itgle.com
更多“单选题Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A Intrusion detectionB VirtualizationC KitingD Cloning”相关问题
  • 第1题:

    Which of the following technologies can be used to remotely gain access to a server console?()

    • A、PS/2 KVM
    • B、LDAP
    • C、VNC
    • D、Remote desktop
    • E、VPN

    正确答案:C,D

  • 第2题:

    Which of the following switches in Windows can be used to ping a host until stopped?()

    • A、-l
    • B、-a
    • C、-t
    • D、-f

    正确答案:C

  • 第3题:

    Which of the following cable types can be used to decrease susceptibility to electronic eavesdropping?()

    • A、Fiber optic
    • B、Fast Ethernet
    • C、Coaxial
    • D、Thicknet

    正确答案:A

  • 第4题:

    Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()

    • A、Intrusion detection
    • B、Virtualization
    • C、Kiting
    • D、Cloning

    正确答案:B

  • 第5题:

    单选题
    Which of the following constraint types can be used to ensure the value of an INTEGER column references only positive values?()
    A

    Unique

    B

    Check

    C

    Referential

    D

    Informational


    正确答案: C
    解析: 暂无解析

  • 第6题:

    单选题
    An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits?()
    A

    Implement an intrusion detection system (IDS).

    B

    Implement a dual-factor authentication method.

    C

    Implement a patch management process.

    D

    Implement stronger user passwords.


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    Which of the following protocols can be used to retrieve system and network performance information from a router?()
    A

    LDAP

    B

    IMAP

    C

    TFTP

    D

    SNMP


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following cable types can be used to decrease susceptibility to electronic eavesdropping?()
    A

    Fiber optic

    B

    Fast Ethernet

    C

    Coaxial

    D

    Thicknet


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following can be used when installing the OS without a boot disk?()
    A

    ZFS

    B

    VMFS

    C

    PXE

    D

    PBX


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following security threats involves making phone calls?()
    A

    Phishing

    B

    Vishing

    C

    DDoS

    D

    Xmas attack


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    Which of the following technologies can be used to remotely gain access to a server console?()
    A

    PS/2 KVM

    B

    LDAP

    C

    VNC

    D

    Remote desktop

    E

    VPN


    正确答案: D,C
    解析: 暂无解析

  • 第12题:

    单选题
    An administrator has been asked to look at the different types of Emulex host bus adapters that can be used in an x445 server.  From the following options, where can the most relevant information be found to assist in making a valid choice?()
    A

    IBM Redbooks

    B

    IBM Announcement Letters

    C

    ServerProven website

    D

    Configuration and Options Guide (COG)


    正确答案: B
    解析: 暂无解析

  • 第13题:

    When a user’s computer is first turned on, they see a lock symbol and a blinking cursor. Which of the following was configured in the BIOS to show this?()

    • A、Intrusion detection
    • B、Power on password
    • C、Drive encryption
    • D、BIOS password

    正确答案:B

  • 第14题:

    An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits? ()

    • A、 Implement an intrusion detection system (IDS).
    • B、 Implement a dual-factor authentication method.
    • C、 Implement a patch management process.
    • D、 Implement stronger user passwords.

    正确答案:C

  • 第15题:

    Which of the following can be used when installing the OS without a boot disk?()

    • A、ZFS
    • B、VMFS
    • C、PXE
    • D、PBX

    正确答案:C

  • 第16题:

    An administrator has been asked to look at the different types of Emulex host bus adapters that can be used in an x445 server.  From the following options, where can the most relevant information be found to assist in making a valid choice?()

    • A、IBM Redbooks
    • B、IBM Announcement Letters
    • C、ServerProven website
    • D、Configuration and Options Guide (COG)

    正确答案:C

  • 第17题:

    单选题
    Which of the following command line tools can be used to display the default gateway, IP address,and DNS servers currently being used by a host?()
    A

    TRACERT

    B

    IPCONFIG/ALL

    C

    NSLOOKUP

    D

    PING-T


    正确答案: C
    解析: 暂无解析

  • 第18题:

    单选题
    Which of the following cable types can be used to decrease susceptibility to electronic eavesdropping? ()
    A

     Fiber optic

    B

     Fast Ethernet

    C

     Coaxial

    D

     Thicknet


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following switches in Windows can be used to ping a host until stopped?()
    A

    -l

    B

    -a

    C

    -t

    D

    -f


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Which command can be used from a PC to verfy the connectivity between host that connect through path?()
    A

    tracert address

    B

    ping address

    C

    arp address

    D

    traceroute address


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()
    A

    Intrusion detection

    B

    Virtualization

    C

    Kiting

    D

    Cloning


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits? ()
    A

     Implement an intrusion detection system (IDS).

    B

     Implement a dual-factor authentication method.

    C

     Implement a patch management process.

    D

     Implement stronger user passwords.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    which one of the following types of actions can be used on unopened doc?()
    A

     form action 

    B

     view action 

    C

     hotspot action 

    D

     db action


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following cable types is used to transmit data from a satellite dish to the satellite modem?()
    A

    CAT5e

    B

    CAT3

    C

    Fiber

    D

    RG-6


    正确答案: D
    解析: 暂无解析