考题
Personal firewall is a technology that helps(66)intruders from accessing data on your PC via the Internet or another network, by keeping(67)data from entering or exiting your system.Hackers do not just target national security organizations for(68): They want your tax returns, network passwords, or bank account numbers. And you do not want the FBI kicking in your door because someone hijacked your PC to(69)in the latest denial-of-service attack on the Internet. Now that "always-on" broadband connections such as cable modems and digital subscriber line are becoming more popular, home users are at risk. Fortunately, you can protect your data. Firewalls can block(70)attacks and protect your PC from outside threats.A.allowB.preventC.inviteD.get
考题
The pop-up blocker is enabled on your computer. A Web site that you visit regularly uses pop-ups.You need to view the pop-ups from this Web site while maintaining the highest level of security for all other Web sites.What are two possible ways to achieve this goal?()A.AB.BC.CD.DE.E
考题
Refer to the exhibit. On the basis of the partial configuration, which two statements are correct? ()
A. Only routes 10.0.1.0/24 will be sent out all interfaces.B. Only routes matching 10.0.0.0/8 will be advertised out interfaces other than Ethernet 0.C. Only routes matching 10.0.0.0/8 will be advertised out Ethernet 0.D. Only routes matching 10.0.1.0/24 will be advertised out Ethernet 0.E. Only routes 10.0.1.0/24 will be allowed in the routing table.F. All rout es will be advertised out interfaces other than Ethernet 0.
考题
ArequestarrivedonyourMPLS-vpn-bgpgroup.Duetoasecuritybreach,yourcustomerisexperiencingDoSattackscomingfromspecificsubnets(200.0.10.0/24,200.0.12.0/24).YouhavecheckedallMPLS-EBGProutesbeingadvertisedtoBHKfromotherVPNsitesandfoundfoursubnetslisted:200.0.10.0/24,200.0.11.0/24,200.0.12.0/24,200.0.13.0/24.YouimmediatelyapplyanoutboundACLfilterusingtheappropriateMPLS-EBGPtool:access-list1deny0.0.0.0255.255.254.255access-list1permitanyWhathappenswhenyouapplythisACLontheMPLS-EBGPconnectiontoBHK?()
考题
Your end user customer has not requested a ServicePac to cover the base unit and options they have purchased. What is a compelling reason to offer service? ()A、IBM ServicePacs remove a liability from you the reseller in the event of fireB、IBM ServicePacs remove a liability from you the reseller in the event of floodingC、IBM ServicePacs provide improved warranty coverageD、Service just adds a layer of cost you do not needE、all of the above
考题
Your network consists of a single Active Directory domain. User accounts for engineering department are located in an OU named Engineering. You need to create a password policy for the engineering department that is different from your domain password policy. What should you do()A、Create a new GPO. Link the GPO to the Engineering OU.B、Create a new GPO. Link the GPO to the domain. Block policy inheritance on all OUs except for the Engineering OU.C、Create a global security group and add all the user accounts for the engineering department to the group. Create a new Password Policy Object (PSO) and apply it to the group.D、Create a domain local security group and add all the user accounts for the engineering department to the group. From the Active Directory Users and Computer console, select the group and run the Delegation of Control Wizard.
考题
Your company has an Active Directory domain. All computers are members of the domain. Your networkcontains an internal Web site that uses Integrated Windows Authentication. From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication. You verify that youruser account has permission to access the Web site. You need to ensure that you are automaticallyauthenticated when you connect to the Web site. What should you do?()A、Create a complex password for your user account.B、Open Credential Manager and modify your credentials.C、Add the URL of the Web site to the Trusted sites zone.D、Add the URL of the Web site to the Local intranet zone.
