You wish to increase the security of all of the routers with

题目
多选题
You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()
A

Administratively shut down the interface.

B

Physically secure the interface.

C

Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D

Configure a virtual terminal password and login process.

E

Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which routers must be configured with the same authentication string when configuring OSPFauthentication?()

A. all routers on a link

B. all routers in an area

C. all external OSPF peers

D. all routers in an OSPF domain


参考答案:A

第2题:

You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()

A. Administratively shut down the interface.

B. Physically secure the interface.

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D. Configure a virtual terminal password and login process.

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


参考答案:D, E

第3题:

Your network consists of a single Active Directory forest that contains the domains shown in the following table.You create a universal security group named Contoso-All in the Contoso domain. You plan to use Contoso-All toassign permissions only on servers in the contoso.com domain.You add a group named Region1-All in the Region1 domain to Contoso\Contoso-All and receive the errormessage shown in the exhibit. (Click the Exhibit button.)You need to need to ensure that members of Region1\Region1-All can access resources that have been assigned to Contoso\Contoso-All.What should you change?()

A. Contoso\Contoso-All to a domain local security group

B. Contoso\Contoso-All to a global security group

C. Region1\Region1-All to a domain local security group

D. Region1\Region-All to a universal distribution group


参考答案:A

第4题:

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()

  • A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
  • B、On all client computers, implement logon auditing for all user account logons
  • C、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
  • D、On all domain controllers, implement logon auditing for all user account logons

正确答案:C

第5题:

When verifying the OSPF link state database, which type of LSAs should you expect to see within the different OS PF area types?()

  • A、All OSPF routers in stubby areas can have type 3 LSAs in their database.
  • B、All OSPF routers in stubby areas can have type 7 LSAs in their database.
  • C、All OSPF routers in totally stubby areas can have type 3 LSAs in  their database.
  • D、All OSPF routers in totally stubby areas can have type 7 LSAs in their database.
  • E、All OSPF routers in NSSA areas can have type 3 LSAs in their database.
  • F、All OSPF routers in NSSA areas can have type 7 LSAs in their database.

正确答案:A,E,F

第6题:

Refer to the exhibit. The Route.com company is running EIGRP between all the r outers. Currently, if one of the LAN links (LAN1 or LAN2) at the headquarters flaps (goes up and down), the HQRTR1 and HQ - RTR2 routers will experience high CPU usage and have a long EIGRP convergence time. As the new network administrator, you are asked to investigate this situation and determine if there is a quick way to resolve this issue. Which is the most important thing that you can quickly verify first to resolve this issue?()

A. Verify that the bandwidth setting on all WAN links is correct.

B. Verify that the HQ - RTR1 and HQ - RTR2 routers are configured to send only a default route to all the spoke routers.

C. Verify that the HQ - RTR1 and HQ - RTR2 routers are configured for EIGRP Nonstop Forwarding.

D. Verify that all the spoke routers are co nfigured for autosummarization.

E. Verify that all the spoke routers are configured as EIGRP stub.


参考答案:E

第7题:

You should be ______ with your movements because of all the security.

A.useful
B.skillful
C.careful
D.helpful

答案:C
解析:
本题考察词义辨析,题目意为“出于安全考虑,你应该对自己的一举一动十分小心。”A选项意为“有用的,有益的”,B选项意为“熟练的,巧妙的”,C选项意为“仔细的,小心的”,D选项意为“有帮助的,有益的”。只有C选项意思符合题意。
  

第8题:

You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()

A. OSPF

B. RIP

C. BGP

D. static


参考答案:A

第9题:

Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()

  • A、 UrlScan Security Tool
  • B、 Enterprise Scan Tool (EST)
  • C、 Malicious Removal Tool (MRT)
  • D、 Microsoft Baseline Security Analyzer (MBSA)

正确答案:D

第10题:

You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()

  • A、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.
  • B、Implement IEndpointldentityProvider in the message contract class.
  • C、Implement ISecureConversationSession in the message contract class.
  • D、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.

正确答案:D

更多相关问题