单选题An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A IDSB IPSC FirewallD Managed PKI

题目
单选题
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()
A

IDS

B

IPS

C

Firewall

D

Managed PKI


相似考题
参考答案和解析
正确答案: C
解析: 暂无解析
更多“单选题An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A IDSB IPSC FirewallD Managed PKI”相关问题
  • 第1题:

    The Cisco network-based virtual firewall service solution helps service providers to deliver costeffective, scalable, integrated security services for enterprise customers using Cisco platforms .What is a virtual firewall?()

    A. another name for a firewall deployed in routed mode

    B. another name for a firewall deployed in transparent mode

    C. a separation of multiple firewall security contexts on a single firewall

    D. a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context


    参考答案:C

  • 第2题:

    The Cisco network-based virtual firewall service solution helps service providers to deliver cost-effective, scalable, integrated security services for enterprise customers using Cisco platforms.What is a virtual firewall?()

    • A、 another name for a firewall deployed in routed mode
    • B、 another name for a firewall deployed in transparent mode
    • C、 a separation of multiple firewall security contexts on a single firewall
    • D、 a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context

    正确答案:C

  • 第3题:

    You need to recommend which role services must be deployed to support the company’s planned changes.   Which two role services should you recommend?()

    • A、Health Registration Authority (HRA)
    • B、Host Credential Authorization Protocol (HCAP)
    • C、Network Policy Server (NPS)
    • D、Routing and Remote Access service (RRAS)

    正确答案:C,D

  • 第4题:

    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

    • A、BPDU
    • B、Port security
    • C、RSTP
    • D、STP
    • E、VTP
    • F、Blocking mode

    正确答案:B

  • 第5题:

    An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()

    • A、netstat
    • B、traceroute
    • C、nbtstat
    • D、ping

    正确答案:D

  • 第6题:

    An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()

    • A、NIPS
    • B、Honeypot
    • C、DMZ
    • D、NIDS

    正确答案:B

  • 第7题:

    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Outlook Web App to have access to their e-mail.A new Company.com policy prohibits the employees from downloading ZIP files from Outlook Web App.The CIO wants the employees to use Microsoft Office Outlook to download ZIP files.What should you do?()

    • A、The best option is to set up an Outlook Web App Mailbox policy.
    • B、The best option is to set up the Content Filter agent.
    • C、The best option is to set up a managed folder mailbox policy.
    • D、The best option is to set up the Attachment Filter agent.

    正确答案:A

  • 第8题:

    多选题
    A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years.  Which of the following locations should an administrator configure when complying with the new policy?()
    A

    Local workstations

    B

    Backup tapes

    C

    Domain controllers

    D

    Email server

    E

    SMTP gateway

    F

    Proxy server


    正确答案: C,E
    解析: 暂无解析

  • 第9题:

    单选题
    You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.A new Xxx usage policy prohibits the employees from using certain words in internal e-mail messaging.What actions must you take to have the policy implemented?()
    A

    You must set up an IP Block list.

    B

    You must set up sender filtering.

    C

    You must set up managed folders.

    D

    You must build a transport rule


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
    A

    NIPS

    B

    Honeypot

    C

    DMZ

    D

    NIDS


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()
    A

    Run the net view command.

    B

    Run the gpresult command.

    C

    Use the IP Security Monitor console.

    D

    Use the IPSec Policy Management console.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    A System p administrator is looking at changing attributes of a logical volume.  Which of the following must be defined when it is created()
    A

    placement of the logical volume

    B

    stripe size of the logical volume

    C

    inter-disk policy of the logical volume

    D

    intra-disk policy of the logical volume


    正确答案: B
    解析: 暂无解析

  • 第13题:

    下列哪些设备属于安全设备()。

    A.IDS

    B.IPS

    C.Firewall

    D.Switch


    参考答案:A, B, C

  • 第14题:

    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

    • A、WEP encryption
    • B、Channel rotation
    • C、Disable SSID
    • D、WPA encryption

    正确答案:D

  • 第15题:

    A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years.  Which of the following locations should an administrator configure when complying with the new policy?()

    • A、 Local workstations
    • B、 Backup tapes
    • C、 Domain controllers
    • D、 Email server
    • E、 SMTP gateway
    • F、 Proxy server

    正确答案:A,B,D

  • 第16题:

    下列哪些设备属于安全设备()。

    • A、IDS
    • B、IPS
    • C、Firewall
    • D、Switch

    正确答案:A,B,C

  • 第17题:

    An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()

    • A、IDS
    • B、IPS
    • C、Firewall
    • D、Managed PKI

    正确答案:A

  • 第18题:

    ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()

    • A、Run the net view command.
    • B、Run the gpresult command.
    • C、Use the IP Security Monitor console.
    • D、Use the IPSec Policy Management console.

    正确答案:C

  • 第19题:

    A System p administrator is looking at changing attributes of a logical volume.  Which of the following must be defined when it is created()

    • A、placement of the logical volume
    • B、stripe size of the logical volume
    • C、inter-disk policy of the logical volume
    • D、intra-disk policy of the logical volume

    正确答案:B

  • 第20题:

    单选题
    The Cisco network-based virtual firewall service solution helps service providers to deliver cost-effective, scalable, integrated security services for enterprise customers using Cisco platforms.What is a virtual firewall?()
    A

     another name for a firewall deployed in routed mode

    B

     another name for a firewall deployed in transparent mode

    C

     a separation of multiple firewall security contexts on a single firewall

    D

     a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Outlook Web App to have access to their e-mail.A new Company.com policy prohibits the employees from downloading ZIP files from Outlook Web App.The CIO wants the employees to use Microsoft Office Outlook to download ZIP files.What should you do?()
    A

    The best option is to set up an Outlook Web App Mailbox policy.

    B

    The best option is to set up the Content Filter agent.

    C

    The best option is to set up a managed folder mailbox policy.

    D

    The best option is to set up the Attachment Filter agent.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()
    A

    netstat

    B

    traceroute

    C

    nbtstat

    D

    ping


    正确答案: A
    解析: 暂无解析