网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
A
Network diagram
B
Performance baseline
C
Network security procedure
D
Company policy
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A Network diagramB Performance baselineC Network security procedureD Company policy” 相关考题
考题
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
A. Network diagramB. Performance baselineC. Network security procedureD. Company policy
考题
An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()
A. Logical network diagramB. History logsC. Baseline configurationsD. Wiring schematics
考题
Which of the following protocols should be used to monitor network performance?()
A.SNTPB.SMTPC.HTTPD.SNMP
考题
Which of the following statements is true about the 80/20 rule (Select all that apply)?()A、20 percent of the traffic on a network segment should be local.B、no more than 20 percent of the network traffic should be able to move across a backbone.C、no more than 80 percent of the network traffic should be able to move across a backbone.D、80 percent of the traffic on a network segment should be local.
考题
An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()A、Logical network diagramB、History logsC、Baseline configurationsD、Wiring schematics
考题
A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management
考题
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A、 the business knowledge of the IT staffB、 the technical knowledge of the IT staffC、 the company’s business objectivesD、 the company’s network topologyE、 the IT future directions
考题
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A、Network diagramB、Performance baselineC、Network security procedureD、Company policy
考题
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable
考题
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI
考题
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable
考题
Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP
考题
Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram
考题
You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain. Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network. How should you configure Server1?()A、 Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B、 Configure the network adapter on the test network to disable IEEE 802.1x authentication.C、 Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D、 Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E、 Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
考题
单选题During which phase of the steps to success methodology for Cisco SMB Security Solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which,if any modification should be prior to implementation?()A
PrepareB
DesignC
PositionD
DevelopE
PlanF
Perform
考题
单选题An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A
IDSB
IPSC
FirewallD
Managed PKI
考题
多选题Which of the following statements is true about the 80/20 rule (Select all that apply)?()A20 percent of the traffic on a network segment should be local.Bno more than 20 percent of the network traffic should be able to move across a backbone.Cno more than 80 percent of the network traffic should be able to move across a backbone.D80 percent of the traffic on a network segment should be local.
考题
单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A
Default gatewayB
The ports on the switchC
Port security on the server's switch portD
Ethernet cable
考题
单选题Which of the following protocols should be used to monitor network performance?()A
SNTPB
SMTPC
HTTPD
SNMP
考题
单选题All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A
Configure the Network authentication (Shared mode) setting.B
Apply a Wireless Network Policy to set the network type to WPA-PSK.C
Apply a Wireless Network Policy to automatically connect to the company wireless network.D
Apply a Wireless Network Policy to set the company wireless network as the preferred network.
考题
单选题You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain. Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network. How should you configure Server1?()A
Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B
Configure the network adapter on the test network to disable IEEE 802.1x authentication.C
Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D
Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E
Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
考题
单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A
Default gatewayB
The ports on the switchC
Port security on the servers switch portD
Ethernet cable
考题
单选题A network vulnerability scanner is part of which critical element of network and system security?()A
host securityB
perimeter securityC
security monitoringD
policy management
考题
单选题The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()A
Verity full system functionalityB
Identify the main problem and question the userC
Document their findings, actions, and outcomesD
Escalate the issue to upper management
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
考题
单选题Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A
the business knowledge of the IT staffB
the technical knowledge of the IT staffC
the company’s business objectivesD
the company’s network topologyE
the IT future directions
考题
单选题During which phase of the steps to success methodology for Cisco SMB security solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which, if any, modification should be made prior to implementation?()A
PositionB
PrepareC
DesignD
PerformE
Plan
热门标签
最新试卷