A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
第1题:
Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host .Automated configuration methods such as ______, are required to solve the problem.
A.IPsec
B.DHCP
C.PPTP
D.SOAP
第2题:
A.The file system superblock is dirty. It can be replaced from the VGDA
B.The logical volume superblock is dirty. It can be replaced from the VGDA
C.The file system superblock is dirty. It can be replaced from the secondary copy
D.The logical volume superblock is dirty. It can be replaced from the secondary copy
第3题:
You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server.From which base type should your custom event type inherit? ()
A. IWebEventCustomEvaluator
B. WebEventProvider
C. WebBaseEvent
D. WebAuditEvent
第4题:
Which of the following will help protect an operating system from vulnerability?()
第5题:
An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()
第6题:
The primary advantages of a Client/Server system arise from splitting the processing between the client system and the database server. Since the bulk of the database processing is done on the back-end, the speed of the DBMS isn't tied to the speed of the(31).The major disadvantage of Client/Server system is the increased cost of(32) and support personnel who maintain the database server. There is also the issue of(33)with so many parts comprising the entire C/S system; Murphy's Law can kick in-the more pieces that compose the system, the more pieces that can fail. It's also harder to track down problems when the system(34). And it can initially take longer to get all the components set up and working together. All this is compounded by the general lack of experience and expertise of potential support personnel and programmers, due to the relative newness of the technology. As C/S system become more common, this problem should abate.Therefore the C/S system is more(35).
A.network
B.operating system
C.personal computer
D.workstation
第7题:
The system administrator did a new install of AIX on a server about a week ago. The system was not rebooted after the installation. CDE is running on this system as is TCPIP. The system administrator has started configuring the system percompany directives. The power cable was inadvertently disconnected from the wall causing the sever to lose power. Upon reboot, the system appears to hang during log in from the console or from Xterminals. Which of the following is the most probable cause?()
A.It is a hardware problem caused by the power failure.
B.There is a network problem, most probably with name resolution.
C.Sine the system was never rebooted, devices are marked defined instead of available and need to be activated.
D.Some filesets may be marked as broken and need to be reinstalled.
第8题:
A. It enables an attacker to perform an IP sweep of devices.
B. It enables a hacker to know which operating system the system is running.
C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.
D. It creates a ping of death and can cause the entire network to be infected with a virus.
第9题:
What is the use of an "all configuration" backup in Cisco UCS?()
第10题:
The staff is not able to access a database server. The server has an ’Operating System not found’error and is set to boot from a fiber channel SAN. All other database servers are set to boot from the SAN and access the same switch and data as this database server. Which of the following is the MOST likely cause of the problem?()