Intrusion detection
Virtualization
Kiting
Cloning
第1题:
Which of the following technologies can be used to remotely gain access to a server console?()
第2题:
Which of the following switches in Windows can be used to ping a host until stopped?()
第3题:
Which of the following cable types can be used to decrease susceptibility to electronic eavesdropping?()
第4题:
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()
第5题:
Unique
Check
Referential
Informational
第6题:
Implement an intrusion detection system (IDS).
Implement a dual-factor authentication method.
Implement a patch management process.
Implement stronger user passwords.
第7题:
LDAP
IMAP
TFTP
SNMP
第8题:
Fiber optic
Fast Ethernet
Coaxial
Thicknet
第9题:
ZFS
VMFS
PXE
PBX
第10题:
Phishing
Vishing
DDoS
Xmas attack
第11题:
PS/2 KVM
LDAP
VNC
Remote desktop
VPN
第12题:
IBM Redbooks
IBM Announcement Letters
ServerProven website
Configuration and Options Guide (COG)
第13题:
When a user’s computer is first turned on, they see a lock symbol and a blinking cursor. Which of the following was configured in the BIOS to show this?()
第14题:
An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits? ()
第15题:
Which of the following can be used when installing the OS without a boot disk?()
第16题:
An administrator has been asked to look at the different types of Emulex host bus adapters that can be used in an x445 server. From the following options, where can the most relevant information be found to assist in making a valid choice?()
第17题:
TRACERT
IPCONFIG/ALL
NSLOOKUP
PING-T
第18题:
Fiber optic
Fast Ethernet
Coaxial
Thicknet
第19题:
-l
-a
-t
-f
第20题:
tracert address
ping address
arp address
traceroute address
第21题:
Intrusion detection
Virtualization
Kiting
Cloning
第22题:
Implement an intrusion detection system (IDS).
Implement a dual-factor authentication method.
Implement a patch management process.
Implement stronger user passwords.
第23题:
form action
view action
hotspot action
db action
第24题:
CAT5e
CAT3
Fiber
RG-6