niusouti.com

is a mechanism used for protecting the users outside of network from accessing some non-authorized computer resources.A.Network CardB.protocolC.FirewallD.Router

题目

is a mechanism used for protecting the users outside of network from accessing some non-authorized computer resources.

A.Network Card

B.protocol

C.Firewall

D.Router


相似考题
更多“is a mechanism used for protecting the users outside of network from accessing some non-authorized computer resources.A.Network CardB.protocolC.FirewallD.Router”相关问题
  • 第1题:

    What is the primary purpose of creating a Location Group Policy? ()

    A. to associate more than one realm with an authentication server

    B. to logically group network access devices and associate them with specific sign-in policies

    C. to allow or prevent users from accessing resources in specific locations on the network

    D. to define the URL that users of network access devices can use to access the Infranet Controller


    参考答案:B

  • 第2题:

    You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()

    A.A

    B.B

    C.C

    D.D


    参考答案:C

  • 第3题:

    Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.

    A.network B.virus C.security D.architecture


    正确答案:C

  • 第4题:

    Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.

    A.network
    B.vims
    C.security
    D.architecture

    答案:C
    解析:
    计算机安全性注重保护信息、硬件和软件,防止非授权使用和损坏。

  • 第5题:

    Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the network

    A.complex
    B.unique
    C.catchy
    D.long

    答案:B
    解析:
    网络安全概念。

  • 第6题:

    Which of the following should a technician do FIRST to troubleshoot a users network connectivity problem?()

    • A、Run TRACERT from the users workstation.
    • B、Start with the Last Known Good Configuration and reboot the computer.
    • C、Replace the network interface card (NIC).
    • D、PING the users workstation.

    正确答案:D

  • 第7题:

    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

    • A、Allow unrestricted access to the console or VTY ports.
    • B、Use a firewall to restrict access from the outside to the network devices.
    • C、Always use Telnet to access the device command line because its data is automatically encrypted.
    • D、Use SSH or another encrypted and authenticated transport to access device configurations.
    • E、Prevent the loss of passwords by disabling password encryption. 

    正确答案:B,D

  • 第8题:

    What is the primary purpose of creating a Location Group Policy? ()

    • A、to associate more than one realm with an authentication server
    • B、to logically group network access devices and associate them with specific sign-in policies
    • C、to allow or prevent users from accessing resources in specific locations on the network
    • D、to define the URL that users of network access devices can use to access the Infranet Controller

    正确答案:B

  • 第9题:

    You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? () 

    • A、Enable the Require domain controller to unlock policy.
    • B、Set the Number of previous logons to cache policy to 0.  
    • C、Remove all user and group accounts from the Log on locally user right. 
    • D、Remove all user and group accounts from the Access this computer from the network user right. 

    正确答案:B

  • 第10题:

    Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer.  What should you do?()

    • A、Remove all generic credentials from Windows Vault.
    • B、Remove all Windows credentials from Windows Vault.
    • C、Modify the Windows Internet Explorer certificates settings.
    • D、Modify the Windows Internet Explorer AutoComplete settings.

    正确答案:D

  • 第11题:

    You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()

    • A、Use a password generator application to create a preshared key, and distribute it to all mobile users
    • B、Use computer autoenrollment to create digital certificates that can be used to authenticate to a VPN server
    • C、Acquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connection
    • D、Configure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates

    正确答案:B,D

  • 第12题:

    单选题
    You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network. What should you do?()
    A

    On Folder1, modify the share permissions.

    B

    On Folder1, modify the NTFS permissions.

    C

    Add all local user accounts to the Guests group. 

    D

    Add all local user accounts to the Network Configuration Operators group.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()

    A.Configure a Windows Connect Now Group Policy.

    B.Configure a Wireless Network (IEEE 802.11) Policy.

    C.Delete the rogue network from the Network and Sharing Center on each computer.

    D.Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.


