-
The Company security administrator is concerned with layer 2 network attacks. Which two statements about these attacks are true? ()
A . ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
B . ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP message with a forged identity to a transmitting host.
C . MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.
D . ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP packet that contains the forged address of the next hop router.
E . MAC address flooding is an attempt to redirect traffic to a single port by associating that port with all MAC addresses in the VLAN.
-
The Company security administrator is concerned with VLAN hopping based attacks. Which two statements about these attacks are true? ()
A . Attacks are prevented by utilizing the port-security feature.
B . An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.
C . Configuring an interface with the switchport mode dynamic command will prevent VLAN hopping.
D . An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q encapsulation.
E . Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
-
You need to improve the company’s security patch management process. Your solution must meet existing business requirements and it cannot increase the number of employees or unnecessarily increase ongoing administrative effort. What should you do?()
A . Provide all users with the ability to access and use the Windows Update Web site
B . Upgrade all client computers to either Windows 2000 Professional or Windows XP Professional. Implement Software Update Services (SUS)
C . Upgrade all client computers to either Windows 2000 Professional or Windows XP Professional.Make all users members of the Power Users group on their client computers
D . Install the Active Directory Client Extensions on all Windows 95, Windows 98, and Windows NT Workstation 4.0 computers. Manually download all security patches to a Distributed File System (DFS) replica. Instruct all users to use the DFS replica to install security patches
E . Install the Active Directory Client Extensions on all Windows 95, Windows 98, and Windows NT Workstation 4.0 computers. Install a Software Update Services (SUS) server and make all users local administrators on their client computer
-
You are the administrator of a company with BGP connections to multiple ISP’s. How could youconfigure BGP to make it favor one particular ISP for outbound traffic?()
A . Configure weight
B . Enable route reflector
C . Create a distribute list
D . Enable the Longer Autonomous System path option
E . All of the above
-
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
A . Campus
B . Teleworker
C . Branch
D . Data center
-
You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()
A . the Authorization Manager snap-in on Node1 and Node2
B . the Authorization Manager snap-in on the VMs
C . the Network Configuration Operators local group on each VM
D . the Network Configuration Operators local group on Node1 and Node2
-
As the Company wireless administrator, you required to be knowledgeable about the wireless LAN components. Which two statements about these components are true? ()
A . In the autonomous access point solution, control is provided by the WLAN controller.
B . In the lightweight access point solution, WLAN management is provided by the WLAN Control System (WCS).
C . In the autonomous access point solution, control is provided by the WDS (Wireless Domain Services).
D . Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless Network.
E . Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution Engine (WLSE).
F . Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless Network.
-
The Company security administrator wants to prevent VLAN hopping on the network. What is one method that can be used to do this? ()
A . Attacks are prevented by utilizing the port-security feature.
B . An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.
C . Configuring an interface with the switchport mode dynamic command will prevent VLAN hopping.
D . An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q encapsulation.
E . Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
-
The Company network administrator has entered the "auto qos voip cisco-phone" command on switch R1. What does this command do?()
A . It disables the trust boundary feature because the switch knows a Cisco IP phone is attached.
B . The switch assigns a CoS value of 5 to incoming packets.
C . If a Cisco IP phone is attached and removed, the switch continues to trust the CoS values as long as the switch is not rebooted.
D . It turns on STP to see if a Cisco IP phone is attached.
E . If a Cisco IP phone is attached, the switch trusts the CoS.
F . None of the other alternatives apply.
-
The company auditors require a System p administrator to archive detailed information from each of their systems. Which of the following commands will accomplish this task()
A . snap -a
B . snap -i
C . prtconf
D . lsconf
-
You are the Database Administrator (DBA) of your company. You execute the following statement on an Oracle 10g instance: SQL> ALTER SYSTEM SWITCH LOGFILE; Which two tasks are performed when the statement is executed? ()
A . The DBWn process writes to the datafile.
B . Changes in the background process are recorded.
C . The log file is updated with the current SCN number.
D . The System Change Number (SCN) is recorded in the control file.
E . The changes to the listener configuration in the listener.ora file are recorded.
-
As a junior network administrator of your company, you have been asked to move the printer spool off the system partition and onto another hard disk to solve disk space issues. How will you move the printer spool to another drive?()
A . From the command prompt run the command 'move c:\winnt\system32\spool printers [desired location]'.
B . From the command prompt run the command 'move c:\winnt\spool printers [desired location]'.
C . From the Advanced tab of printer server properties.
D . Configure the print$ share on your computer to point to the desired location.
-
You are a database administrator for your company. You are responsible for a SQL Server 2005 database that has several indexes. You need to write a stored procedure that checks the indexes for fragmentation. Which Transact-SQL statement should you use?()
A . DBCC DBREINDEX
B . SELECT * FROM sys.dm_db_index_physical_stats
C . DBCC INDEXDEFRAG
D . SELECT * FROM sys.indexe
-
You are the network administrator tasked with designing a switching solution for the Company network. Which of the following statements describing trunk links are INCORRECT?()
A . The trunk link belongs to a specific VLAN.
