For security reasons a network

题目

For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()

  • A、VPN concentrator
  • B、Virtual servers
  • C、Wireless
  • D、Multimode fiber
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()

A.the use of hosted email services eliminating the need for local security

B.the perceived costs of security solutions

C.the lack of risk analysis

D.the lack of threats to their network

E.the belief that free security tools are sufficient

F.the desire to avoid unnecessary technologies


参考答案:B, C

第2题:

For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。

A.IP

B.ICMP

C.TCP

D.UDP


参考答案:B

第3题:

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

A. Honeynet

B. Honeypot

C. Vulnerability scanner

D. Network based IDS


参考答案:A

第4题:

What are three characteristics that buyers of Cisco Small Business routers typically look for?()

  • A、 basic security options
  • B、 simple network configuration
  • C、 advanced network configuration
  • D、 integrated solutions
  • E、 advanced security options
  • F、 point products

正确答案:B,E,F

第5题:

What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()

  • A、The network was originated via redistribution of an interior gateway protocol into BGP
  • B、The network was defined by a static route
  • C、The network was originated via a network or aggregate command
  • D、The network was learned via EBGP
  • E、The network was learned via IBGP

正确答案:A,C

第6题:

A network vulnerability scanner is part of which critical element of network and system security?()

A. host security

B. perimeter security

C. security monitoring

D. policy management


参考答案:C

第7题:

Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the network

A.complex
B.unique
C.catchy
D.long

答案:B
解析:
网络安全概念。

第8题:

For security reasons a network technician wants to install a Linux based email server, Microsoftweb services, and directory services on different servers.Which of the following technologies would be BEST to reduce hard ware costs?()

A. VPN concentrator

B. Virtual servers

C. Wireless

D. Multimode fiber


参考答案:B

第9题:

What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()

  • A、The network was originated via redistribution of an interior gateway protocol into BGP
  • B、The network was defined by a static route
  • C、The network was learned via IBGP
  • D、The network was learned via EBGP
  • E、The network was originated via a network or aggregate command

正确答案:A,E

第10题:

What are two reasons that a network administrator would use access lists (Choose two.)()。

  • A、to control vty access into a router
  • B、to control broadcast traffic through a router
  • C、to filter traffic as it passes through a router
  • D、to filter traffic that originates from the router
  • E、to replace passwords as a line of defense against security incursions

正确答案:A,C

更多相关问题