网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker?() (Select TWO).
- A、Disable TPM in the system BIOS
- B、Run the BitLocker wizard and any necessary partitions
- C、Enable TPM in the system BIOS
- D、Enable TPM in the Windows 7 OS files
- E、Set up the OS and the system files on the same partition
参考答案
更多 “A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker?() (Select TWO).A、Disable TPM in the system BIOSB、Run the BitLocker wizard and any necessary partitionsC、Enable TPM in the system BIOSD、Enable TPM in the Windows 7 OS filesE、Set up the OS and the system files on the same partition” 相关考题
考题
A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()
A. ESD matB. ESD wrist strapC. Sealable plastic bagD. Anti-static bag
考题
A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()
A. Keyboard filtersB. Privacy filtersC. ScreensaversD. Secure display drivers
考题
A network technician wants to use a packet analyzer to troubleshoot a reported problem with auser‘s workstation with IP address 192.168.1.45. To identify the workstation‘s packets thetechnician wants to use the workstation‘s MAC address.Which of the following protocols would provide the needed information?()A.DHCPB.ARPC.DNSD.PING
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
考题
A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?()
A. DHCP serverB. Proxy serverC. RepeaterD. DHCP relay
考题
A technician wants to compare a new server performance over a period of time. Which of the following should the technician do FIRST?()
A. Monitor processor performance logsB. Constantly check the task managerC. Use performance server logsD. Establish a baseline for the server
考题
You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.
考题
A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA、Power UsersB、UsersC、GuestsD、Administrato
考题
A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()A、Keyboard filtersB、Privacy filtersC、ScreensaversD、Secure display drivers
考题
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()A、Disable post scanB、Use SSH or SSLC、Enable trust levelsD、Deny echo replies on all edge routers
考题
A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()A、ESD matB、ESD wrist strapC、Sealable plastic bagD、Anti-static bag
考题
A technician wants to compare a new server performance over a period of time. Which of the following should the technician do FIRST?()A、Monitor processor performance logsB、Constantly check the task managerC、Use performance server logsD、Establish a baseline for the server
考题
A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING
考题
For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()A、VPN concentratorB、Virtual serversC、WirelessD、Multimode fiber
考题
A technician is setting up a network and wants to automatically assign IP addresses. Which of the following will need to be configured to automatically assign IP addresses?()A、WINSB、DNSC、DHCPD、NTP
考题
A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?()A、DHCP serverB、Proxy serverC、RepeaterD、DHCP relay
考题
A technician wants to create a spanned volume on a set of hard drives. Which of the following tools will identify if the drives will support a spanned volume?()A、System InformationB、Disk ManagementC、Device ManagerD、Task Manager
考题
A company wants all IM chat via the internet to stop. A technician blocks IRC traffic with a traffic shaping device, yet IM chat remains useable. Which of the following should a technician do next?()A、Block both IRC and ICMPB、Utilize SNMP to identify IM usersC、Contact the IM carrier to request the IM account be disabledD、Change the shaping setting to allow minimal traffic to reduce port hopping
考题
A technician wants to increase the reliability of a DHCP server. Which of the following components should be installed to increase the server’s uptime on the network?()A、 Increase the amount of RAMB、 Use a lower voltage power supplyC、 Add a hardware firewallD、 Install redundant NICs
考题
A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A、 Guest user accountB、 Limited user accountC、 Power user accountD、 Administrator user account
考题
A technician wants to verify a remote printer that has been power cycled is back online. Thetechnician would use which of the following commands and switch?()A、tracert -tB、ipconfig /renewC、ping –tD、nslookup -ttl
考题
A user is receiving an error about not having enough virtual memory. A technician wants to manually set the amount of available virtual memory for the computer. At a MINIMUM, the technician should set the virtual memory to be which of the following?()A、0.5 times the amount of physical memoryB、1.5 times the amount of physical memoryC、2 times the amount of physical memoryD、Equal to the amount of physical memory
考题
单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A
Guest user accountB
Limited user accountC
Power user accountD
Administrator user account
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
考题
多选题A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker?() (Select TWO).ADisable TPM in the system BIOSBRun the BitLocker wizard and any necessary partitionsCEnable TPM in the system BIOSDEnable TPM in the Windows 7 OS filesESet up the OS and the system files on the same partition
考题
单选题A user is receiving an error about not having enough virtual memory. A technician wants to manually set the amount of available virtual memory for the computer. At a MINIMUM, the technician should set the virtual memory to be which of the following?()A
0.5 times the amount of physical memoryB
1.5 times the amount of physical memoryC
2 times the amount of physical memoryD
Equal to the amount of physical memory
考题
单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A
You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B
You must then zeroize the keys to reset secure shell before configuring other parameters.C
All vty ports are automatically enabled for SSH to provide secure management.D
The SSH protocol is automatically enabled.
热门标签
最新试卷