Dedicated lines for high security data transfer
Data and audio signals that share the same communications infrastructure
Secure access to company extranet
Simple solution for high-quality digital video using coaxial cable
第1题:
Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()
第2题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
第3题:
Which of the following connection types use a phone line as a carrier to provide access to theInternet?()
第4题:
What is the goal of the borderless network architecture?()
第5题:
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
第6题:
Which encryption type is used to secure user data in an IPsec tunnel?()
第7题:
You have a computer that runs Windows 7. The computer contains a folder named C:/data. You use Advanced Sharing to share C:/data by using the default share permissions. When a user tries to access theshare over the network, he gets an Access is Denied error message. You need to ensure that the user canaccess the share. What should you do?()
第8题:
provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit
authenticates users and devices so that it is impossible for a rogue device to be connected to the network
allows you to centralize management, automate repetitive tasks, and provision IP services easily
centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN
第9题:
Signal strength (4th access point)
Signal strength (3rd access point)
Channel interference
Predictive physical data rate downlink (2nd access point)
第10题:
Facilitate Employee Reachability
Unable to provide rapid secure access to customer history, data or buying behavior
Need to provide XYZ LTD with a basic up-to-date website
Provide rapid access for geographically dispersed employees
Need to facilitate customer reachability
Provide a Website on par with competitors
第11题:
Member data have no access modifiers.
Member data can be modified directly.
The access modifier for methods is protected.
The access modifier to member data is private.
Methods provide for access and modification of data.
第12题:
Allow file and printer sharing through Windows Firewall.
Change the network location from a Public network to a Home or Work network.
From the Security settings of the folder, assign the user the Read NTFS permission.
From the Advanced Sharing settings of the folder, assign the user the Read share permission.
第13题:
Select a key benefit of DSL.()
第14题:
A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()
第15题:
Which three can be symptoms of the growth phase in the Cisco SBR methodology?()
第16题:
Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()
第17题:
Which two demonstrate encapsulation of data?()
第18题:
ABC Corp. is implementing 11i Oracle Applications. The company has two local administrators in separate locations. They need to ensure that only a relevant set of users is visible to each of these local administrators. Which action will meet the requirement?()
第19题:
routing
service Debug
service Security Audit
workflow Unhandled Exception
第20题:
create a separate role for each local administrator
specify user administration privileges in Oracle User Management
use Data Security to provide relevant access to each local administrator
use Function Security to provide relevant access to each local administrator
第21题:
In the supply closet so anyone can access them if needed
Near the server for easy access to restore files
Locked in a cabinet in the IT Manager’s office
At a secure off-site storage facility
第22题:
The cell phone should require a password after a set period of inactivity.
The cell phone should only be used for company related emails.
The cell phone data should be encrypted according to NIST standards.
The cell phone should have data connection abilities disabled.
第23题:
Secure access to company extranet
Dedicated lines for high security data transfer
Simple solution for high-quality digital video using coaxial cable
Data and audio signals that share the same communications infrastructure
第24题:
WEP encryption
Channel rotation
Disable SSID
WPA encryption