
- D、Key lock
参考答案
更多 “A small business has had unauthorized people enter their server room and damage their servers.Which of the following locks for the door would BEST prevent unauthorized people from accessing the server room?()A、BiometricB、KeypadC、BarcodeD、Key lock” 相关考题
考题
The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above
考题
Asmallbusinesshashadunauthorizedpeopleentertheirserverroomanddamagetheirservers.WhichofthefollowinglocksforthedoorwouldBESTpreventunauthorizedpeoplefromaccessing theserverroom?()
A.BiometricB.KeypadC.BarcodeD.Keylock
考题
Why would a network administrator configure port security on a switch?()
A. To prevent unauthorized Telnet access to a switch port.B. To limit the number of Layer 2 broadcasts on a particular switch port.C. To prevent unauthorized hosts from accessing the LAN.D. To protect the IP and MAC address of the switch and associated ports.E. To block unauthorized access to the switch management interfaces over common TCP ports.
考题
Why would a network administrator configure port security on a switch()。
A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports
考题
At the University of Kansas art museum,scientists tested the effect of different colored walls on two groups of visitors to an exhibit of paintings.For the first group the room was painted white;for the second,dark brown.Movement of each group was followed by an electrical equipment under the carpet.The experiment showed that those who entered the dark brown walked more quickly,covered more area,and spent less time in the room than people in the white one.Dark brown made people more active,but the activity ended sooner.Not only the choice of colors but also the general appearance of a room affects those inside.Another experiment presented people with photographs of faces whose energy was to be commented.Three groups of people were used;each was shown the same photos,but each group was in an ordinary room—a nice office.The third was in a tastefully designed living room with carpeting.Results showed that the people in the beautiful room tend to give higher marks to the faces than those in the ugly room did.Other studies that students do better on tests taken in comfortable room than in ordinary-looking or ugly rooms.
Which of the following is the best expression of the main idea of this passage A.People in beautiful rooms tend to give higher marks to photos of faces than people in ugly rooms
B.The color and general appearance of a room have a deeper effect on the behavior of the people in it
C.The University of Kansas has studied the effects of the color of room on people’s behavior
D.Beautifully furnished,light-coloured rooms make people more comfortable than ugly,dark rooms
考题
A technician at a small business goes into the server room to perform maintenance on a server and notices it is very hot and audible alarms are going off. The technician is unsure of how to remedy the situation. Which of the following should the technician do?()A、Turn off all the equipment in the server closetB、Install a fan in the server closetC、Turn off the power to the server closetD、Follow escalation procedures for emergencies
考题
Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports
考题
When a technician left the server room Monday evening everything was operational. When the technician returned Tuesday morning, the front bezel was off of the mail server, and it had been powered off. Which of the following should be checked FIRST?()A、TCP/IP settingsB、RAID configurationC、Whether the power cord is attachedD、Server room access log
考题
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses
考题
Which of the following should be included in the network diagram?()A、Server room access logB、Server typesC、OEM contact informationD、Temperature reading
考题
Which of the following is the BEST reason to label servers within the server room?()A、 To ensure server documentation is kept up to dateB、 To ensure administrators avoid duplicate server namesC、 To ensure server power requirements are metD、 To ensure the servers can be identified quickly and easily
考题
A small business currently has a server room with a large cooling system that is appropriate for its size. The location of the server room is the top level of a building. The server room is filled with incandescent lighting that needs to continuously stay on for security purposes. Which of the following would be the MOST cost-effective way for the company to reduce the server rooms energy footprint?()A、Replace all incandescent lighting with energy saving neon lighting.B、Set an auto-shutoff policy for all the lights in the room to reduce energy consumption after hours.C、Replace all incandescent lighting with energy saving fluorescent lighting.D、Consolidate server systems into a lower number of racks,centralizing airflow and cooling in the room.
考题
An administrator is troubleshooting issues on an application server.After a root cause analysis,the administrator has determined that there were some unauthorized logins to the server.Which of the following locations would BEST help to determine details about the unauthorized logins?()A、Active DirectoryB、DHCP logsC、Security logsD、System logs
考题
A file server is setup in a RAID 5 configuration.Recently there was a power failure in the server room while a user was transferring a document from one drive on the server to another drive on the same server.Unfortunately their UPS was in repair during this outage, and the file is now corrupt.Which of the following can be done to prevent this situation in the future?()A、Increase the memory on the server.B、Reconfigure drives to a RAID 0+1.C、Install a battery backed write cache module in the system.D、Instruct the user to save to the local system instead of to the server.
