itgle.com

单选题Which of the following specifies a set of consistent requirements for a workstation or server?()A Vulnerability assessmentB Imaging softwareC Patch managementD Configuration baseline

题目
单选题
Which of the following specifies a set of consistent requirements for a workstation or server?()
A

Vulnerability assessment

B

Imaging software

C

Patch management

D

Configuration baseline


相似考题
参考答案和解析
正确答案: A
解析: 暂无解析
更多“单选题Which of the following specifies a set of consistent requirements for a workstation or server?()A Vulnerability assessmentB Imaging softwareC Patch managementD Configuration baseline”相关问题
  • 第1题:

    Which of the following best defines the Cisco Lifecycle Services approach()

    • A、the minimum set of services that are needed to successfully deploy and manage technology solution
    • B、system design to help ensure selection of the most appropriate products
    • C、business requirements and investments as they pertain to asset lifecycle management
    • D、technology strategies and related product lifecycles that are required to ensure minimal risks and maximum return of investment

    正确答案:A

  • 第2题:

    Which of the following should an administrator do after running a command from the console onthe perimeter router?()

    • A、Update the configuration logs
    • B、Update the network wiring schematics
    • C、Update the network configuration procedures
    • D、Compare the configuration with the baseline

    正确答案:A

  • 第3题:

    Which of the following specifies a set of consistent requirements for a workstation or server?()

    • A、Vulnerability assessment
    • B、Imaging software
    • C、Patch management
    • D、Configuration baseline

    正确答案:D

  • 第4题:

    A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()

    • A、Incident response
    • B、Asset management
    • C、Patch management
    • D、Policies and procedures

    正确答案:C

  • 第5题:

    Companycom is moving their application to a p5 590 and at the same time moving to a new version of the application. The customer knows only about the resource requirements of the old version. Which of the following is the best method to migrate their application to POWER5?()

    • A、Add CPU and memory COD so they have room to grow if required
    • B、Make the server configuration twice as large as the current requirement
    • C、Configure the server for the current capacity requirements
    • D、Make the server configuration a little larger than the current capacity requirements

    正确答案:A

  • 第6题:

    You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()

    • A、Microsoft Baseline Security Analyzer (MBSA)
    • B、Microsoft Security Assessment Tool (MSAT)
    • C、Resultant Set of Policy (RSoP)
    • D、Security Configuration Wizard (SCW)

    正确答案:A

  • 第7题:

    单选题
    You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()
    A

    Microsoft Baseline Security Analyzer (MBSA)

    B

    Microsoft Security Assessment Tool (MSAT)

    C

    Resultant Set of Policy (RSoP)

    D

    Security Configuration Wizard (SCW)


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following tools can an administrator use to get a server baseline?()
    A

    System Resource Monitor

    B

    Microsoft Baseline Security Analyzer (MBSA)

    C

    Replication Monitor

    D

    Performance Monitor


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Companycom is moving their application to a p5 590 and at the same time moving to a new version of the application. The customer knows only about the resource requirements of the old version. Which of the following is the best method to migrate their application to POWER5?()
    A

    Add CPU and memory COD so they have room to grow if required

    B

    Make the server configuration twice as large as the current requirement

    C

    Configure the server for the current capacity requirements

    D

    Make the server configuration a little larger than the current capacity requirements


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    The primary purpose of an SLA between the service provider and customer is to agree on which of the following?()
    A

    Monthly bandwidth limits, server configuration, and software baseline.

    B

    Number of dedicated technicians assigned to network issues.

    C

    Level of service including energy consumption, bandwidth and server color.

    D

    Level of service including time limits for service, repair and replacement.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following will MOST likely cause major performance issues on an email server?()
    A

     RAID 0 configuration

    B

     PBX software

    C

     DHCP server

    D

     Anti-virus software


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    A customer is looking for a low cost System x Server solution that has a fairly robust set of software application workload requirements.  Which tool will assist you in making sure the hardware will match the workload?()
    A

    IBM Configuration & Options Guide (COG)

    B

    IBM Sizing Guides

    C

    IBM xREF Sheets

    D

    IBM ServerProven

    E

    IBM Standalone Solutions Configuration Tool (SSCT)


    正确答案: C
    解析: 暂无解析

  • 第13题:

    You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()

    • A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account
    • B、Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks
    • C、Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template
    • D、On the IIS server, run the gpresult command from a command prompt and analyze the output

    正确答案:B

  • 第14题:

    Which of the following monitors a server to see which protocols might be in use?()

    • A、Ping sweep
    • B、Intrusion detection software
    • C、Port scanner
    • D、Wireless packet sniffer

    正确答案:B

  • 第15题:

    The company has two thousand servers located around the globe. Which of the following is the BEST method of patch management and deployment?()

    • A、Set all servers to automatically download patches from the manufacturer’s website.
    • B、Install an internal patch management system and deploy from the system.
    • C、Install the patches on each server from a deployment disk.
    • D、RDP into each server, manually download and install the patches.

    正确答案:B

  • 第16题:

    The server administrator has just brought a new Windows server online. Permissions are set, but the server administrator cannot connect remotely. Which of the following is MOST likely the problem?()

    • A、WMI was not enabled.
    • B、Server service was not enabled.
    • C、RDP was not enabled.
    • D、Workstation service was not enabled.

    正确答案:C

  • 第17题:

    Which configuration command is used to make the ERX Edge Router an NTP server?()

    • A、 set ntp-server
    • B、 set ntp server
    • C、 ntp-server enable
    • D、 ntp server enable

    正确答案:D

  • 第18题:

    单选题
    You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()
    A

    Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account

    B

    Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks

    C

    Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template

    D

    On the IIS server, run the gpresult command from a command prompt and analyze the output


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following tools are used to apply a Security Template in Windows Server 2012 R2?()
    A

    Integration Services

    B

    Security Configuration and Analysis

    C

    Resultant Set of Policy

    D

    TS Manager

    E

    Resource metering

    F

    Active Directory Domains and Trusts


    正确答案: F
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following should an administrator do after running a command from the console onthe perimeter router?()
    A

    Update the configuration logs

    B

    Update the network wiring schematics

    C

    Update the network configuration procedures

    D

    Compare the configuration with the baseline


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following specifies a set of consistent requirements for a workstation or server?()
    A

    Vulnerability assessment

    B

    Imaging software

    C

    Patch management

    D

    Configuration baseline


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following MUST be done when imaging a Windows Server that will be used as a template?()
    A

    Remove software

    B

    Run Windows Updates

    C

    Update drivers

    D

    Sysprep


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Which configuration command is used to make the ERX Edge Router an NTP server?()
    A

     set ntp-server

    B

     set ntp server

    C

     ntp-server enable

    D

     ntp server enable


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following environment variables specifies a non-default location for the listener configuration file?()
    A

    LSN_ADMIN

    B

    TNS_ADMIN

    C

    ADMIN_TNS

    D

    TSN_ADMIN


    正确答案: C
    解析: 暂无解析