For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()A、VPN concentratorB、

题目

For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()

  • A、VPN concentrator
  • B、Virtual servers
  • C、Wireless
  • D、Multimode fiber

相似考题
更多“For security reasons a network ”相关问题
  • 第1题:

    For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。

    A.IP

    B.ICMP

    C.TCP

    D.UDP


    参考答案:B

  • 第2题:

    What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()

    • A、The network was originated via redistribution of an interior gateway protocol into BGP
    • B、The network was defined by a static route
    • C、The network was originated via a network or aggregate command
    • D、The network was learned via EBGP
    • E、The network was learned via IBGP

    正确答案:A,C

  • 第3题:

    What are three characteristics that buyers of Cisco Small Business routers typically look for?()

    • A、 basic security options
    • B、 simple network configuration
    • C、 advanced network configuration
    • D、 integrated solutions
    • E、 advanced security options
    • F、 point products

    正确答案:B,E,F

  • 第4题:

    What are the benefit of using Netflow?()

    • A、Network, Application & User Monitoring
    • B、Network Planning
    • C、Security Analysis
    • D、Accounting/Billing

    正确答案:A,C

  • 第5题:

    A network vulnerability scanner is part of which critical element of network and system security?()

    • A、host security
    • B、perimeter security
    • C、security monitoring
    • D、policy management

    正确答案:C

  • 第6题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第7题:

    There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()

    • A、the use of hosted email services eliminating the need for local security
    • B、the perceived costs of security solutions
    • C、the lack of risk analysis
    • D、the lack of threats to their network
    • E、the belief that free security tools are sufficient
    • F、the desire to avoid unnecessary technologies

    正确答案:B,C

  • 第8题:

    Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

    • A、Honeynet
    • B、Honeypot
    • C、Vulnerability scanner
    • D、Network based IDS

    正确答案:A

  • 第9题:

    单选题
    A network vulnerability scanner is part of which critical element of network and system security?()
    A

     host security

    B

     perimeter security

    C

     security monitoring

    D

     policy management


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()
    A

    IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats

    B

    detailed security device specifications

    C

    results from pilot network testing

    D

    results from a network audit


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()
    A

    a list of applications currently in use in the network

    B

    IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats

    C

    detailed security device specifications

    D

    results from pilot network testing


    正确答案: B
    解析: 暂无解析

  • 第12题:

    多选题
    There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()
    A

    the desire to avoid unnecessary technologies

    B

    the belief that free security tools are sufficient

    C

    the perceived costs of security solutions

    D

    the use of hosted email services eliminating the need for local security

    E

    the lack of threats to their network

    F

    the lack of risk analysis


    正确答案: A,C
    解析: 暂无解析

  • 第13题:

    Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the network

    A.complex
    B.unique
    C.catchy
    D.long

    答案:B
    解析:
    网络安全概念。

  • 第14题:

    What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()

    • A、The network was originated via redistribution of an interior gateway protocol into BGP
    • B、The network was defined by a static route
    • C、The network was learned via IBGP
    • D、The network was learned via EBGP
    • E、The network was originated via a network or aggregate command

    正确答案:A,E

  • 第15题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第16题:

    How does the Cisco Security Agent proactively stop both known and unknown attacks?()

    • A、 It reverse engineers and documents the attack
    • B、 It looks subjectively at network traffic for abnormal flows of behavior
    • C、 It creates a signature and updates the network security policies
    • D、 It actively monitors all vulnerable areas of the network

    正确答案:B

  • 第17题:

    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()

    • A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
    • B、a list of the customer requirements
    • C、detailed security device specifications
    • D、results from pilot network testing

    正确答案:B

  • 第18题:

    What are three valid reasons to assign ports to VLANs on a switch? ()

    • A、to make VTP easier to implement
    • B、to isolate broadcast traffic
    • C、to increase the size of the collision domain
    • D、to allow more devices to connect to the network
    • E、to logically group hosts according to function
    • F、to increase network security

    正确答案:B,E,F

  • 第19题:

    Which two are needed components when designing and implementing a security solution?()

    • A、detailed VLAN information
    • B、an incident response plan
    • C、results of testing the new network configuration
    • D、an existing hierarchical network topology
    • E、a security policy for your organization

    正确答案:B,E

  • 第20题:

    Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()

    • A、From Network Connections, right-click the active network connection, and then click Status.
    • B、From Network Connections, select the active network connection, and then click Diagnose this connection.
    • C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.
    • D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

    正确答案:D

  • 第21题:

    单选题
    You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()
    A

     Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.

    B

     Configure the network adapter on the test network to disable IEEE 802.1x authentication.

    C

     Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.

    D

     Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.

    E

     Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    What are three valid reasons to assign ports to VLANs on a switch?()
    A

    to make VTP easier to implement

    B

    to isolate broadcast traffic

    C

    to increase the size of the collision domain

    D

    to allow more devices to connect to the network

    E

    to logically group hosts according to function

    F

    to increase network security


    正确答案: E,D
    解析: 暂无解析

  • 第23题:

    单选题
    For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()
    A

    IP

    B

    ICMP

    C

    TCP

    D

    UDP


    正确答案: A
    解析: 暂无解析