Vulnerability assessment
Imaging software
Patch management
Configuration baseline
第1题:
Which of the following best defines the Cisco Lifecycle Services approach()
第2题:
Which of the following should an administrator do after running a command from the console onthe perimeter router?()
第3题:
Which of the following specifies a set of consistent requirements for a workstation or server?()
第4题:
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()
第5题:
Companycom is moving their application to a p5 590 and at the same time moving to a new version of the application. The customer knows only about the resource requirements of the old version. Which of the following is the best method to migrate their application to POWER5?()
第6题:
You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()
第7题:
Microsoft Baseline Security Analyzer (MBSA)
Microsoft Security Assessment Tool (MSAT)
Resultant Set of Policy (RSoP)
Security Configuration Wizard (SCW)
第8题:
System Resource Monitor
Microsoft Baseline Security Analyzer (MBSA)
Replication Monitor
Performance Monitor
第9题:
Add CPU and memory COD so they have room to grow if required
Make the server configuration twice as large as the current requirement
Configure the server for the current capacity requirements
Make the server configuration a little larger than the current capacity requirements
第10题:
Monthly bandwidth limits, server configuration, and software baseline.
Number of dedicated technicians assigned to network issues.
Level of service including energy consumption, bandwidth and server color.
Level of service including time limits for service, repair and replacement.
第11题:
RAID 0 configuration
PBX software
DHCP server
Anti-virus software
第12题:
IBM Configuration & Options Guide (COG)
IBM Sizing Guides
IBM xREF Sheets
IBM ServerProven
IBM Standalone Solutions Configuration Tool (SSCT)
第13题:
You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()
第14题:
Which of the following monitors a server to see which protocols might be in use?()
第15题:
The company has two thousand servers located around the globe. Which of the following is the BEST method of patch management and deployment?()
第16题:
The server administrator has just brought a new Windows server online. Permissions are set, but the server administrator cannot connect remotely. Which of the following is MOST likely the problem?()
第17题:
Which configuration command is used to make the ERX Edge Router an NTP server?()
第18题:
Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account
Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks
Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template
On the IIS server, run the gpresult command from a command prompt and analyze the output
第19题:
Integration Services
Security Configuration and Analysis
Resultant Set of Policy
TS Manager
Resource metering
Active Directory Domains and Trusts
第20题:
Update the configuration logs
Update the network wiring schematics
Update the network configuration procedures
Compare the configuration with the baseline
第21题:
Vulnerability assessment
Imaging software
Patch management
Configuration baseline
第22题:
Remove software
Run Windows Updates
Update drivers
Sysprep
第23题:
set ntp-server
set ntp server
ntp-server enable
ntp server enable
第24题:
LSN_ADMIN
TNS_ADMIN
ADMIN_TNS
TSN_ADMIN