Update the antivirus application
Install critical update security patches
Adjust the software firewall settings
Replace the current antivirus program
第1题:
A.facility
B.fascination
C.faculty
D.assassination
第2题:
第3题:
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()
A. intrusion protection
B. identity
C. secure connectivity
D. security management
第4题:
第5题:
A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface. Which of the following files would show the commands that have been performed from within smit and their resulting output()
第6题:
Recently, there has been many orders ____ the said goods.
第7题:
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()
第8题:
Under which of the following circumstances would a technician use IPCONFIG /RENEW?()
第9题:
A server technician has been attempting to install an operating system on the company test server for several days. The technician has experienced error messages at several points of theinstallation and the system has frozen during various parts of the boot process. The technician has replaced the power supply, graphics card and installation disk with known good components.Which of the following could be causing these issues?()
第10题:
An IBM technician specialist has a prospective customer who is excited about eX5 and is working on configuration for a very large complex opportunity. During the engagement the customer has changed the design several times and has significantly increased the scope. The customers recently selected a Business Partner who has been involved in the last few design changes. What steps should the IBM technician specialist take to make sure the customer is satisfied with the solution?()
第11题:
It has recently been reupholstered.
It has additional unlisted accessories.
It was manufactured 5 years ago.
It has been well maintained.
第12题:
Storage driver not loaded
Fragmented hard drive
Damaged or faulty NIC chipset
Damaged or faulty system board
Memory incompatible with the processor
Missing voltage regulator
第13题:
A.verified
B.examined
C.checked
D.stated
第14题:
Users are unable to stay connected to the company‘s wireless network. Several times throughoutthe day the users‘ signals are dropped and they are forced to reconnect to the network.A technician determines the network cabling that supplies the WAP has been run inside with severalpower lines.Which of the following is the MOST likely cause of the network issue?()
A.Ashort
B.Open pairs
C.ESD
D.EMI
第15题:
第16题:
第17题:
The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?()
第18题:
The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()
第19题:
Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()
第20题:
A technician has been given a task to create a separate location for disaster recovery. Thecompany has very high uptime requirements and will lose money if there is any downtime. Whichof the following deployments should the technician consider?()
第21题:
A client has called with concerns that their computer problem has not been resolved by the onsite technician who has left. As the technicians supervisor, which of the following is the BEST course of action in this situation?()
第22题:
Update the antivirus application
Install critical update security patches
Adjust the software firewall settings
Replace the current antivirus program
第23题:
on leave
on duty
on patrol
on guard
第24题:
A new default gateway has been setup.
A new Internet shortcut has been added.
A new web browser has been installed and is now the default.
A proxy server has been enabled.