单选题You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A Content storage networkingB Network optimizationC Network managementD Network sec

题目
单选题
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
A

Content storage networking

B

Network optimization

C

Network management

D

Network security


相似考题
参考答案和解析
正确答案: C
解析: 暂无解析
更多“单选题You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A Content storage networkingB Network optimizationC Network managementD Network sec”相关问题
  • 第1题:

    You are the network consultant from passguide.com. You should tell your clients Two technologies help them save much time from complex computing. ()

    • A、VPN
    • B、InfiniBand
    • C、SCSI over IP
    • D、Remote Direct Memory Access

    正确答案:A,C

  • 第2题:

    Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()

    • A、Content networking
    • B、Campus local-area networking
    • C、Network management
    • D、Network security

    正确答案:C

  • 第3题:

    You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()

    • A、Content storage networking
    • B、Network optimization
    • C、Network management
    • D、Network security

    正确答案:D

  • 第4题:

    You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

    • A、Repeater
    • B、Wireless router
    • C、Hub
    • D、Wireless network adapter

    正确答案:D

  • 第5题:

    Your network contains a server named Server1 that runs Windows Server 2003 Service Pack (SP2). You install a new network adapter on Server1. You need to view the media access control (MAC) address for the new network adapter. What should you do? ()

    • A、At the command prompt, run Ipconfig /all.
    • B、At the command prompt, run Net view //server1.
    • C、From the Device Manager snap-in, view the properties of the network adapter.
    • D、From the Services snap-in, view the properties on the Network Connections service.

    正确答案:A

  • 第6题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()

    • A、Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.
    • B、Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.
    • C、Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.
    • D、Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

    正确答案:C

  • 第7题:

    You need to create a VPN connection. What should you do?()

    • A、From Windows Explorer, right-click Computer and then click Map network drive.
    • B、From Windows Explorer, right-click Computer and then click Add a network location.
    • C、From Network and Sharing Center, click Set up a new connection or network and then click Set up anew network.
    • D、From Network and Sharing Center, click Set up a new connection or network and then click Connect to aworkplace.

    正确答案:D

  • 第8题:

    单选题
    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()
    A

    IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats

    B

    detailed security device specifications

    C

    results from pilot network testing

    D

    results from a network audit


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
    A

    Network management

    B

    Network optimization

    C

    Network security

    D

    Content storage networking


    正确答案: B
    解析: 暂无解析

  • 第10题:

    多选题
    You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()
    A

    Encryption

    B

    Bandwidth limits

    C

    Minimal signal loss

    D

    No EMI


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    单选题
    Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()
    A

     Create an IPsec Enforcement Network policy

    B

     Create an 802.1X enforcement network policy

    C

     Create a wired network (IEEE 802.3) Group Policy

    D

     Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()
    A

    Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.

    B

    Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.

    C

    Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.

    D

    Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()

    • A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
    • B、detailed security device specifications
    • C、results from pilot network testing
    • D、results from a network audit

    正确答案:D

  • 第14题:

    Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()

    • A、 Create an IPsec Enforcement Network policy
    • B、 Create an 802.1X enforcement network policy
    • C、 Create a wired network (IEEE 802.3) Group Policy
    • D、 Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy

    正确答案:A

  • 第15题:

    You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()

    • A、Protecting the business from information outages
    • B、Optimizing the efficiency with which IT operates
    • C、An increased need for specialized IT silos
    • D、IT systems grow fast

    正确答案:A,B,D

  • 第16题:

    You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()

    • A、Executable
    • B、Trojan
    • C、Virus
    • D、Worm

    正确答案:C,D

  • 第17题:

    Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()

    • A、Create an IPsec Enforcement Network policy.
    • B、Create an 802.1X Enforcement Network policy.
    • C、Create a Wired Network (IEEE 802.3) Group policy.
    • D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

    正确答案:A

  • 第18题:

    All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()

    • A、Configure the Network authentication (Shared mode) setting.
    • B、Apply a Wireless Network Policy to set the network type to WPA-PSK.
    • C、Apply a Wireless Network Policy to automatically connect to the company wireless network.
    • D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

    正确答案:D

  • 第19题:

    Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()

    • A、From Credential Manager, modify the generic credentials.
    • B、From Credential Manager, modify the Windows credentials.
    • C、From Network and Sharing Center, turn on Network discovery.
    • D、From Network and Sharing Center, modify the wireless network connection settings.

    正确答案:D

  • 第20题:

    单选题
    All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()
    A

    Configure the Network authentication (Shared mode) setting.

    B

    Apply a Wireless Network Policy to set the network type to WPA-PSK.

    C

    Apply a Wireless Network Policy to automatically connect to the company wireless network.

    D

    Apply a Wireless Network Policy to set the company wireless network as the preferred network.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()
    A

    An increased need for specialized IT silos

    B

    Protecting the business from information outages

    C

    IT systems grow fast

    D

    Optimizing the efficiency with which IT operates


    正确答案: C,D
    解析: 暂无解析

  • 第22题:

    单选题
    You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
    A

    Repeater

    B

    Wireless router

    C

    Hub

    D

    Wireless network adapter


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()
    A

    Configure a Windows Connect Now Group Policy.

    B

    Configure a Wireless Network (IEEE 802.11) Policy.

    C

    Delete the rogue network from the Network and Sharing Center on each computer.

    D

    Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()
    A

    Create an IPsec Enforcement Network policy.

    B

    Create an 802.1X Enforcement Network policy.

    C

    Create a Wired Network (IEEE 802.3) Group policy.

    D

    Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.


    正确答案: B
    解析: 暂无解析