-
The health seeking youths can following the()of natural living.
A . principles
B . principals
C . principality
D . prince
-
()good health, one can achieve anything.
A . Giving
B . Having given
C . Given
D . Having been give
-
Why would a network administrator configure port security on a switch?()
A . to prevent unauthorized Telnet access to a switch port
B . to limit the number of Layer 2 broadcasts on a particular switch port
C . to prevent unauthorized hosts from accessing the LAN
D . to protect the IP and MAC address of the switch and associated ports
E . to block unauthorized access to the switch management interfaces over common TCP port
-
Refer to the exhibit.
Which interface or interfaces on switch SW_A can have the port security feature enabled?()
https://assets.asklib.com/images/image2/2018073010533476447.jpg
A . Ports 0/1 and 0/2
B . The trunk port 0/22 and the EtherChannel ports
C . Ports 0/1, 0/2 and 0/3
D . Ports 0/1, 0/2, 0/3, the trunk port 0/22 and the EtherChannel ports
E . Port 0/1
F . Ports 0/1, 0/2, 0/3 and the trunk port 0/22
-
What can be done to secure the virtual terminal interfaces on a router?()
A . Administratively shut down the interface.
B . Physically secure the interface.
C . Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D . Configure a virtual terminal password and login process.
E . Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
-
What can you install on IPCC Express to protect against worms, zero-day viruses, and other immediate security threats?()
A . Microsoft Management Console
B . Cisco Security Agent (headless agent)
C . Cisco Security Agent Management Center
D . Microsoft SQL Server 2000
-
What can be done to secure the virtual terminal interfaces on a router?()
A . Administratively shut down the interface.
B . Physically secure the interface.
C . Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D . Configure a virtual terminal password and login process.
E . Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
-
There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()
A . the use of hosted email services eliminating the need for local security
B . the perceived costs of security solutions
C . the lack of risk analysis
D . the lack of threats to their network
E . the belief that free security tools are sufficient
F . the desire to avoid unnecessary technologie
-
You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()
A . Administratively shut down the interface.
B . Physically secure the interface.
C . Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D . Configure a virtual terminal password and login process.
E . Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
-
The Company security administrator wants to prevent VLAN hopping on the network. What is one method that can be used to do this? ()
A . Attacks are prevented by utilizing the port-security feature.
B . An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.
C . Configuring an interface with the switchport mode dynamic command will prevent VLAN hopping.
D . An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q encapsulation.
E . Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
-
Why would a network administrator configure port security on a switch()。
A . to prevent unauthorized Telnet access to a switch port
B . to limit the number of Layer 2 broadcasts on a particular switch port
C . to prevent unauthorized hosts from accessing the LAN
D . to protect the IP and MAC address of the switch and associated ports
E . to block unauthorized access to the switch management interfaces over common TCP port
-
On the basis of the following exhibit, can you tell me why VLAN updates from switch CK-P2S1 arenot applied to switch CK-P1S1?()https://assets.asklib.com/images/image2/2018072615144394963.jpg
A . The MD5 digests do not match
B . Switch CK-P1S1 is in transparent mode
C . The passwords do not match
D . The VTP domains are different
-
Which can be done to secure the virtual terminal interfaces on a router?()
A . Administratively shut down the interfaces.
B . Physically secure the interfaces.
C . Configure a virtual terminal password and login process.
D . Enter an access list and apply it to the terminal interfaces using the access-class command.
E . Create an access list and apply it to the terminal interfaces using the access-group command.
-
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()
A . On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
B . On all client computers, implement logon auditing for all user account logons
C . On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
D . On all domain controllers, implement logon auditing for all user account logo
-
Which can be done to secure the virtual terminal interfaces on a router?()
A . Administratively shut down the interfaces.
B . Physically secure the interfaces.
C . Configure a virtual terminal password and login process.
D . Enter an access list and apply it to the terminal interfaces using the access-class command.
E . Create an access list and apply it to the terminal interfaces using the access-group command
-
Why did family members stay up as late as they can on New Year's Eve?
-
Generous public funding of basic science would ________ considerable benefits for the country‘s health, wealth and security.
-
According to the article, inventors used to secure patents on their inventions far______than they can now.
A.easiest
B.easier
C.most easily
D.more easily
-
听力原文:F: What I can't make out you is why you are so keen on the Layer-de-la-Haye house. Why on earth should we choose, actually choose, to live out in a village, even if it is a popular village. You know that I would love to live in town and...
M: ...and be boxed in by a thousand other houses I suppose~ Surrounded by a thousand faceless neighbors. No, let' s go for the village. After all I'm the one who has to do all the traveling. Back and forth to London every day. And I would rather add a 15 minutes bus ride to the train ride than be--How does it go?--cabin' d, cribb' d confi' d.
F: That' s all very well...all very well to take that romantic attitude. You know... you think you can get out of everything...wriggle out of any argument...by quoting Shakespeare. What about my preferences? You are being selfish you know.
M: Selfish? Me?
F: Yes. Think of the children. Its seems to me that you are so carried away with the idea that your personal likes and dislikes are making you anything but practical.
What's the relations between the speakers?
A.Friends.
B.Colleagues.
C.Husband and wife.
D.Landlord and tenant.
-
听力原文:W: What's the reason for the warning on every pack of cigarettes? I mean the note that says smoking is dangerous to health. Why does the manufacturer say so?
M: It's the law here. They have to print it.
Q: What are they talking about?
(14)
A.People must give up cigarettes.
B.A health warning on cigarette packs.
C.The law doesn't allow people to smoke.
D.Smoking can cause lung cancer.
-
There could be an even ______ () cost on your health, if you neglected your health.
-
Your network consists of a single Active Directory domain. The domain contains a server namedServer1 that runs Windows Server 2003 Service Pack 2 (SP2).Your company’s security policy states that domain users must be prevented from logging on to Server1 ifa domain controller is unavailable.You disconnect Server1 from the network and discover that you can log on to Server1.You need to configure Server1 to comply with the company’s security policy.What should you do on Server1?()
A. From the local security policy, modify the Security Options.
B. From the local security policy, modify the User Rights Assignment.
C. From Active Directory Users and Computers, modify the properties of the Server1 account.
D. From Active Directory Users and Computers, modify the properties of the Domain Computers group.
-
Why must senior management endorse a security policy?()
A.So that they will accept ownership for security within the organization.
B.So that employees will follow the policy directives.
C.So that external bodies will recognize the organizations commitment to security.
D.So that they can be held legally accountable.