niusouti.com

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it m

题目

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

A. intrusion protection

B. identity

C. secure connectivity

D. security management


相似考题
更多“The Schuyler and Livingston Iron Works has been working on getting its network security un ”相关问题
  • 第1题:

    You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()

    • A、14
    • B、16
    • C、30
    • D、32
    • E、62
    • F、64

    正确答案:C

  • 第2题:

    The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()

    • A、 intrusion protection
    • B、 identity
    • C、 secure connectivity
    • D、 security management

    正确答案:A,B

  • 第3题:

    To ensure device security, Cisco Network Admission Control works with antivirus software onwhich two endpoints? ()

    • A、 port
    • B、 server
    • C、 laptop
    • D、 wireless client

    正确答案:B,C

  • 第4题:

    A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()

    • A、The website has updated the security policies.
    • B、The user’s identity has been stolen.
    • C、The browser has been hijacked.
    • D、The user typed the website address incorrectly.

    正确答案:C

  • 第5题:

    You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()

    • A、Microsoft Baseline Security Analyzer (MBSA)
    • B、Security Configuration and Analysis console
    • C、gpresult.exe
    • D、Resultant Set of Policy console in planning mode

    正确答案:B

  • 第6题:

    单选题
    A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()
    A

    Update the antivirus application

    B

    Install critical update security patches

    C

    Adjust the software firewall settings

    D

    Replace the current antivirus program


    正确答案: A
    解析: 暂无解析

  • 第7题:

    单选题
    Cast irons weakness in tension and under shock loading limits its use to low pressure steam, air, oil and low speed water fittingsThe above sentence, most probably means ().
    A

    cast iron has weakness

    B

    cast iron can stand up shock loading

    C

    cast iron fittings are only suitable in low pressure situation

    D

    east iron fittings are not suitable in low pressure situation


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()
    A

    14

    B

    16

    C

    30

    D

    32

    E

    62

    F

    64


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Wrought iron has an inherent resistance to corrosion but is not to be had freely , its place has been taken by the cuprous alloysAccording to the above sentence , which of the following statements is true?()
    A

    Wrought iron can resist liquids flow

    B

    It is difficult to attain the wrought iron

    C

    Wrought iron should be combined with cuprous alloys

    D

    The cuprous alloys have mere disadvantages than wrought iron


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    A customer has been working with your company to purchase an iDataPlex cluster. They have a configuration from IBM and are getting ready to place an order. Which should be done of the following?()
    A

    A solution sizing questionnaire

    B

    Verify the customer has the proper racks

    C

    A Technical Delivery Assessment

    D

    Verify the customer has enough cooling in the computer room


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()
    A

    intrusion protection

    B

    identity

    C

    secure connectivity

    D

    security management


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    多选题
    TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()
    A

    199.141.27.33

    B

    199.141.27.112

    C

    199.141.27.119

    D

    199.141.27.126

    E

    199.141.27.175

    F

    199.141.27.208


    正确答案: B,A
    解析: 暂无解析

  • 第13题:

    In the plan phase, network readiness assessment addresses which customer need? Select exactly 1 answer(s) from the following:()。

    • A、an assessment of the preparedness of the customers existing system infrastructure to support a propose solution
    • B、a comprehensive design that has been customized based on the operations processes, network management processes, and tools of its system
    • C、an in-depth assessment of the operational environment required to support the operation of both the current and planned solutions
    • D、the optimal technologies for supporting its business requirements and objectives

    正确答案:A

  • 第14题:

    The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

    • A、intrusion protection
    • B、identity
    • C、secure connectivity
    • D、security management

    正确答案:B,D

  • 第15题:

    Router R1 exists in an Enterprise that uses EIGRP as its routing protocol. The show ip route command output on router R1 lists the following phrase: "Gateway of last resort is 1.1.1.1 to network 2.0.0.0". Whic h of the following is most likely to have caused this output to occur on R1?()

    • A、R1 has been configured with an ip default- network 2.0.0.0 command.
    • B、R1 has been configured with an ip route 0.0.0.0 0.0.0.0 1.1.1.1 command.
    • C、R1 has been configured with an ip route 2.0.0.0 255.0.0.0 1.1.1.1 command.
    • D、Another router has been configured with an ip default - network 2.0.0.0 command.
    • E、Another router has been configured with an ip route 2.0.0.0 255.0.0.0 1.1.1.1 command.

    正确答案:D

  • 第16题:

    A customer has been working with your company to purchase an iDataPlex cluster. They have a configuration from IBM and are getting ready to place an order. Which should be done of the following?()

    • A、A solution sizing questionnaire
    • B、Verify the customer has the proper racks
    • C、A Technical Delivery Assessment
    • D、Verify the customer has enough cooling in the computer room

    正确答案:C

  • 第17题:

    单选题
    A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()
    A

    The website has updated the security policies.

    B

    The user’s identity has been stolen.

    C

    The browser has been hijacked.

    D

    The user typed the website address incorrectly.


    正确答案: B
    解析: 暂无解析

  • 第18题:

    单选题
    Hannah finished building her new all-purpose projects room last year, and she has been working in the room ever since.
    A

    and she has been working in the room ever since

    B

    and since that time she has worked there

    C

    where always since she works

    D

    she has been working in that room ever since

    E

    and since then is working there


    正确答案: C
    解析:
    原句正确。C,D,E项语法不正确。B项没有A项恰当流畅。

  • 第19题:

    单选题
    You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()
    A

    Microsoft Baseline Security Analyzer (MBSA)

    B

    Security Configuration and Analysis console

    C

    gpresult.exe

    D

    Resultant Set of Policy console in planning mode


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following is the best version of sentences 10 and 11 (reproduced below) ?It is easy to see why this disease has been dismissed and ignored. Its because of it’s vagueness and mystery.
    A

    This disease has been dismissed and ignored because of its vagueness and mystery.

    B

    It is easy to see why this disease has been dismissed and ignored. It’s because of the vagueness and the mystery.

    C

    Vagueness and mystery dismiss and ignore this disease.

    D

    Why this disease has been dismissed and ignored is because of its vagueness and mystery.

    E

    It is easy for you to see why this disease has been dismissed and ignored. It is because of the vagueness and mystery.


    正确答案: C
    解析:
    A项用最简洁的方式将两个句子结合起来。B,D,E项不流畅。C项改变了句子的意思。

  • 第21题:

    单选题
    Its business culture,()has brought the world “shareholder value” and “IPOs”,()commercial thinking in recent years and will continue to do so.
    A

    which; has leaded

    B

    which; has been leading

    C

    that; has leaded

    D

    that; has been leading


    正确答案: C
    解析: 暂无解析

  • 第22题:

    多选题
    The Schuyler and Livingston Iron Works has been working on getting its network security under control.It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures. Which two areas of security would you advise the company to strengthen?()
    A

    intrusion protection

    B

    identity

    C

    secure connectivity

    D

    security management


    正确答案: A,C
    解析: 暂无解析

  • 第23题:

    单选题
    Mr. White works for a chemicals import and export company, but he has been working for this industrial fair, while he is _______ from that company.
    A

    on leave

    B

    on duty  

    C

    on patrol    

    D

    on guard


    正确答案: A
    解析:
    怀特先生在一家化学制品进出口公司工作。但在休假期间,他一直在工业博览会干活。on leave休假。on duty值班,上班。on patrol在巡逻中。on guard在岗,警惕。