Network diagram
Performance baseline
Network security procedure
Company policy
第1题:
An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()
第2题:
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
第3题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第4题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第5题:
Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()
第6题:
Prepare
Design
Position
Develop
Plan
Perform
第7题:
20 percent of the traffic on a network segment should be local.
no more than 20 percent of the network traffic should be able to move across a backbone.
no more than 80 percent of the network traffic should be able to move across a backbone.
80 percent of the traffic on a network segment should be local.
第8题:
SNTP
SMTP
HTTP
SNMP
第9题:
Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.
Configure the network adapter on the test network to disable IEEE 802.1x authentication.
Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.
Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.
Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
第10题:
host security
perimeter security
security monitoring
policy management
第11题:
WEP encryption
Channel rotation
Disable SSID
WPA encryption
第12题:
Position
Prepare
Design
Perform
Plan
第13题:
A network vulnerability scanner is part of which critical element of network and system security?()
第14题:
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
第15题:
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()
第16题:
Which of the following protocols should be used to monitor network performance?()
第17题:
You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain. Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network. How should you configure Server1?()
第18题:
IDS
IPS
Firewall
Managed PKI
第19题:
Default gateway
The ports on the switch
Port security on the server's switch port
Ethernet cable
第20题:
Configure the Network authentication (Shared mode) setting.
Apply a Wireless Network Policy to set the network type to WPA-PSK.
Apply a Wireless Network Policy to automatically connect to the company wireless network.
Apply a Wireless Network Policy to set the company wireless network as the preferred network.
第21题:
Default gateway
The ports on the switch
Port security on the servers switch port
Ethernet cable
第22题:
Verity full system functionality
Identify the main problem and question the user
Document their findings, actions, and outcomes
Escalate the issue to upper management
第23题:
the business knowledge of the IT staff
the technical knowledge of the IT staff
the company’s business objectives
the company’s network topology
the IT future directions