网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()

  • A、 PAT
  • B、 ACLs
  • C、 Subnet masking
  • D、 Port blocking

参考答案

更多 “ An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking” 相关考题
考题 The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)A.Configure port Fa0/1 to accept connections only from the static IP address of the serverB.Configure the MAC address of the server as a static entry associated with port Fa0/1C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectorsD.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverE.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address

考题 An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?() A. Caching enginesB. QoSC. Traffic shapingD. Load balancing

考题 An administrator needs to diagnose problems with a WINS server. Which of the following toolsshould be used?() A.nslookupB. nbtstatC. digD. netstat

考题 A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()A. Configure port Fa0/1 to accept connections only from the static IP address of the server.B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C. Configure the MAC address of the server as a static entry associated with port Fa0/1.D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 A network administrator needs to configure port security on a switch.which two statements are true? () A.The network administrator can apply port security to dynamic access portsB.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D.The network administrator can apply port security to EtherChannels.E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 An administrator needs a network that can support up to 800 hosts on the same subnet. Which of the following is the MINIMUM subnet mask that should be used?()A、255.0.0.0B、255.255.0.0C、255.255.252.0D、255.255.255.0

考题 A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()A、Update the antivirus applicationB、Install critical update security patchesC、Adjust the software firewall settingsD、Replace the current antivirus program

考题 An administrator needs to diagnose problems with a WINS server. Which of the following toolsshould be used?()A、nslookupB、nbtstatC、digD、netstat

考题 While reviewing the backup logs a server administrator notices that a backup job for an application server on the same subnet has failed. Which of the following is MOST likely the problem?()A、The remote agent was not running.B、The management card has failed.C、The proxy server was blocking access.D、The hardware firewall was blocking access.

考题 Which of the following could be used to restrict access to the local web server to only certain IP addresses?()A、 Create an ACL.B、 Create an application exception.C、 Configure IPSec.D、 Block port 80.

考题 Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable

考题 A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A、NIC filtering is enabled.B、Port security is configured.C、NIC is not in promiscuous mode.D、NIC is in promiscuous mode.

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable

考题 An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing

考题 Which of the following BEST describes how server virtualization can cut down IT costs? ()A、 Server virtualization increases server application performance allowing productivity to be increased.B、 Server virtualization simplifies server administration and reduces the IT department staffing needs.C、 Server virtualization implements higher security measures at the server OS level reducing the need for other security implementations.D、 Server virtualization is a more efficient use of hardware for multiple servers reducing the resource utilization.

考题 A system administrator is deploying a new POWER5 server. The application requires AIX 5L V5.2.  Which of the following virtualization technologies can be used?()A、DLPARB、Micro-PartitioningC、Virtual StorageD、Virtual Ethernet

考题 You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

考题 单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A NIC filtering is enabled.B Port security is configured.C NIC is not in promiscuous mode.D NIC is in promiscuous mode.

考题 单选题An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A  PATB  ACLsC  Subnet maskingD  Port blocking

考题 单选题Which of the following could be used to restrict access to the local web server to only certain IP addresses?()A  Create an ACL.B  Create an application exception.C  Configure IPSec.D  Block port 80.

考题 单选题Which of the following BEST describes how server virtualization can cut down IT costs? ()A  Server virtualization increases server application performance allowing productivity to be increased.B  Server virtualization simplifies server administration and reduces the IT department staffing needs.C  Server virtualization implements higher security measures at the server OS level reducing the need for other security implementations.D  Server virtualization is a more efficient use of hardware for multiple servers reducing the resource utilization.

考题 单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()A  NIC filtering is enabled.B  Port security is configured.C  NIC is not in promiscuous mode.D  NIC is in promiscuous mode.

考题 单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A  Default gatewayB  The ports on the switchC  Port security on the servers switch portD  Ethernet cable

考题 单选题While reviewing the backup logs a server administrator notices that a backup job for an application server on the same subnet has failed. Which of the following is MOST likely the problem?()A The remote agent was not running.B The management card has failed.C The proxy server was blocking access.D The hardware firewall was blocking access.

考题 单选题An administrator needs a network that can support up to 800 hosts on the same subnet. Which of the following is the MINIMUM subnet mask that should be used?()A 255.0.0.0B 255.255.0.0C 255.255.252.0D 255.255.255.0