更多“单选题Which of the following protocols would BEST grant the user secure access to a remote location?()A VPNB FTPC POP3D DNS”相关问题
  • 第1题:

    A user would like to ensure that only their family and their laptops can access a newly installed wireless router. Which of the following BEST accomplishes this?()

    • A、MAC filtering
    • B、Disable DHCP
    • C、Static IP addresses
    • D、Port forwarding

    正确答案:A

  • 第2题:

    Which of the following groups is BEST to assign to a home user to prevent software installation?()

    • A、Users
    • B、Administrators
    • C、Power Users
    • D、Remote Desktop Users

    正确答案:A

  • 第3题:

    Which of the following is the access level of a user that belongs to both the Administrators andUsers groups?()

    • A、User
    • B、Administrator
    • C、Power User
    • D、Remote Desktop User

    正确答案:B

  • 第4题:

    Which of the following would an administrator use to configure a server’s BIOS settings even if the OS crashes?()

    • A、 VPN
    • B、 KVM over IP
    • C、 Telnet
    • D、 Remote Desktop

    正确答案:B

  • 第5题:

    Which of the following is a secure method of remote access via command line?()

    • A、RCP
    • B、Telnet
    • C、RSH
    • D、SSH

    正确答案:D

  • 第6题:

    Which of the following protocols would BEST grant the user secure access to a remote location?()

    • A、VPN
    • B、FTP
    • C、POP3
    • D、DNS

    正确答案:A

  • 第7题:

    单选题
    Which of the following would an administrator use to configure a server’s BIOS settings even if the OS crashes?()
    A

     VPN

    B

     KVM over IP

    C

     Telnet

    D

     Remote Desktop


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following is a secure method of remote access via command line?()
    A

    RCP

    B

    Telnet

    C

    RSH

    D

    SSH


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following would be the BEST location to research current physical layout?()
    A

    Remote management software

    B

    Rack diagrams

    C

    OEM documentation

    D

    Pre-installation plans


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()
    A

    Modify

    B

    Full control

    C

    Write

    D

    Read


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()
    A

    Configuring the Windows Firewall exceptions.

    B

    Using Windows Messenger.

    C

    Configuring My Network Places.

    D

    Using Internet Explorer.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()

    • A、 VLAN
    • B、 KVM
    • C、 IP KVM
    • D、 RAID

    正确答案:C

  • 第14题:

    A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?()

    • A、Operating system type of the connected PCs
    • B、Location of the wireless router
    • C、Number of PCs that will access the network
    • D、Number of available Ethernet ports on the router

    正确答案:B

  • 第15题:

    Which of the following topology situations would be a qood candidate for configuring DMVPN()

    • A、Extranet VPN
    • B、Managed overlay VPN topology
    • C、Hub-and-spoke VPN topology
    • D、Central-site VPN topology
    • E、Full mesh VPN topology
    • F、Remote-access VPN topology

    正确答案:E

  • 第16题:

    Which of the following protocols would a multilayer switch use to learn the IP address of a directly connected device?()

    • A、ARP
    • B、BOOTP
    • C、Inverse-ARP
    • D、DNS

    正确答案:A

  • 第17题:

    Which of the following would be the BEST location to research current physical layout?()

    • A、Remote management software
    • B、Rack diagrams
    • C、OEM documentation
    • D、Pre-installation plans

    正确答案:B

  • 第18题:

    You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()

    • A、The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication
    • B、The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.
    • C、The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,
    • D、The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.

    正确答案:C

  • 第19题:

    单选题
    After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()
    A

    In the supply closet so anyone can access them if needed

    B

    Near the server for easy access to restore files

    C

    Locked in a cabinet in the IT Manager’s office

    D

    At a secure off-site storage facility


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()
    A

     VLAN

    B

     KVM

    C

     IP KVM

    D

     RAID


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    On the wlse, which of the following fault policies would be used to verify that access to the command-line interface of the access point is secure?()
    A

    registration error

    B

    authentication failures threshold

    C

    http disabled

    D

    telnet disabled


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()
    A

    The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication

    B

    The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.

    C

    The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,

    D

    The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    A user would like to ensure that only their family and their laptops can access a newly installed wireless router. Which of the following BEST accomplishes this?()
    A

    MAC filtering

    B

    Disable DHCP

    C

    Static IP addresses

    D

    Port forwarding


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following protocols would BEST grant the user secure access to a remote location?()
    A

    VPN

    B

    FTP

    C

    POP3

    D

    DNS


    正确答案: A
    解析: 暂无解析