网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following devices can be installed on individual computers throughout the network?()
A

NIPS

B

Network-based firewall

C

VPN concentrator

D

Host-based firewall


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following devices can be installed on individual computers throughout the network?()A NIPSB Network-based firewallC VPN concentratorD Host-based firewall” 相关考题
考题 Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?() A.NASB.FirewallC.HubD.Bridge

考题 Which of the following devices would need to be configured to block specific ports and protocols from entering the network?() A. BridgeB. FirewallC. Port replicatorD. Gateway

考题 A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?() A. Unmanaged switchB. Hardware firewallC. HubD. Managed switch

考题 Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?() A. Network layer firewallB. Stateful inspection firewallC. Zone aware firewallD. Application layer firewall

考题 As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A. inline with a firewallB. in a DMZ outside the firewallC. parallel with a firewallD. in a DMZ behind the firewall

考题 Which is the main difference between host-based and network-based intrusion prevention?()A、Host-based IPS can work in promiscuous mode or inline mode.B、Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.C、Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.D、Host-based IPS deployment requires less planning than network-based IPS.

考题 Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A、Network layer firewallB、Stateful inspection firewallC、Zone aware firewallD、Application layer firewall

考题 Which of the following is the BEST way to deny unauthorized computers access to a network? ()A、Disable DHCP.B、Use MAC filtering.C、Disable the SSID broadcast.D、Use a network firewall.

考题 Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall

考题 What is the recommended practice when considering VPN termination and firewall placement?()A、 have the firewall and VPN appliance deployed in parallelB、 place the VPN in line with the firewall, with the VPN terminating inside the firewallC、 place the public side of the VPN termination device in the DMZ behind a firewallD、 place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A、 inline with a firewallB、 in a DMZ outside the firewallC、 parallel with a firewallD、 in a DMZ behind the firewall

考题 Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()A、SwitchB、RepeaterC、HubD、WAP

考题 Which of the following features can be identically configured on a wireless access point and in the wireless network OS settings?()A、The firewall settingsB、The DHCP addressC、The workgroup nameD、The SSID

考题 A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()A、Unmanaged switchB、Hardware firewallC、HubD、Managed switch

考题 Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?()A、NASB、FirewallC、HubD、Bridge

考题 Which of the following network devices should be installed at a data center to intelligently distribute client connections to a pool of servers?()A、A proxy serverB、A load balancerC、A layer two switchD、A multilayer switch

考题 Which of the following devices can be installed on individual computers throughout the network?()A、NIPSB、Network-based firewallC、VPN concentratorD、Host-based firewall

考题 Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()A、BridgeB、FirewallC、Port replicatorD、Gateway

考题 You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.  You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature.  Which of the following is TRUE with regards to Windows Firewall with Advanced Security?()A、It provides host-based,two-way network traffic filtering for a computer.B、It provides host-based,one-way network traffic filtering for a computer.C、It blocks unauthorized network traffic flowing into or out of the local computer.D、It only blocks unauthorized network traffic flowing into the local computer.E、It only blocks unauthorized network traffic flowing out of the local computer.

考题 单选题Which of the following is the BEST way to deny unauthorized computers access to a network? ()A Disable DHCP.B Use MAC filtering.C Disable the SSID broadcast.D Use a network firewall.

考题 单选题Which Cisco product family can simultaneously implement firewall, VPN, content security, network access control, virtualization, anD content filtering?()A intrusion prevention systemsB catalyst switchesC adaptive security appliancesD protect link gateway

考题 单选题Which is the main difference between host-based and network-based intrusion prevention?()A Host-based IPS can work in promiscuous mode or inline mode.B Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.C Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.D Host-based IPS deployment requires less planning than network-based IPS.

考题 单选题Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()A SwitchB RepeaterC HubD WAP

考题 单选题Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: °Error 721: The remote computer is not responding.You need to ensure that users can establish a VPN connection. What should you do?()A Open port 1423 on the firewall.B Open port 1723 on the firewall.C Open port 3389 on the firewall.D Open port 6000 on the firewall.

考题 单选题What is the recommended practice when considering VPN termination and firewall placement?()A  have the firewall and VPN appliance deployed in parallelB  place the VPN in line with the firewall, with the VPN terminating inside the firewallC  place the public side of the VPN termination device in the DMZ behind a firewallD  place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 单选题Which of the following network devices should be installed at a data center to intelligently distribute client connections to a pool of servers?()A A proxy serverB A load balancerC A layer two switchD A multilayer switch

考题 单选题As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A  inline with a firewallB  in a DMZ outside the firewallC  parallel with a firewallD  in a DMZ behind the firewall

考题 单选题Which of the following devices can be installed on individual computers throughout the network?()A NIPSB Network-based firewallC VPN concentratorD Host-based firewall