A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()A、IPSec and Kerberos AuthenticationB、Secure By Default and

题目

A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()

  • A、IPSec and Kerberos Authentication
  • B、Secure By Default and AIX Security Expert
  • C、Trusted Execution and Role Based Access Control
  • D、First Failure Data Capture and Storage Protection Keys

相似考题

1.(a) Contrast the role of internal and external auditors. (8 marks)(b) Conoy Co designs and manufactures luxury motor vehicles. The company employs 2,500 staff and consistently makes a net profit of between 10% and 15% of sales. Conoy Co is not listed; its shares are held by 15 individuals, most of them from the same family. The maximum shareholding is 15% of the share capital.The executive directors are drawn mainly from the shareholders. There are no non-executive directors because the company legislation in Conoy Co’s jurisdiction does not require any. The executive directors are very successful in running Conoy Co, partly from their training in production and management techniques, and partly from their ‘hands-on’ approach providing motivation to employees.The board are considering a significant expansion of the company. However, the company’s bankers areconcerned with the standard of financial reporting as the financial director (FD) has recently left Conoy Co. The board are delaying provision of additional financial information until a new FD is appointed.Conoy Co does have an internal audit department, although the chief internal auditor frequently comments that the board of Conoy Co do not understand his reports or provide sufficient support for his department or the internal control systems within Conoy Co. The board of Conoy Co concur with this view. Anders & Co, the external auditors have also expressed concern in this area and the fact that the internal audit department focuses work on control systems, not financial reporting. Anders & Co are appointed by and report to the board of Conoy Co.The board of Conoy Co are considering a proposal from the chief internal auditor to establish an audit committee.The committee would consist of one executive director, the chief internal auditor as well as three new appointees.One appointee would have a non-executive seat on the board of directors.Required:Discuss the benefits to Conoy Co of forming an audit committee. (12 marks)

参考答案和解析
正确答案:B
更多“A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()A、IPSec and Kerberos AuthenticationB、Secure By Default and ”相关问题
  • 第1题:

    The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.  What should you do?()

    • A、Enable logon auditing in both the new and the existing domains
    • B、Enable logon auditing only in the existing domain
    • C、Enable logon auditing only in the new domain
    • D、Enable logon auditing on only the Web server

    正确答案:C

  • 第2题:

    There are several technicians working on various systems on a new workbench. Which of thefollowing should be reviewed to ensure all proper procedures are followed to help reduce anypossible issues?()

    • A、MSDS
    • B、OEM
    • C、ESD
    • D、EMI

    正确答案:C

  • 第3题:

    A Dell customer decided to use IBM Director and xSeries to manage their servers.  They purchased 10 IBM x336 servers and they already have 75 various Dell servers.  Which TWO steps need to be verified to be able to manage the mixed environment with IBM Director?()

    • A、Verify that the Dell systems have TCP/IP enabled
    • B、Verify that the systems are running the IBM Director Agent
    • C、Verify that the managed systems are SMBIOS 2.1 and WfM 2.0 compliant
    • D、Verify that the Dell systems have at least a 1GB of memory installed
    • E、Install an SNMP agent on the Dell systems as IBM Director cannot manage Industry Standard non-IBM servers

    正确答案:B,C

  • 第4题:

    A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()

    • A、A DCE domain
    • B、A Kerberos domain
    • C、A PPP tunnel between the servers
    • D、An IPSEC tunnel between the servers

    正确答案:D

  • 第5题:

    You installed Oracle Database 11g afresh. Which statements are true regarding the default audit settings in this database?() 

    • A、 The audit trail is stored in an operating system file.
    • B、 Auditing is disabled for all privileges.
    • C、 The audit trail is stored in the database.
    • D、 Auditing is enabled for all privileges.
    • E、 Auditing is enabled for certain privileges related to database security.

    正确答案:C,E

  • 第6题:

    You are a systems administrator responsible for deploying Windows SharePoint Services (WSS) for accessby users from an external business partner. You have installed the appropriate server role and have verified that the SharePoint Web site loads properly from the local server computer. All options are usingtheir installation default values. External users report that they cannot log on to the site. Which of thefollowing changes should you make to resolve the problem?()

    • A、Create a new site within an existing site collection for the external users.
    • B、Create a new site collection for the external users.
    • C、Change the authentication mode for the Web application to Forms authentication.
    • D、Modify the User Permissions For Web Applications settings.

    正确答案:C

  • 第7题:

    Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to track all authentication attempts on Server1. What should you do?()

    • A、Enable auditing of logon event events in Server1’s local policy.
    • B、Enable auditing of logon event events in the Default Domain Controller Policy.
    • C、Enable auditing of account logon event events in Server1’s local policy.
    • D、Enable auditing of account logon event events in the Default Domain Controller Policy.