    参考答案:B

  • 第14题:

    Computer( )focuses on protecting information ,hardware ,and software from unauthorized use and damage.

    A.network B.virus C.security D.architecture


    正确答案:C

  • 第15题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    A.Allow unrestricted access to the console or VTY ports

    B.Use a firewall to restrict access from the outside to the network devices

    C.Always use Telnet to access the device command line because its data is automatically encrypted

    D.Use SSH or another encrypted and authenticated transport to access device configurations

    E.Prevent the loss of passwords by disabling password encryption


    参考答案:B, D

  • 第16题:

    Computer______focuses on protecting information,hardware,and software from unauthorized use and damage.

    A.network
    B.virus
    C.security
    D.architecture

    答案:C
    解析:

  • 第17题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    • A、Allow unrestricted access to the console or VTY ports
    • B、Use a firewall to restrict access from the outside to the network devices
    • C、Always use Telnet to access the device command line because its data is automatically encrypted
    • D、Use SSH or another encrypted and authenticated transport to access device configurations
    • E、Prevent the loss of passwords by disabling password encryption

    正确答案:B,D

  • 第18题:

    Which of the following is the correct path to add new local user accounts to a Windows 7computer?()

    • A、Click on the Start button> Right click on Computer> Select Manage> Expand Local Users and Groups> Right click on Users> Select New User
    • B、Click on the Start button> Right click on My Computer> Select Manage> Right click on Local Users and Groups> Select Add Users from the menu
    • C、Click on the Start button> Right click on Computer> Select Manage> Right click on Local Users and Computers> Select New User
    • D、Click on the Start button> Right click on Network Neighborhood> Select Manage> Right click on Users> Select New User

    正确答案:A

  • 第19题:

    The technician needs to map a network share to the user’s Windows 7 computer from thecommand prompt. Which of the following commands will the technician execute?()

    • A、NET SEND
    • B、NET CONFIG
    • C、NET USE
    • D、NET NAME

    正确答案:C

  • 第20题:

    You administer a Windows 2000 network at Company's main office.  You have purchased 15 new Windows 2000 Professional computers that will be used in the finance department. The new computers are equipped with a fax modem. You install the Fax service with the default values and settings on each computer. You want to prevent users from using the Control Panel to remove the fax printer. What should you do?()

    • A、Remove the users’ account from the DACL for the fax printer.
    • B、Edit the local Computer Policy to prevent users from using Printers in Control Panel.
    • C、Edit the local Computer Policy. Configure the Prevent deletion of printers setting to enabled.
    • D、Edit the local Computer Policy. Configure the Prevent addition of printers setting to disabled

    正确答案:B,C

  • 第21题:

    Your network contains a server named Server1. Server1 has DirectAccess deployed. A group named Group1 is enabled for DirectAccess. Users report that when they log on to their computers, the computers are not configured to use DirectAccess. You need to ensure that the users computers are configured to use DirectAccess. What should you do first?()

    • A、On each client computer, add Group1 to the Distributed COM Users group.
    • B、On each client computer, add Group1 to the Network Configuration Operators group.
    • C、From Active Directory Users and Computers, add the users user accounts to Group1.
    • D、From Active Directory Users and Computers, add the users computer accounts to Group1.

    正确答案:D

  • 第22题:

    Your network contains an Active Directory forest. The forest contains multiple sites.     You need to enable universal group membership caching for a site.  What should you do()

    • A、From Active Directory Sites and Services, modify the NTDS Settings.
    • B、From Active Directory Sites and Services, modify the NTDS Site Settings.
    • C、From Active Directory Users and Computers, modify the properties of all universal groups used in the site.
    • D、From Active Directory Users and Computers, modify the computer objects for the domain controllers in the site.

    正确答案:B

  • 第23题:

    单选题
    Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()
    A

    IPSec VPN

    B

    SSL VPN

    C

    port security

    D

    port security with statically configured MAC addresses

    E

    private VLANs


    正确答案: D
    解析: 暂无解析