B . Multiple trunk links are used to connect multiple end user devices.
C . A trunk link only supports native VLAN.
D . Trunk links use 802.10 to identify a VLAN.
E . The native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets.
-
You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()
A . msi
B . mst
C . zap
D . zi
-
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()
A . On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
B . On all client computers, implement logon auditing for all user account logons
C . On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
D . On all domain controllers, implement logon auditing for all user account logo
-
You need to design a security strategy that will ensure that unauthorized users cannot access personnel data. Your solution must comply with security requirements and the company’s new administrative model.What should you do?()
A . In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA\HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
B . In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA\HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
C . In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA\HRUsers group and the CORP\Backup Operators group to the Restricted Groups list. Add only the HR department user accounts and the administrator user accounts to the Allowed Members list for each group
D . In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA\HRUsers group and the CORP\Backup Operators group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list for the LA\HRUsers group. Add only the administrator user accounts to the Allowed Members list for the CORP\Backup Operators grou
-
A(An)()should be issued for every company complying with the requirement of the ISM Code by the Administration.
-
You are the network administrator in the New York office of TestKing.The company net
You are the network administrator in the New York office of TestKing.
The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA.
All file servers in the New York office are in an organizational unit (OU) named
New York Servers. You have been assigned the Allow - Change permission for a
Group Policy object (GPO) named NYServersGPO, which is linked to the New
York Servers OU.
The written company security policy states that all new servers must be configured
with specified predefined security settings when the servers join the domain. These
settings differ slightly for the various company offices.
You plan to install Windows Sever 2003, on 15 new computers, which all functions
as file servers. You will need to configure the specified security settings on the new
file servers.
TestKingA currently has the specified security settings configured in its local
security policy. You need to ensure that the security configuration of the new file
servers is identical to that of TestKingA. You export a copy of TestKingA‘s local
security policy settings to a template file.
You need to configure the security settings of the new servers, and you want to use
the minimum amount of administrative effort.
What should you do?()
-
You are the administrator of a Windows Server 2003 computer named TestKing3.TestKing3 has Terminal Services installed. TestKing3 connects to the Internet through a proxy server on the company network.Help desk employees periodically access custom web applications on the company network. You install IIS on TestKing3 with all the default settings.You need to ensure that help desk employees can access Terminal Services on TestKing3 from Internet Explorer 6.0.What should you do?()
A. Uninstall IIS and Terminal Services. Reinstall IIS, and then reinstall Terminal Services.
B. Configure the Internet Connection Firewall (ICF) to allow incoming ports 80 and 3389.
C. Create a new virtual directory named Tsweb.
D. Create a new web site named Tsweb.
E. Install Remote Desktop Web Connection
-
You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.
You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.
Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.
You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.
A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/c1ca10b5ef7976b1e62efd8e32fc3420.jpg' />
You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/35218487c59e1ec9d3305e8d5fd23b81.jpg' />
You need to ensure that Paul can establish Remote Desktop connections with DC1.
What should you do? ()
-
The database administrator of your company created a public synonym called HR for the HUMAN_RESOURCES table of the GENERAL schema, because many users frequently use this table. As a user of the database, you created a table called HR in your schema.What happens when you execute this query?()
<img src='https://img2.soutiyun.com/shangxueba/ask/17133001-17136000/17135882/b1559080aa448ecf1a5fe7380a121c8c.jpg' />
A. You obtain the results retrieved from the public synonym HR created by the database administrator.
B. You obtain the results retrieved from the HR table that belongs to your schema.
C. You get an error message because you cannot retrieve from a table that has the same name as a public synonym.
D. You obtain the results retrieved from both the public synonym HR and the HR table that belongs to your schema, as a Cartesian product.
E. You obtain the results retrieved from both the public synonym HR and the HR table that belongs to your schema, as a FULL JOIN.
-
You are the network administrator for your company. All network servers run Windows Server 2003.One of your servers contains a RAID-5 volume. Routine monitoring reveals a failed disk in the set. Theserver is running and users are connecting to shared folders on the RAID-5 volume.You shut down the server and replace the failed disk.Now you need to ensure that the RAID-5 volume is redundant.What should you do? ()
A. Initialize the new disk. Select the failed region and then select the Repair Volume option.
B. Import the foreign disk. Select the failed region and then select the Repair Volume option.
C. Initialize the new disk. Select the failed region and then select the Reactivate Disk option.
D. Import the foreign disk. Select the failed region and then select the Reactivate Disk option.
-
You are a network administrator for your company. The network consists of a single Active Directorydomain.A user named Mary works in the information technology security department. Mary is a member of theITSecurity global group. Mary reports that no one in the ITSecurity global group can access the securitylog from the console of a computer named Server1.You need to grant the ITSecurity global group the minimum rights necessary to view the security log onServer1.How should you modify the local security policy?()
A. Assign the Generate security audits user right to the ITSecurity global group.
B. Assign the Manage auditing and security logs user right to the ITSecurity global group.
C. Assign the Allow logon through Terminal Services user right to the ITSecurity global group.
D. Assign the Act as part of the operating system user right to the ITSecurity global group.