Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()A、Disable TELNETB、Disable IGMP snoopingC、Enable TELNET but not SSLD、Disable ICMP/ping on device

题目

Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()

  • A、Disable TELNET
  • B、Disable IGMP snooping
  • C、Enable TELNET but not SSL
  • D、Disable ICMP/ping on device
参考答案和解析
正确答案:A
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()

A. Disable SSID

B. WPA

C. MAC filtering

D. RAS


参考答案:A

第2题:

Which of the following actions will prevent a driver from being reinstalled automatically?()

A. Run the disable command.

B. Disable the device using Device Manager.

C. Review manufacturer manual.

D. Reboot the server, logon in Safe Mode, uninstall the driver.


参考答案:B

第3题:

You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()

A. The user will be instructed to call the network administrator.

B. The user will fail authentication.

C. The user will be prompted to install a new device certificate on the MAG Series device.

D. The user will successfully authenticate and have full network access.


参考答案:B

第4题:

Which of the following solutions will detect and disable a rogue access point?()

  • A、Port scan
  • B、Packet sniffer
  • C、IPS
  • D、IDS

正确答案:C

第5题:

A user would like to ensure that only their family and their laptops can access a newly installed wireless router. Which of the following BEST accomplishes this?()

  • A、MAC filtering
  • B、Disable DHCP
  • C、Static IP addresses
  • D、Port forwarding

正确答案:A

第6题:

Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()

A. Disable TELNET

B. Disable IGMP snooping

C. Enable TELNET but not SSL

D. Disable ICMP/ping on device


参考答案:A

第7题:

Which of the following would be the BEST way for Mike, a technician, to disallow other clients to access a WAP, if only the same clients will always be accessing it?()

  • A、Disable SSID broadcast
  • B、Enable MAC filtering
  • C、Disable DHCP server
  • D、Enable WEP encryption

正确答案:B

第8题:

A technician would like to load an operating system CD on startup. Which of the following settings would a technician change in the BIOS?()

A. Enable TPM

B. Enable BIOS password

C. Disable TPM

D. Boot sequence


参考答案:D

第9题:

Which of the following is the BEST way to deny unauthorized computers access to a network? ()

  • A、Disable DHCP.
  • B、Use MAC filtering.
  • C、Disable the SSID broadcast.
  • D、Use a network firewall.

正确答案:D

第10题:

You are the administrator of your company’s network. You install Windows 2000 Professional on 10 computers in the graphics department. The 10 computers have built in USB controllers. You physically install a USB tablet pointing device on each computer. You install the 32-bit manufacturer tablets software on each computer. A tablet icon appears in the central panel to configure the device but the device does not work. You want the USB tablets to work on 10 computers. What should you do?()

  • A、Enable the USB ports in the BIOS and reinstall the USB tablet device drivers.
  • B、Enable the USB root hub controller and reinstall the USB tablet device drivers.
  • C、Disable the USB error detection for the USB root hub controller and enable the USB tablet device in the hardware profile.
  • D、Reinstall the USB device drivers and disable the USB error detection.

正确答案:A

更多相关问题