单选题A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()A IPSec and Kerberos AuthenticationB Secure By Default a

题目
单选题
A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()
A

IPSec and Kerberos Authentication

B

Secure By Default and AIX Security Expert

C

Trusted Execution and Role Based Access Control

D

First Failure Data Capture and Storage Protection Keys


相似考题
更多“单选题A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()A IPSec and Kerberos AuthenticationB Secure By Default a”相关问题
  • 第1题:

    The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.  What should you do?()

    • A、Enable logon auditing in both the new and the existing domains
    • B、Enable logon auditing only in the existing domain
    • C、Enable logon auditing only in the new domain
    • D、Enable logon auditing on only the Web server

    正确答案:C

  • 第2题:

    Companycom is migrating from p670 systems running AIX 5.2 to p5 595 systems running AIX 5.3. They will be changing out only the system units. They will re-use the existing 61D drawers and adapters with the new p5 595 systems. What compatibility issue must be considered?() 

    • A、APV features are not supported for some legacy POWER4 adapters
    • B、APV will require the most current maintenance level for AIX 5.2
    • C、APV features will require that legacy POWER4 adapters be updated with new microcode
    • D、The Virtual IO Server must run AIX 5.3 and the LPARs can run either AIX 5.2 or AIX 5.3

    正确答案:A

  • 第3题:

    A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()

    • A、A DCE domain
    • B、A Kerberos domain
    • C、A PPP tunnel between the servers
    • D、An IPSEC tunnel between the servers

    正确答案:D

  • 第4题:

    You are the senior systems engineer for your company. The network consists of a single Active Directory domain.  All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops.   Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network.   You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers.   You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources.   Which two actions should you take?()

    • A、 Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.
    • B、 Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.
    • C、 Create a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.
    • D、 Create a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.
    • E、 Use System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.

    正确答案:B,C

  • 第5题:

    Your company has file servers located in an organizational unit named Payroll. The file servers  contain payroll files located in a folder named Payroll.    You create a GPO.   You need to track which employees access the Payroll files on the file servers.  What should you do()

    • A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file  servers, configure Auditing for the Everyone group in the Payroll folder.
    • B、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers,  configure Auditing for the Authenticated Users group in the Payroll folder.
    • C、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit.  On the file servers, configure Auditing for the Authenticated Users group in the Payroll folder.
    • D、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file  servers, configure Auditing for the Everyone group in the Payroll folder.

    正确答案:A

  • 第6题:

    多选题
    You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()
    A

    Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.

    B

    Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.

    C

    Use Windows Explorer to turn on auditing for the specific files.

    D

    Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.

    E

    Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.

    F

    Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.


    正确答案: B,C
    解析: 暂无解析

  • 第7题:

    单选题
    The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.  What should you do?()
    A

    Enable logon auditing in both the new and the existing domains

    B

    Enable logon auditing only in the existing domain

    C

    Enable logon auditing only in the new domain

    D

    Enable logon auditing on only the Web server


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    Your company has file servers located in an organizational unit named Payroll. The file servers  contain payroll files located in a folder named Payroll.    You create a GPO.   You need to track which employees access the Payroll files on the file servers.  What should you do()
    A

    Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file  servers, configure Auditing for the Everyone group in the Payroll folder.

    B

    Enable the Audit object access option. Link the GPO to the domain. On the domain controllers,  configure Auditing for the Authenticated Users group in the Payroll folder.

    C

    Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit.  On the file servers, configure Auditing for the Authenticated Users group in the Payroll folder.

    D

    Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file  servers, configure Auditing for the Everyone group in the Payroll folder.


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()
    A

    A DCE domain

    B

    A Kerberos domain

    C

    A PPP tunnel between the servers

    D

    An IPSEC tunnel between the servers


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()
    A

    assigning a private IP address to the AP

    B

    changing the default SSID value

    C

    configuring a new administrator password

    D

    changing the mixed mode setting to single mode

    E

    configuring traffic filtering


    正确答案: E,B
    解析: 暂无解析

  • 第11题:

    单选题
    New AIX systems arrive without a CDROM drive. All systems do not have the system hardware configuration. Which of the following options is the most appropriate way to install AIX on the systems?()
    A

    Install CDROM drives or tape drives on the systems because that is the only way to install AIX.

    B

    Install one system. Take a mksysb from the first system and resotre the mksysb to the remaining systems.

    C

    Install one system. Mirror rootvg onto a disk from each of the remaining systems.

