SK0-003

单选题Which of the following could be used to restrict access to the local web server to only certain IP addresses?()ACreate an ACL.BCreate an application exception.CConfigure IPSec.DBlock port 80.

题目
单选题
Which of the following could be used to restrict access to the local web server to only certain IP addresses?()
A

 Create an ACL.

B

 Create an application exception.

C

 Configure IPSec.

D

 Block port 80.

参考答案和解析
正确答案: C
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following technologies can be used to remotely gain access to a server console?()

  • A、PS/2 KVM
  • B、LDAP
  • C、VNC
  • D、Remote desktop
  • E、VPN

正确答案:C,D

第2题:

A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()

  • A、are optional
  • B、are used to protect data beans
  • C、provide coarse-grained access control
  • D、never specify a relationship

正确答案:A,B

第3题:

Which of the following should be used to restrict access to a wireless network?()

A. Port forwarding

B. Enable SSID broadcast

C. Wireless encryption

D. Enable DMZ


参考答案:C

第4题:

Physical and logical network diagrams are used for which of the following configuration management goals?()

  • A、Track DHCP distribution
  • B、Compare MAC and IP addresses
  • C、Document Internet access history
  • D、Identity network devices

正确答案:D

第5题:

Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()

  • A、RAID array management
  • B、CHKDSK
  • C、Monitoring agents
  • D、Partitioning management

正确答案:A

第6题:

Which of the following commands could be used to start the Management Console on a workstation running Windows 2000/XP?()

  • A、Start > Run > MCP
  • B、Start > Run > MCE
  • C、Start > Run > MCA
  • D、Start > Run > MMC

正确答案:D

第7题:

Which of the following could be used to restrict access to the local web server to only certain IP addresses?()

  • A、 Create an ACL.
  • B、 Create an application exception.
  • C、 Configure IPSec.
  • D、 Block port 80.

正确答案:A

第8题:

Which two statements are true regarding the USING clause in table joins?()

  • A、It can be used to join a maximum of three tables 
  • B、It can be used to restrict the number of columns used in a NATURAL join 
  • C、It can be used to access data from tables through equijoins as well as nonequijoins 
  • D、It can be used to join tables that have columns with the same name and compatible data types

正确答案:B,D

第9题:

Which of the following would be the BEST way to restrict access to the WAP from certain clients?()

  • A、Disable DHCP server
  • B、Enable WEP encryption
  • C、Disable SSID broadcast
  • D、Enable MAC filtering

正确答案:D

第10题:

Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()

  • A、BIOS password
  • B、Domain membership
  • C、EFS
  • D、Bitlocker

正确答案:D

更多相关问题