考题
You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A、 Easy VPNB、 IPsec GRE tunnelingC、 Virtual Tunnel InterfacesD、 Dynamic Multipoint VPN
考题
A request arrived on your MPLS-vpn-bgp group. Due to a security breach, your customer is experiencing DoS attacks coming from specific subnets (200.0.10.0/24, 200.0.12.0/24). You have checked all MPLS-EBGP routes being advertised to BHK from other VPN sites and found four subnets listed: 200.0.10.0/24, 200.0.11.0/24, 200.0.12.0/24, 200.0.13.0/24. You immediately apply an outbound ACL filter using the appropriate MPLS-EBGP tool: access-list 1 deny 0.0.0.0 255.255.254.255 access-list 1 permit any What happens when you apply this ACL on the MPLS-EBGP connection to BHK?()A、It blocks all routes.B、It blocks the routes 200.0.12.0/24, 200.0.10.0/24 only.C、It blocks the routes 200.0.12.0/24, 200.0.13.0/24 only.D、It blocks the routes 200.0.10.0/24, 200.0.13.0/24 only.E、Nothing happens, no routes are blocked.
考题
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A、then rejectB、then discardC、then next filterD、then silent-drop
考题
Your database has a backup that was taken yesterday (Tuesday) between 13:00 and 15:00 hours. This is the only backup you have. You have lost all the archived redo logs generatedsince the previous Monday, but you have archived redo logs available from the previous Sunday and earlier. You now need to restore your backup due to database loss. To which point can you restore your database?() A、 13:00 on Tuesday.B、 15:00 on Tuesday.C、 Up until the last available archived redo log on Sunday.D、 To any point; all the redo should still be available in the online redo logs.E、 The database is not recoverable.
考题
Your network consists of a single Active Directory domain. User accounts for engineering department are located in an OU named Engineering. You need to create a password policy for the engineering department that is different from your domain password policy. What should you do()A、Create a new GPO. Link the GPO to the Engineering OU.B、Create a new GPO. Link the GPO to the domain. Block policy inheritance on all OUs except for the Engineering OUC、Create a global security group and add all the user accounts for the engineering department to the group. Create aD、Create a domain local security group and add all the user accounts for the engineering department to the group. Fr
考题
The pop-up blocker is enabled on your computer. A Web site that you visit regularly uses pop-ups. You need to view the pop-ups from this Web site while maintaining the highest level of security for all other Web sites. What are two possible ways to achieve this goal?()A、Disable the pop-up blocker.B、Add the URL of the Web site to the list of trusted sites.C、Add the URL of the Web site to the list of allowed sites.D、Enable the Automatic Website Checking option on the Phishing filter.E、Visit the Web site and select the Always allow pop-ups from this site option.
考题
Your network consists of a single Active Directory domain. The remote access permission for all users is set to Control access through Remote Access Policy. You have a VPN server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). The current configuration allows all authenticated users to establish VPN connections to Server1. You create a global group named Group1.You need to prevent all members of Group1 from establishing VPN connections to Server1. What should you do?()A、From the local computer policy on Server1, modify the Account Policies settings. B、From Active Directory Users and Computers, modify the Security settings of Group1. C、From the Routing and Remote Access snap-in, create a new remote access policy. D、From the Routing and Remote Access snap-in, open the properties of Server1 and modify the security options.
考题
You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A、 From Windows Firewall, add an exceptionB、 From windows Firewall enable the block all incoming connections optionC、 From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD、 From the Windows Firewall with Advanced Security snap-in, create an outbound rule.
考题
Your company has three offices. An Active Directory site named Site1, Site2, and Site3 exists for each office. You have an Exchange Server 2003 organization. You deploy Exchange Server 2010 servers in Site1. You plan to deploy Exchange Server 2010 servers in Site2 and Site3. You need to recommend a solution that allows the Exchange Server 2010 servers to coexist with the Exchange Server 2003 servers. Your solution must meet the following requirements: .All e-mail messages that are sent to mailboxes on Exchange Server 2003 servers from mailboxes on Exchange Server 2010 servers must be delivered directly from a server in Site2 .All e-mail messages that are sent to mailboxes on Exchange Server 2010 servers from mailboxes on Exchange Server 2003 servers must be delivered directly to a server in Site1 What should you recommend?()A、Create two SMTP connectors and one Active Directory SMTP site link.B、Create a new routing group connector and modify the default routing group connector.C、Create an X400 connector to Site1 and modify the cost value for the default routing group connector.D、Move all Exchange Server 2003 servers and Exchange Server 2010 servers to a single routing group.
