The use of network( ),systems that effectively isolate an organization&39;s internal network structure from an( )network, such as the INTERNET is becoming increasingly popular. These firewall systems typically act as application-layer( )between networks, usually offering controlled TELNET, FTP, and SMTP access. With the emergence of more sophisticated( )layer protocols designed to facilitate global information discovery , there exists a need to provide a general ( )for these protocols to transparently and securely traverse a firewall.
A.safeguardsB.firewallsC.routersD.switches A.exteriorB.InternalC.centreD.middle A.hostsB.routersC.gatewaysD.officesA.networkB.sessionC.transmissionD.application A.frameworkB.internetworkC.computerD.application
第1题:
第2题:
What is the principle reason to use a private IP address on an internal network?()
第3题:
Which of the following statements is true regarding implementing Live Partition Mobility on two existing POWER6 based systems?()
第4题:
You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts. Which network mask do you use?()
第5题:
You are a network administrator for Alpine Ski House. The internal network has an Active Directory-integrated zone for the alpineskihouse.org domain. Computers on the internal network use the Active Directory-integrated DNS service for all host name resolution. The Alpine Ski House Web site and DNS server are hosted at a local ISP. The public Web site for Alpine Ski House is accessed at www.alpineskihouse.com. The DNS server at the ISP hosts the alpineskihouse.com domain. To improve support for the Web site, your company wants to move the Web site and DNS service from the ISP to the company’s perimeter network. The DNS server on the perimeter network must contain only the host (A) resource records for computers on the perimeter network. You install a Windows Server 2003 computer on the perimeter network to host the DNS service for the alpineskihouse.com domain. You need to ensure that the computers on the internal network can properly resolve host names for all internal resources, all perimeter resources, and all Internet resources. Which two actions should you take? ()
第6题:
You are designing the DNS name resolution strategy for the internal network. What should you do?()
第7题:
The systems must use internal storage for boot purposes.
All virtualized Ethernet adapters must be numbered below 10.
The mobile partition’s network and disk access must be virtualized.
Each system must be controlled by a different Hardware Management Console (HMC).
第8题:
Install Systems Management Server (SMS) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the SMS client software to all computers in the domain
Install Microsoft Operations Manager (MOM) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the MOM client software to all computers in the domain
Install Software Update Services (SUS) on a Web server, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the Web server. Ensure that users restart their client computers daily
Install Software Update Services (SUS) on a domain controller, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the domain controller. Ensure that users restart their client computers daily
第9题:
The best option is to use port 3309 and 25 from the internal network to the perimeter network.
The best option is to use port 3309 and 636 from the internal network to the perimeter network.
The best option is to use port 50636 and 25 from the internal network to the perimeter network.
The best option is to use port 50636 and 135 from the internal network to the perimeter network.
第10题:
/26
/27
/28
/29
第11题:
第12题:
To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks.These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(6) .Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(7)activity. For many organizations, however,the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle's security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch (8) of service attacks or steal (9) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (10) and worms acquired from unprotected public networks. Hackers masquer-ading as internal users can take advantage of weak internal security to gain access to confidential information. 空白处(9)应选择()
第13题:
A customer is buying 10 new Power 720 servers and will integrate them into their existing data center which also has two Power 595s and five Power 750s, taking the total number of systems to 17. All currently installed systems are managed by a single HMC.All the machines will have dual VIO Servers for redundancy, and 10 client LPARs. How can they manage the new machines for the least cost?()
第14题:
All servers and client computers in your company are configured to use WINS for name resolution. The internal network is separated from a perimeter network (also known as DMZ) by a third-party firewall. Firewall rules do not allow name resolution between the internal network and the perimeter network. You move a Windows Server 2003 server named Server1 to the perimeter network. You need to ensure that all computers on the internal network can connect to Server1 by name. What should you do?()
第15题:
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()
第16题:
WEP encryption
Channel rotation
Disable SSID
WPA encryption
第17题:
/26
/27
/28
/29
第18题:
Instruct all users to import the third-party root CA certificate.
Import the internal root CA certificate to the Client Access server.
Instruct all users to import the internal root CA certificate.
Issue a certificate to each user from the internal root CA
第19题:
Instruct all users to import the 3d-party root CA certification
Configure CAS server to use a certificate issued by a third-party CA
Instruct all users to import an internal root CA certificate
Deploy Outlook Web Access with the S/MIME control to the client system
第20题:
Create an LMHOSTS file on Server1.
Create a static WINS entry for Server1.
Configure Server1 to use Broadcast (B-node) mode.
Configure Server1 to use Peer-to-Peer (P-node) mode.