第1题:
The underlined word \\\"hacker\\\" (Para. 1) most probably means \\\"________\\\".
[A] highly recognizable names behind many of the computer technologies used today
[B] the negative connotation of those computer users
[C] a game, employing the tools that are readily available via the Internet
[D] people who break into computer systems
第2题:
第3题:
第4题:
第5题:
第6题:
What can you install on IPCC Express to protect against worms, zero-day viruses, and other immediate security threats?()
第7题:
A technician wants to decrease the overall attack surface of the servers in a data center through decreasing the number of open network ports on each server. Which of the following could the technician implement to increase security?()
第8题:
You share your computer with other users. You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users. What should you do?()
第9题:
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()
第10题:
Which two statements are true regarding IDP?()
第11题:
Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers. You purchase a new computer. You install Microsoft Windows Vista on the new computer. You need to migrate the following content from the old computer to the new computer: All system and program settings All users settings Only the content in the C:///Appdata folder Which tool should you use? ()
第12题:
You are the domain administrator for TestKing's Active Directory domain named All client computers run Windows XP Professional. You need to implement a solution for managing security updates on client computers. You plan to use a Windows Server 2003 computer to manage security updates. Your solution for managing security updates must meet the following requirements: 1. You must not purchase additional software or licences. 2. Security updates must be installed automatically. 3. You must be able to control which updates are available to install. 4. Security updates must synchronize automatically with the latest updates offered by Microsoft. You need to implement a solution for managing security updates that meets the requirements. What should you do?()
第13题:
Which of the following is NOT true of security attacks?
[A] Employees will keep up with security polices and awareness if they are highly-trained.
[B] The rate of security attacks appears faster than the growth of the Internet.
[C] One's computer system will never be secure.
[D] Vulnerabilities can go through phones, wireless devices, and network appliances
第14题:
第15题:
第16题:
第17题:
第18题:
The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()
第19题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional, and all client computer objects are store din the Clients organizational unit (OU). Client computers receive critical security patches from servers at Microsoft. A server named Testking1 runs Software Update Services (SUS). You enable Testking1 to obtain and store security patches for distribution on the internal network. Now you need to ensure that all client computers receive future security patches from Testking1 only. You open the Group Policy object (GPO) for the Clients OU. Which setting should you configure?()
第20题:
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()
第21题:
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
第22题:
Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer. What should you do?()
第23题:
You need to reduce the level of access that a malicious Web site might have to your computer. What should you do? ()