网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following is the BEST reason to implement a firewall on a server?()
A

To watch for bandwidth issues

B

To protect the server from all traffic

C

To block certain traffic by ports

D

To monitor certain malicious traffic


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following is the BEST reason to implement a firewall on a server?()A To watch for bandwidth issuesB To protect the server from all trafficC To block certain traffic by portsD To monitor certain malicious traffic” 相关考题
考题 Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?()A.B.C.D.

考题 Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.Which firewall filter configuration do you use?() A.B.C.D.

考题 Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?() A.HubB.VLANC.RouterD.Server

考题 Which of the following is the BEST way to allow web software through the server firewall?() A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.

考题 In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()A、It is used for PIM control trafficB、It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routersC、Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sourcesD、There is a reduced multicast state in the MPLS core P routersE、When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth

考题 Your network consists of an internal network and a perimeter network. On the internal network there is a server named Server1. On the perimeter network there is a server named Server2. All servers run Windows Server 2003 Service Pack 2 (SP2).  You schedule a task to transfers files from Server1 to Server2 by using FTP.You monitor the network traffic from Server1 to Server2 and notice that the user name and password used for the FTP transfer are sent as plain text. You need to ensure that all FTP traffic between Server1 and Server2 is encrypted.  What should you do?()A、Implement IPSec.B、Install a server certificate on Server1.C、Install a server certificate on Server2.D、Use the Encrypting File System on Server1.

考题 Which statement describes the Authentication Proxy feature?()A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

考题 Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.

考题 An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs

考题 Which of the following is the BEST reason to implement a firewall on a server?()A、To watch for bandwidth issuesB、To protect the server from all trafficC、To block certain traffic by portsD、To monitor certain malicious traffic

考题 A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A、NIC filtering is enabled.B、Port security is configured.C、NIC is not in promiscuous mode.D、NIC is in promiscuous mode.

考题 Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()A、HubB、VLANC、RouterD、Server

考题 Which of the following options best justifies why a DNS server should be run in a large network system?()A、To use ftp and telnetB、To perform NFS mountsC、To make /etc/hosts files unnecessaryD、To reduce network traffic and save bandwidth

考题 You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()A、VPN TrafficB、DNS TrafficC、LDAP TrafficD、HTTP TrafficE、HTTPS TrafficF、Traffic from the network address of 192.168.10/24

考题 Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).A firewall separates the internal network from the Internet.  The firewall blocks all outbound traffic except for HTTP and SMTP traffic.You install a DNS server. The DNS server is configured to use the default root hints. You need to ensure that the DNS server can resolve the host names on the Internet.  Which port should you open on the firewall?()A、53B、135C、500D、3389

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A、Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B、Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C、Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D、Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()A、Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.B、Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.C、Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.D、Create a Pattern Match capture trigger for the 131.107.0.1 IP address.

考题 Recently traffic to the company web server has more than doubled, resulting in slower response times from the server.  An administrator has decided to add a second, identical 10/100/1000 NIC to the server.  The server is presently connected to a 10/100/1000 switch, with four open ports on the switch.  Which of the following is the BEST solution to speed up web traffic?()A、Free up more ports on the switchB、Enable server load balancingC、Move the second network adapter to a new subnetD、Enable network adapter teaming

考题 单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A NIC filtering is enabled.B Port security is configured.C NIC is not in promiscuous mode.D NIC is in promiscuous mode.

考题 单选题Which of the following options best justifies why a DNS server should be run in a large network system?()A To use ftp and telnetB To perform NFS mountsC To make /etc/hosts files unnecessaryD To reduce network traffic and save bandwidth

考题 单选题Recently traffic to the company web server has more than doubled, resulting in slower response times from the server.  An administrator has decided to add a second, identical 10/100/1000 NIC to the server.  The server is presently connected to a 10/100/1000 switch, with four open ports on the switch.  Which of the following is the BEST solution to speed up web traffic?()A Free up more ports on the switchB Enable server load balancingC Move the second network adapter to a new subnetD Enable network adapter teaming

考题 多选题An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic.  Which of the following settings would BEST provide additional monitoring security?()ASetting up a custom community nameBConfiguring the network to block traffic on port 161CConfiguring the Windows Firewall to block port 161DSetting SNMP to read only on the devicesEInstalling new MIBs

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()A Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.B Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.C Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.D Create a Pattern Match capture trigger for the 131.107.0.1 IP address.

考题 单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()A  NIC filtering is enabled.B  Port security is configured.C  NIC is not in promiscuous mode.D  NIC is in promiscuous mode.

考题 单选题You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet.You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks:  (1)Detect and identify traffic that is sent by the worm.  (2)Immediately send a notification to a network administrator that the infected computer needs to be repaired.   What should you do?()A Configure a WMI event trigger.B Configure a Network Monitor capture filter.C Configure a Network Monitor trigger.D Configure a System Monitor alert.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

考题 单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).A firewall separates the internal network from the Internet.  The firewall blocks all outbound traffic except for HTTP and SMTP traffic.You install a DNS server. The DNS server is configured to use the default root hints. You need to ensure that the DNS server can resolve the host names on the Internet.  Which port should you open on the firewall?()A 53B 135C 500D 3389