    正确答案:A

  • 第8题:

    You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()

    • A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'. 
    • B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. 
    • C、Use Windows Explorer to turn on auditing for the specific files. 
    • D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file. 
    • E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'. 
    • F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

    正确答案:B,C

  • 第9题:

    单选题
    Companycom has a requirement to consolidate six web application servers. There is unused capacity of 2 CPUs on their new p5 570. Which operating systems and or features are required?()
    A

    APV, AIX5.2ML4

    B

    AIX5.3 or i5/OS

    C

    APV, i5/OS, AIX5.3

    D

    APV, AIX5.3 or SuSE9


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()
    A

    A DCE domain

    B

    A Kerberos domain

    C

    A PPP tunnel between the servers

    D

    An IPSEC tunnel between the servers


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()
    A

    assigning a private IP address to the AP

    B

    changing the default SSID value

    C

    configuring a new administrator password

    D

    changing the mixed mode setting to single mode

    E

    configuring traffic filtering


    正确答案: E,B
    解析: 暂无解析

  • 第12题:

    单选题
    You have just purchased a brand new router and wish to have the router prompt you through the initial configuration commands. Which router mode does this describe?()
    A

    ROM Monitor mode

    B

    SETUP mode

    C

    Autoflash mode

    D

    RXBOOT mode

    E

    None of the above


    正确答案: C
    解析: 暂无解析

  • 第13题:

    You use a shared Windows 2000 Professional Computer. You notice, that some of your Microsoft Word documents that were on the local hard drive have been deleted. You restore the documents from a recent backup. Now, you want to be able to track all users who access your Word documents in the future. What should you do? ()

    • A、Enable the local Group Policy for auditing object access events that are successful.
    • B、Enable the local Group Policy for auditing object access events that are unsuccessful.
    • C、Enable the local Group Policy for auditing process tracking events that are successful.
    • D、Enable the local Group Policy for auditing process tracking events that are unsuccessful. 
    • E、Use Windows 2000 Explorer, to enable auditing for your files.
    • F、Run the diskperf - y command. Use System Monitor to examine the logical I/O counter.  Restart the Computer.

    正确答案:A,E

  • 第14题:

    Companycom is migrating from p670 systems running AIX 5.2 to p5 595 systems running AIX 5.3. They will be changing out only the system units. They will re-use the existing 61D drawers and adapters with the new p5 595 systems. What compatibility issue must be considered?() 

    • A、APV features are not supported for some legacy POWER4 adapters
    • B、APV will require the most current maintenance level for AIX 5.2
    • C、APV features will require that legacy POWER4 adapters be updated with new microcode
    • D、The Virtual IO Server must run AIX 5.3 and the LPARs can run either AIX 5.2 or AIX 5.3

    正确答案:A

  • 第15题:

    A company runs very large database applications on multiple HP-UX servers. They recently upgraded the device drivers for their fibre channel HBAs and have suffered numerous crashes on several systems. Which feature of Power Systems running AIX would help eliminate this problem during pre-release testing of a new device driver?()

    • A、Redundant VIO servers
    • B、Storage Protection Keys
    • C、Electronic Service Agent
    • D、NPIV support in the kernel

    正确答案:B

  • 第16题:

    New AIX systems arrive without a CDROM drive. All systems do not have the system hardware configuration. Which of the following options is the most appropriate way to install AIX on the systems?()

    • A、Install CDROM drives or tape drives on the systems because that is the only way to install AIX.
    • B、Install one system. Take a mksysb from the first system and resotre the mksysb to the remaining systems.
    • C、Install one system. Mirror rootvg onto a disk from each of the remaining systems.
    • D、Setup and NIM master and resources.

    正确答案:D

  • 第17题:

    You are the senior systems engineer for your company. The network consists of a single Active Directory domain.  All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops.   Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network.   You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers.   You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources.   Which two actions should you take?()

    • A、 Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.
    • B、 Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.
    • C、 Create a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.
    • D、 Create a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.
    • E、 Use System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.

    正确答案:B,C

  • 第18题:

    You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()

    • A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.
    • B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. 
    • C、Use Windows Explorer to turn on auditing for the specific files.
    • D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.
    • E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.
    • F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on. 

    正确答案:E

  • 第19题:

    Your company has file servers located in an organizational unit named Payroll. The file servers  contain payroll files located in a folder named Payroll.    You create a GPO.   You need to track which employees access the Payroll files on the file servers.  What should you do()

    • A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file  servers, configure Auditing for the Everyone group in the Payroll folder.
    • B、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers,  configure Auditing for the Authenticated Users group in the Payroll folder.
    • C、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit.  On the file servers, configure Auditing for the Authenticated Users group in the Payroll folder.
    • D、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file  servers, configure Auditing for the Everyone group in the Payroll folder.

    正确答案:A

  • 第20题:

    多选题
    You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()
    A

    Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.

    B

    Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.

    C

    Use Windows Explorer to turn on auditing for the specific files.

    D

    Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.

    E

    Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.

    F

    Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.


    正确答案: B,C
    解析: 暂无解析

  • 第21题:

    单选题
    The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()
    A

    On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy

    B

    On all client computers, implement logon auditing for all user account logons

    C

    On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy

    D

    On all domain controllers, implement logon auditing for all user account logons


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()
    A

    IPSec and Kerberos Authentication

    B

    Secure By Default and AIX Security Expert

    C

    Trusted Execution and Role Based Access Control

    D

    First Failure Data Capture and Storage Protection Keys


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()
    A

    IPSec and Kerberos Authentication

    B

    Secure By Default and AIX Security Expert

    C

    Trusted Execution and Role Based Access Control

    D

    First Failure Data Capture and Storage Protection Keys


    正确答案: B
    解析: 暂无解析