A technician wants to secure a W

题目

A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker?() (Select TWO).

  • A、Disable TPM in the system BIOS
  • B、Run the BitLocker wizard and any necessary partitions
  • C、Enable TPM in the system BIOS
  • D、Enable TPM in the Windows 7 OS files
  • E、Set up the OS and the system files on the same partition
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A network technician wants to use a packet analyzer to troubleshoot a reported problem with auser‘s workstation with IP address 192.168.1.45. To identify the workstation‘s packets thetechnician wants to use the workstation‘s MAC address.Which of the following protocols would provide the needed information?()

A.DHCP

B.ARP

C.DNS

D.PING


参考答案:B

第2题:

A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?()

A. DHCP server

B. Proxy server

C. Repeater

D. DHCP relay


参考答案:D

第3题:

A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()

A. ESD mat

B. ESD wrist strap

C. Sealable plastic bag

D. Anti-static bag


参考答案:D

第4题:

A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()

  • A、Keyboard filters
  • B、Privacy filters
  • C、Screensavers
  • D、Secure display drivers

正确答案:B

第5题:

You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()

  • A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.
  • B、You must then zeroize the keys to reset secure shell before configuring other parameters.
  • C、All vty ports are automatically enabled for SSH to provide secure management.
  • D、The SSH protocol is automatically enabled.

正确答案:D

第6题:

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

A. WEP encryption

B. Channel rotation

C. Disable SSID

D. WPA encryption


参考答案:D

第7题:

A technician wants to compare a new server performance over a period of time. Which of the following should the technician do FIRST?()

A. Monitor processor performance logs

B. Constantly check the task manager

C. Use performance server logs

D. Establish a baseline for the server


参考答案:D

第8题:

A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()

A. Keyboard filters

B. Privacy filters

C. Screensavers

D. Secure display drivers


参考答案:B

第9题:

A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rs

  • A、Power Users
  • B、Users
  • C、Guests
  • D、Administrato

正确答案:B

第10题:

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

  • A、Disable post scan
  • B、Use SSH or SSL
  • C、Enable trust levels
  • D、Deny echo replies on all edge routers

正确答案:B

更多相关问题