niusouti.com

work(请作答此空),systems that effectively isolate an organization's internal network structure from an ( ) network, such as the INTERNET is becoming increasingly popular. These firewall systems typically act as application-layer( )between networks, usually off

题目
work(请作答此空),systems that effectively isolate an organization's internal network structure from an ( ) network, such as the INTERNET is becoming increasingly popular. These firewall systems typically act as application-layer( )between networks, usually offering controlled TELNET, FTP, and SMTP access. With the emergence of more sophisticated( )layer protocols designed to facilitate global information discovery , there exists a need to provide a general ( )for these protocols to transparently and securely traverse a firewall.

A.safeguards
B.firewalls
C.routers
D.switches

相似考题
参考答案和解析
答案:B
解析:
掌握基本词汇,本题还是比较容易的。参考翻译如下:
更多“work(请作答此空),systems that effectively isolate an organization's internal network structure from an ( ) network, such as the INTERNET is becoming increasingly popular. These firewall systems typically ”相关问题
  • 第1题:

    Basically, a firewall is a(145)process or a set of integrated processes that runs on a router or(146)to control the flow of networked application traffic(147)through it. Typically, firewalls are placed on the entry point to a(148)network such as the Internet. They could be considered traffic cops. The firewall's(149)is to ensure that all communication between an organization's network and the Internet conform. to the organization's policies.

    A.dependent

    B.isolated

    C.related

    D.standalone


    正确答案:D

  • 第2题:

    A firewall is a(71)system designed to(72)an organization's network against threats.

    A.operating

    B.programming

    C.security

    D.data


    正确答案:C
    解析:译文:防火墙是一个安全系统,它被设计用来保护某组织的网络不受破坏。

  • 第3题:

    A firewall is a(72)system designed to(73)an organization's network aga-inst threats.

    A.operating

    B.programming

    C.security

    D.service


    正确答案:C

  • 第4题:

    The use of network( ),systems that effectively isolate an organization&39;s internal network structure from an( )network, such as the INTERNET is becoming increasingly popular. These firewall systems typically act as application-layer( )between networks, usually offering controlled TELNET, FTP, and SMTP access. With the emergence of more sophisticated( )layer protocols designed to facilitate global information discovery , there exists a need to provide a general ( )for these protocols to transparently and securely traverse a firewall.

    A.safeguardsB.firewallsC.routersD.switches A.exteriorB.InternalC.centreD.middle A.hostsB.routersC.gatewaysD.officesA.networkB.sessionC.transmissionD.application A.frameworkB.internetworkC.computerD.application


    正确答案:B,A,A,D,A

  • 第5题:

    Secure Shell (SSH) is a cryptographic network protocol for ( ) remote login and other secure network services over an(请作答此空)network.The standard( )port for SSH is 22. The best known example application is for remote login to computer systems by users.
    SSH provides a secure channel over an insecured network in a( ) architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
    The most visible application of the protocol is for access to shell accounts on( )operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.

    A.secure
    B.insecure
    C.internet
    D.internal

    答案:B
    解析:
    Secure Shell (SSH) is a cryptographic network protocol for secure remote login and other secure network services over an insecure network.The standard TCP port for SSH is 22. The best known example application is for remote login to computer systems by users.
    SSH provides a secure channel over an insecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
    The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.

  • 第6题:

    The Hypertext Transfer Protocol , the Web's (请作答此空) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by ( ) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .

    A.transport-layer
    B.application-layer
    C.network-layer
    D.link-layer

    答案:B
    解析:
    Web的应用层协议是超文本传输协议,是web核心。HTTP在两类程序(客户端程序、服务器端程序)中执行。客户端程序、服务器端程序在不同的终端系统中执行,通过交换HTTP消息来进行交互。HTTP定义了Web客户端如何从服务器端请求Web页面以及服务器端如何传送Web页面到服务器。当用户请求一个web页面,浏览器发送页面对象的http请求给服务器。服务器接收请求并用包含对象的http消息进行响应。

  • 第7题:

    The Hypertext Transfer Protocol,the Web's(请作答此空)protocol,is at the heart of the Web.HTTP is implemented in two programs:a( )program and a server program.The client program and server program executing on different end systems,talk to each other by( )HTTP messages.HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients.when a user( )a web page,the browser sends http request messages for the objects in the page to the server.The server( )the requests and responds with http response messages that contain the objects.

    A.transport-layer
    B.application-layer
    C.network-layer
    D.link-layer

    答案:B
    解析:
    Web的应用层协议是超文本传输协议,是web核心。HTTP在两类程序(客户端程序、服务器端程序)中执行。客户端程序、服务器端程序在不同的终端系统中执行,通过交换HTTP消息来进行交互。HTTP定义了Web客户端如何从服务器端请求Web页面以及服务器端如何传送Web页面到服务器。当用户请求一个web页面,浏览器发送页面对象的http请求给服务器。服务器接收请求并用包含对象的http消息进行响应。

  • 第8题:

    Which service component in the implement phase is typically performed prior to the handover of a wireless solution to the customer’s operations organization?()

    • A、systems integration
    • B、skill assessment
    • C、systems acceptance testing
    • D、wireless check 
    • E、project close out

    正确答案:C

  • 第9题:

    Which service component in the implement phase is typically performed prior to the handover of a wirelesssolution to the customer’s operations organization?()

    • A、Systems Integration
    • B、Systems Acceptance Testing
    • C、Skill Assessment
    • D、Project Close Out
    • E、Wireless Check

    正确答案:A

  • 第10题:

    Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()

    • A、3389 and 25
    • B、3389 and 636
    • C、50636 and 25
    • D、50636 and 135

    正确答案:C

  • 第11题:

    You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()

    • A、The best option is to use port 3309 and 25 from the internal network to the perimeter network.
    • B、The best option is to use port 3309 and 636 from the internal network to the perimeter network.
    • C、The best option is to use port 50636 and 25 from the internal network to the perimeter network.
    • D、The best option is to use port 50636 and 135 from the internal network to the perimeter network.