考题
Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Your company’s security policy states that domain users must be prevented from logging on to Server1 if a domain controller is unavailable. You disconnect Server1 from the network and discover that you can log on to Server1. You need to configure Server1 to comply with the company’s security policy. What should you do on Server1?()A、From the local security policy, modify the Security Options.B、From the local security policy, modify the User Rights Assignment.C、From Active Directory Users and Computers, modify the properties of the Server1 account.D、From Active Directory Users and Computers, modify the properties of the Domain Computers group.
考题
You have a main office and five branch offices. The offices connect to each other by using a WAN link. An Active Directory site exists for each office. Each site has a separate IP site link to all other sites. The main office site is configured as a hub site. You have an Exchange Server 2010 organization. You discover that messages sent between offices are not routed through the Hub Transport servers in themain office. You need to ensure that all messages sent between offices are routed through the Hub Transport serversin the main office. What should you do?()A、Change all IP site links to SMTP site links.B、Modify the Exchange-specific cost for each site link.C、From the Hub Transport servers in each site, create a journal rule.D、From the Hub Transport servers in each site, create a transport rule.
考题
Your network contains a DNS server that has a reverse lookup zone for all of your network segments. You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). An IP security policy is assigned to Server1. You verify IPSec traffic and see that the current security associations display only by IP address. You need to view the fully qualified domain names for all security associations. What should you do?()A、From the DNS console, add Server1 as a name server.B、From the DNS console, change dynamic updates to Secure only.C、From IP Security Monitor on Server1, enable DNS name resolution.D、From IP Security Monitor on Server1, create a new taskpad view.
考题
You want to prevent a Windows 2000 Professional computer named Payroll5 from communicating on your network with Windows NT 4.0, Windows 95, and Windows 98 computers. You want to enable the payroll5 computer to communicate on your network with other Windows 2000 computers only. What should you do?()A、Close all NetBIOS ports in the advanced TCP/IP options of Payroll5.B、Import the Hisecws.inf security template to payroll5.C、Disable access this computer from network in the local security policy settings for payroll5.D、Clear all WINS client settings on payroll5.
考题
You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()A、Test and manually deploy updatesB、Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the serverC、Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group PolicyD、Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site
考题
You are a network administrator for ExamSheet.net's Windows 2000 network. Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully. What should you do? ()A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B、Start the RunAs service and configure the service to start automatically.C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D、Use Scheduled Tasks to configure the task to run under the security context of your account.
考题
Your company has an internal Web site that requires HTTPS. The Web site s certificate is self-signed. Youhave a computer that runs Windows 7 and Windows Internet Explorer 8. You use HTTPS to browse to theWeb site and receive the following warning message: There is a problem with this website s security certificate. You need to prevent the warning message from appearing when you access the Web site. What should you do?()A、From Internet Explorer, enable InPrivate Browsing.B、From Internet Explorer, add the Web site to the Trusted sites zone.C、From Certificate Manager, import the Web site s certificate into your Personal store.D、From Certificate Manager, import the Web site s certificate into your Trusted Root CertificationAuthorities store.
考题
You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()A、Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patchesB、Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)C、Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the serverD、Configure a batch file to download security patches daily. Manually install the security patches on all computers
考题
单选题Your database is configured in NOARCHIVELOG mode. Due to a media failure, you have lost one of the datafiles belonging to a read-only tablespace. You know that the last backup was performed after the tablespace was made read-only. Which action should you take to restore the missing datafile in the minimum amount of time?()A
Restore all the datafiles from the backup.B
Restore only the lost datafile from the backup.C
Restore all the datafiles for the lost tablespace from the backup.D
Restore all the datafiles for the lost tablespace and all the SYSTEM and SYSAUX datafiles from the backup.
考题
单选题What can we learn from the passage?A
A talk with other architects may annoy the one you have chosen.B
If your home is exclusive in your residence region, you cannot get along well with your neighbors.C
You should consider the issue of whether to move or to remodel from financial aspect.D
You will always take back the whole expense of remodeling when you sell the current home.
考题
单选题You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A
Easy VPNB
IPsec GRE tunnelingC
Virtual Tunnel InterfacesD
Dynamic Multipoint VPN