单选题An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A NIPSB HoneypotC DMZD NIDS

题目
单选题
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
A

NIPS

B

Honeypot

C

DMZ

D

NIDS


相似考题
更多“单选题An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A NIPSB HoneypotC DMZD NIDS”相关问题
  • 第1题:

    An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()

    A. WMI

    B. RIS

    C. DNS

    D. SNMP

    E. SMTP


    参考答案:A, D

  • 第2题:

    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network.Which of the following would allow you accomplish this?()

    A.STP

    B.GVRP

    C.SNMP

    D.VTP

    E.DHCP


    参考答案:D

  • 第3题:

    Using network monitoring tools would allow an administrator to do which of the following?()

    • A、Configure offline devices
    • B、Examine performance issues
    • C、Install additional software and updates
    • D、View syslog events

    正确答案:B

  • 第4题:

    An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()

    • A、Disable SSID
    • B、WPA
    • C、MAC filtering
    • D、RAS

    正确答案:A

  • 第5题:

    Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()

    • A、net view
    • B、ipconfig
    • C、dig
    • D、ifconfig

    正确答案:C

  • 第6题:

    An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()

    • A、audit
    • B、syslog
    • C、TCB
    • D、sysck

    正确答案:A

  • 第7题:

    单选题
    Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()
    A

    net view

    B

    ipconfig

    C

    dig

    D

    ifconfig


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
    A

    STP

    B

    GVRP

    C

    SNMP

    D

    VTP

    E

    DHCP


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()
    A

    WPA-PSK encryption

    B

    SSID broadcast

    C

    Port forwarding

    D

    MAC filtering


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()
    A

    Disable SSID

    B

    WPA

    C

    MAC filtering

    D

    RAS


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address.  Which of the following tools would allow the administrator to test name resolution?()
    A

     net view

    B

     ipconfig

    C

     dig

    D

     ifconfig


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()
    A

    WMI

    B

    RIS

    C

    DNS

    D

    SNMP

    E

    SMTP


    正确答案: C,E
    解析: 暂无解析

  • 第13题:

    Anadministratorwantstoproactivelycollectinformationonattackersandtheirattemptedmethodsofgainingaccesstotheinternalnetwork.Whichofthefollowingwouldallowtheadministratortodothis?()

    A.NIPS

    B.Honeypot

    C.DMZ

    D.NIDS


    参考答案:B

  • 第14题:

    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

    • A、WEP encryption
    • B、Channel rotation
    • C、Disable SSID
    • D、WPA encryption

    正确答案:D

  • 第15题:

    Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()

    • A、 VLAN
    • B、 KVM
    • C、 IP KVM
    • D、 RAID

    正确答案:C

  • 第16题:

    An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()

    • A、WMI
    • B、RIS
    • C、DNS
    • D、SNMP
    • E、SMTP

    正确答案:A,D

  • 第17题:

    An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()

    • A、NIPS
    • B、Honeypot
    • C、DMZ
    • D、NIDS

    正确答案:B

  • 第18题:

    单选题
    An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()
    A

    audit

    B

    syslog

    C

    TCB

    D

    sysck


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    An administrator has encountered an error while patching a virtualized guest machine. Which of the following technologies would allow the administrator to restore to a pre-patched state the FASTEST?()
    A

    Cloning

    B

    Bare Metal Restore

    C

    OS Restore

    D

    Snapshot


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()
    A

     VLAN

    B

     KVM

    C

     IP KVM

    D

     RAID


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Using network monitoring tools would allow an administrator to do which of the following?()
    A

    Configure offline devices

    B

    Examine performance issues

    C

    Install additional software and updates

    D

    View syslog events


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()
    A

    Network management

    B

    Protocol analyzer

    C

    Network monitoring

    D

    System diagnostic


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析