    正确答案:C

  • 第12题:

    单选题
    You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()
    A

    The best option is to use port 3309 and 25 from the internal network to the perimeter network.

    B

    The best option is to use port 3309 and 636 from the internal network to the perimeter network.

    C

    The best option is to use port 50636 and 25 from the internal network to the perimeter network.

    D

    The best option is to use port 50636 and 135 from the internal network to the perimeter network.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Basically, a(71)is a standalone process or a set of integrated processes that runs on a router or server to control the flow of(72)application traffic(73)through it. Typically, firewalls are(74)on the entry point to a public network such as the Internet. They could be considered traffic cops. The firewall' s(75)is to ensure that all communication between an organization's network and the Internet conform. to the organization's security policies.

    A.router

    B.client

    C.firewall

    D.switch


    正确答案:A

  • 第14题:

    A local-area network(LAN)is a communications network that(125)a variety of devices and provides a(126)for information exchange among those devices. The scope of the LAN is small typically a single building or a cluster(丛)of buildings. The LAN is usually owned by the same organization that owns the(127)devices. The internal data rate of LAN is at least several Mb/s.The basic of LAN communication is broadcasting. At each station, there is a transmitter/receiver that communicates over a(128)shared, By other stations. A transmission from any one station is(129)to and received by all other stations.

    A.broadcast

    B.cable

    C.control

    D.interconnects

    E.internet


    正确答案:D

  • 第15题:

    Unlike more traditional embedded systems,a full-fledged CPS is typically designed as a ( ) of interacting elements with physical input and output instead of as standalone devices.

    A.system

    B.mechanism

    C.net

    D.network


    正确答案:A

  • 第16题:

    The number of home users and small businesses that want to use the Internet is ever increasing. The shortage of addresses is becoming a serious problem. A quick solution to this problem is called network address translation(NAT).NAT enables a user to have a large set of addresses( )and one address, or a smallset of addresses,externally. The traffic inside can use the large set; the traffic( ), the small set. To separate the addresses used inside the home or business and the ones used for the Internet, the Internet authorities have reserved three sets of addresses as ( ) addresses. Any organization can use an address out of this set withoutpermission from the Internet authorities. Everyone knows that these reserved addresses are for private networks.They are ( ) inside the organization, but they are not unique globally. No router will (请作答此空) a packet that has one of these addresses as the destination address.The site must have only one single connection to the global Internet through a router that runs the NAT software.

    A.reject
    B.receive
    C.deny
    D.forward

    答案:D
    解析:
    理解NAT的基本工作原理,这题就简单了。

  • 第17题:

    Secure Shell (SSH) is a cryptographic network protocol for ( ) remote login and other secure network services over an( )network.The standard(请作答此空)port for SSH is 22. The best known example application is for remote login to computer systems by users.
    SSH provides a secure channel over an insecured network in a( ) architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
    The most visible application of the protocol is for access to shell accounts on( )operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.

    A.ICMP
    B.IGMP
    C.TCP
    D.UDP

    答案:C
    解析:
    Secure Shell (SSH) is a cryptographic network protocol for secure remote login and other secure network services over an insecure network.The standard TCP port for SSH is 22. The best known example application is for remote login to computer systems by users.
    SSH provides a secure channel over an insecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
    The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.

  • 第18题:

    An architectural Style defines as a family of such systems in terms of a ( )of structural organization. More specifically an architectural style defines a vocabulary of( ) and connector types, and a set of( )on how they can be combined. For many styles there may also exist one or more ( ) that specify how to determine a system's overall properties from the properties of its parts. Many of architectural styles have been developed over the years. The best-known examples of (请作答此空)architectures are programs written in the Unix shell.

    A.event-based
    B.object-oriented
    C.pipe-and-filter
    D.layered

    答案:C
    解析:

  • 第19题:

    Which service component in the implement phase is typically performed prior to the handover of awireless solution to the customer’s operations organization?()

    • A、Systems Integration
    • B、Skill Assessment
    • C、Systems Acceptance Testing
    • D、Wireless Check
    • E、Project Close Out

    正确答案:C

  • 第20题:

    You work as a network engineer for the company, you want to configure two BGP speakers to form an EBGP session across a firewall. On the engineer’s network, the firewall always permits TCP sessions that are initiated from the inside network (the network attached to the inside interface of the firewall). What prerequisite is there for enabling BGP to run on this network?()

    • A、EBGP multihop will need to be configured for this to work.
    • B、This should work with normal BGP peering, with no additional configuration on the BGP speakers or the firewall.
    • C、The BGP protocol port must be opened on the firewall
    • D、There is no way to make BGP work across a firewall.

    正确答案:A

  • 第21题:

    To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks.These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(6) .Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(7)activity. For many organizations, however,the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle's security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch (8) of service attacks or steal (9) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (10) and worms acquired from unprotected public networks. Hackers masquer-ading as internal users can take advantage of weak internal security to gain access to confidential information. 空白处(9)应选择()

    • A、reserved
    • B、confidential
    • C、complete
    • D、mysterious

    正确答案:B

  • 第22题:

    Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()

    • A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync  synchronization.
    • B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync  synchronization.
    • C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the   perimeter network.
    • D、Deploy two Hub Transport servers on the internal network.

    正确答案:D

  • 第23题:

    单选题
    Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()
    A

    3389 and 25

    B

    3389 and 636

    C

    50636 and 25

    D

    50636 and 135


    正确答案: D
    解析: 暂无解析