    D

    Setup and NIM master and resources.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    A company runs very large database applications on multiple HP-UX servers. They recently upgraded the device drivers for their fibre channel HBAs and have suffered numerous crashes on several systems. Which feature of Power Systems running AIX would help eliminate this problem during pre-release testing of a new device driver?()
    A

    Redundant VIO servers

    B

    Storage Protection Keys

    C

    Electronic Service Agent

    D

    NPIV support in the kernel


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You use a shared Windows 2000 Professional Computer. You notice, that some of your Microsoft Word documents that were on the local hard drive have been deleted. You restore the documents from a recent backup. Now, you want to be able to track all users who access your Word documents in the future. What should you do? ()

    • A、Enable the local Group Policy for auditing object access events that are successful.
    • B、Enable the local Group Policy for auditing object access events that are unsuccessful.
    • C、Enable the local Group Policy for auditing process tracking events that are successful.
    • D、Enable the local Group Policy for auditing process tracking events that are unsuccessful. 
    • E、Use Windows 2000 Explorer, to enable auditing for your files.
    • F、Run the diskperf - y command. Use System Monitor to examine the logical I/O counter.  Restart the Computer.

    正确答案:A,E

  • 第14题:

    A company runs very large database applications on multiple HP-UX servers. They recently upgraded the device drivers for their fibre channel HBAs and have suffered numerous crashes on several systems. Which feature of Power Systems running AIX would help eliminate this problem during pre-release testing of a new device driver?()

    • A、Redundant VIO servers
    • B、Storage Protection Keys
    • C、Electronic Service Agent
    • D、NPIV support in the kernel

    正确答案:B

  • 第15题:

    New AIX systems arrive without a CDROM drive. All systems do not have the system hardware configuration. Which of the following options is the most appropriate way to install AIX on the systems?()

    • A、Install CDROM drives or tape drives on the systems because that is the only way to install AIX.
    • B、Install one system. Take a mksysb from the first system and resotre the mksysb to the remaining systems.
    • C、Install one system. Mirror rootvg onto a disk from each of the remaining systems.
    • D、Setup and NIM master and resources.

    正确答案:D

  • 第16题:

    You are a systems administrator responsible for deploying Windows SharePoint Services (WSS) for accessby users from an external business partner. You have installed the appropriate server role and have verified that the SharePoint Web site loads properly from the local server computer. All options are usingtheir installation default values. External users report that they cannot log on to the site. Which of thefollowing changes should you make to resolve the problem?()

    • A、Create a new site within an existing site collection for the external users.
    • B、Create a new site collection for the external users.
    • C、Change the authentication mode for the Web application to Forms authentication.
    • D、Modify the User Permissions For Web Applications settings.

    正确答案:C

  • 第17题:

    You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()

    • A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'. 
    • B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. 
    • C、Use Windows Explorer to turn on auditing for the specific files. 
    • D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file. 
    • E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'. 
    • F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

    正确答案:B,C

  • 第18题:

    单选题
    Companycom has a requirement to consolidate six web application servers. There is unused capacity of 2 CPUs on their new p5 570. Which operating systems and or features are required?()
    A

    APV, AIX5.2ML4

    B

    AIX5.3 or i5/OS

    C

    APV, i5/OS, AIX5.3

    D

    APV, AIX5.3 or SuSE9


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    There are several technicians working on various systems on a new workbench. Which of thefollowing should be reviewed to ensure all proper procedures are followed to help reduce anypossible issues?()
    A

    MSDS

    B

    OEM

    C

    ESD

    D

    EMI


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()
    A

    On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy

    B

    On all client computers, implement logon auditing for all user account logons

    C

    On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy

    D

    On all domain controllers, implement logon auditing for all user account logons


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()
    A

    IPSec and Kerberos Authentication

    B

    Secure By Default and AIX Security Expert

    C

    Trusted Execution and Role Based Access Control

    D

    First Failure Data Capture and Storage Protection Keys


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Companycom is migrating from p670 systems running AIX 5.2 to p5 595 systems running AIX 5.3. They will be changing out only the system units. They will re-use the existing 61D drawers and adapters with the new p5 595 systems. What compatibility issue must be considered?()
    A

    APV features are not supported for some legacy POWER4 adapters

    B

    APV will require the most current maintenance level for AIX 5.2

    C

    APV features will require that legacy POWER4 adapters be updated with new microcode

    D

    The Virtual IO Server must run AIX 5.3 and the LPARs can run either AIX 5.2 or AIX 5.3


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    You are a systems administrator responsible for deploying Windows SharePoint Services (WSS) for accessby users from an external business partner. You have installed the appropriate server role and have verified that the SharePoint Web site loads properly from the local server computer. All options are usingtheir installation default values. External users report that they cannot log on to the site. Which of thefollowing changes should you make to resolve the problem?()
    A

    Create a new site within an existing site collection for the external users.

    B

    Create a new site collection for the external users.

    C

    Change the authentication mode for the Web application to Forms authentication.

    D

    Modify the User Permissions For Web Applications settings.


    正确答案: C
    解析: 暂无解析