Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()
The LAN needs are expanding at the Testking corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the TestKing network.Which of the following are layer 1 devices that you can use?()
CI(Corporate identity)是指企业形象的统一识别系统,常见的直译为“企业形象规范体系”,是指一个企业为了获得社会的理解与信任,将企业的宗旨和产品所包含的文化内涵传达给公众,从而建立起来的()体系形象系统。
You are an administrator for a corporate network. At a branch office,you want to deploy Windows Vista to21 client computers and Windows Server 2008 to four servers. For which operating systems is the branchoffice eligible for KMS licensing?()
Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()
A company has a corporate office building that is used by 50 to 100 unique visitors each day for meetings. Users routinely report that they are unable to access the network with their laptops when visiting this location. The help desk reports that these users are not getting IP addresses automatically assigned. After an investigation, the server administrator has determined that the DHCP service is functioning, but a minimal number of addresses are available for lease. The building is on its own class Csubnet and has 250 addresses in the scope. Which of the following represents a long term solution tothe problem?()
You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runsTerminal services to enable remote users to run commonly required applications from their terminal. Aremote user logged on to the Terminal Server, required some help on the application he wanted to run.However, when you connect to the Terminal Server session, you cannot operate any applications. Which ofthe following options would you choose to ensure that you can assist any user on the Terminal Server?()
As the administrator of your Windows 2000 corporate network you need to install Windows 2000 Professional on 88 computers, and you would like to do it with the least amount of administrative effort. You have 38 PXE-Compliant computers and 50 NON PXE-Compliant computers ready to go. You confirm that all 88 computers and their hardware are included on the current Windows 2000 hardware compatibility list (HCL).You create an RIS image and load it onto a Windows 2000 RIS Server. You then start the 88 computers. You find that the 38 PXE-Compliant computers connect fine to the RIS server, however the 50 NON PXE-Compliant computers cannot connect to the RIS server. What should you do to resolve this problem?()
You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runsTerminal services to enable remote users to run commonly required applications from their terminal. Anorganizational unit (OU) called TermSerUsers have been configured for the standard users who connect tothe Terminal Server and an OU called TermSerAdmin is configured for the administrative users. Besidesthese two types of users, no other user can connect to the Terminal Server. Which of the following optionswould you choose to ensure that only members of the TermSerAdmin OU can run the Remote DesktopProtocol files?()
Your company’s corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do? ()