考题
The server room that an administrator manages has just caught fire. Which of the following is the FIRST thing that the administrator should do?()A、 Evacuate all personnel.B、 Notify staff of the potential service outage.C、 Use fire suppression techniques until the fire department arrives.D、 Grab the backup tapes and exit the server room.
考题
A customer wants to have employees work from remote locations as well as in the office. All communications must be secure and files must be protected from access by unauthorized people. The employee’s applications (database inserts and reads) are only accessed with a web browser. Which of the following capabilities is necessary?()A、SSLB、PGPC、File encryption programD、Public key encryption
考题
Your network contains an Active Directory domain. The domain contains a DHCP server named Server1.You create a scope named Scope1 on Server1.You need to prevent unauthorized DHCP clients from receiving addresses from Server1.What should you do?()A、From the DHCP console, configure filters.B、From the Local Security Policy console, modify the network settings.C、From the Local Users and Groups console, modify the membership of the DHCP Users group.D、From the Netsh tool, change to the DHCP Server context, and then run the initiate auth command.
考题
You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed. The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts. You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site. Which Web site feature should you configure?()A、AuthenticationB、Authorization RulesC、IIS Manager PermissionsD、SSL Settings
考题
Which of the following ensures the MOST secure access to a server room?()A、 ID card readersB、 Server rack doorsC、 Biometric devicesD、 Locked doors
考题
单选题Why would a network administrator configure port security on a switch?()A
to prevent unauthorized Telnet access to a switch portB
to limit the number of Layer 2 broadcasts on a particular switch portC
to prevent unauthorized hosts from accessing the LAND
to protect the IP and MAC address of the switch and associated portsE
to block unauthorized access to the switch management interfaces over common TCP ports
考题
单选题Which of the following is the BEST reason to label servers within the server room?()A
To ensure server documentation is kept up to dateB
To ensure administrators avoid duplicate server namesC
To ensure server power requirements are metD
To ensure the servers can be identified quickly and easily
考题
单选题A small business has had unauthorized people enter their server room and damage their servers.Which of the following locks for the door would BEST prevent unauthorized people from accessing the server room?()A
BiometricB
KeypadC
BarcodeD
Key lock
考题
单选题Why would a network administrator configure port security on a switch?()A
To prevent unauthorized Telnet access to a switch port.B
To limit the number of Layer 2 broadcasts on a particular switch port.C
To prevent unauthorized hosts from accessing the LAN.D
To protect the IP and MAC address of the switch and associated ports.E
To block unauthorized access to the switch management interfaces over common TCP ports.
考题
单选题According to the passage, which of the following did NOT happen in the room where the college entrance exam was going on?A
The teachers in the exam hall tried to stop the police from entering into the room.B
Some examinees sent answers with mobile phones to people outside the room to make profits.C
The mobile phones were confiscated by the police.D
Some examinees forwarded answers to people who have paid a lot of money.
考题
单选题When a technician left the server room Monday evening everything was operational. When the technician returned Tuesday morning, the front bezel was off of the mail server, and it had been powered off. Which of the following should be checked FIRST?()A
TCP/IP settingsB
RAID configurationC
Whether the power cord is attachedD
Server room access log
考题
单选题The server room that an administrator manages has just caught fire. Which of the following is the FIRST thing that the administrator should do?()A
Evacuate all personnel.B
Notify staff of the potential service outage.C
Use fire suppression techniques until the fire department arrives.D
Grab the backup tapes and exit the server room.
考题
单选题You have two listener processes, named L1 and L2. Both the listener processes are currently functional. While viewing the listener.ora file on your database server, you find the following entry: PASSWORDS_L1 = (1sanfrjp43) What would be the impact of this setting?()A
The listener process named L1 will disconnect the unauthorized users.B
The listener process named L1 will be prevented from being started by unauthorized users. C
The listener process named L1 will be prevented from being stopped by unauthorized users. D
The listener process named L1 will be prevented from being reloaded by unauthorized users.E
The listener process named L1 will be prevented from accepting connections from unauthorized users.
热门标签
最新试卷