A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()
第1题:
The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers. What should you do?()
第2题:
There are several technicians working on various systems on a new workbench. Which of thefollowing should be reviewed to ensure all proper procedures are followed to help reduce anypossible issues?()
第3题:
A Dell customer decided to use IBM Director and xSeries to manage their servers. They purchased 10 IBM x336 servers and they already have 75 various Dell servers. Which TWO steps need to be verified to be able to manage the mixed environment with IBM Director?()
第4题:
A customer has two locations that host their pSeries servers. Traffic is being routed through the public Internet. The customer needs to exchange confidential financial data between the servers. Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()
第5题:
You installed Oracle Database 11g afresh. Which statements are true regarding the default audit settings in this database?()
第6题:
You are a systems administrator responsible for deploying Windows SharePoint Services (WSS) for accessby users from an external business partner. You have installed the appropriate server role and have verified that the SharePoint Web site loads properly from the local server computer. All options are usingtheir installation default values. External users report that they cannot log on to the site. Which of thefollowing changes should you make to resolve the problem?()
第7题:
Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to track all authentication attempts on Server1. What should you do?()
第8题:
You have a share on your local computer. Someone has been intentionally damaging your files. You want to be able to know which account is doing this. What do you do? ()
第9题:
APV, AIX5.2ML4
AIX5.3 or i5/OS
APV, i5/OS, AIX5.3
APV, AIX5.3 or SuSE9
第10题:
A DCE domain
A Kerberos domain
A PPP tunnel between the servers
An IPSEC tunnel between the servers
第11题:
assigning a private IP address to the AP
changing the default SSID value
configuring a new administrator password
changing the mixed mode setting to single mode
configuring traffic filtering
第12题:
ROM Monitor mode
SETUP mode
Autoflash mode
RXBOOT mode
None of the above
第13题:
You use a shared Windows 2000 Professional Computer. You notice, that some of your Microsoft Word documents that were on the local hard drive have been deleted. You restore the documents from a recent backup. Now, you want to be able to track all users who access your Word documents in the future. What should you do? ()
第14题:
Companycom is migrating from p670 systems running AIX 5.2 to p5 595 systems running AIX 5.3. They will be changing out only the system units. They will re-use the existing 61D drawers and adapters with the new p5 595 systems. What compatibility issue must be considered?()
第15题:
A company runs very large database applications on multiple HP-UX servers. They recently upgraded the device drivers for their fibre channel HBAs and have suffered numerous crashes on several systems. Which feature of Power Systems running AIX would help eliminate this problem during pre-release testing of a new device driver?()
第16题:
New AIX systems arrive without a CDROM drive. All systems do not have the system hardware configuration. Which of the following options is the most appropriate way to install AIX on the systems?()
第17题:
You are the senior systems engineer for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops. Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network. You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers. You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources. Which two actions should you take?()
第18题:
You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()
第19题:
Your company has file servers located in an organizational unit named Payroll. The file servers contain payroll files located in a folder named Payroll. You create a GPO. You need to track which employees access the Payroll files on the file servers. What should you do()
第20题:
Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.
Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.
Use Windows Explorer to turn on auditing for the specific files.
Have the administrator for domains log you on as an administrator and enable auditing for a specific file.
Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.
Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
第21题:
On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
On all client computers, implement logon auditing for all user account logons
On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
On all domain controllers, implement logon auditing for all user account logons
第22题:
IPSec and Kerberos Authentication
Secure By Default and AIX Security Expert
Trusted Execution and Role Based Access Control
First Failure Data Capture and Storage Protection Keys
第23题:
IPSec and Kerberos Authentication
Secure By Default and AIX Security Expert
Trusted Execution and Role Based Access Control
First Failure Data Capture and Storage Protection Keys