网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Machine policy templates can be assigned based on certain attributes of a machine. A customer organizes their machines based on the following requirements: The machines are all placed in specific Organizational Units in the Active Directory. The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines. The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()
A
Hostnames
B
IP Addresses
C
Machine Group Tag
D
Active Directory Groups
参考答案
参考解析
解析:
暂无解析
更多 “单选题Machine policy templates can be assigned based on certain attributes of a machine. A customer organizes their machines based on the following requirements: The machines are all placed in specific Organizational Units in the Active Directory. The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines. The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()A HostnamesB IP AddressesC Machine Group TagD Active Directory Groups” 相关考题
考题
● The scope of a project can be expected to change if:A The project manager must provide cost estimates without having a design conceptB Oversimplification (underestimating) of the nature of the work occursC The project manager is assigned after the project is defined, and the cost and schedule are approvedD A clear objective is not providedE All of the above are possible based upon the situation
考题
What is a method by which an IP interface can be assigned to a virtual router in a PPP over ATM environment?()
A.policy listB.RADIUS VSAC.classifier ACLD.LCP negotiation
考题
What are three ways an IP interface can be assigned to a virtual router in a PPP over ATM environment? ()(Choose three.)
A. profileB. policy listC. domain mapD. RADIUS VSAE. classifier ACL
考题
Which two statements apply to dynamic access lists?()A、they offer simpler management in large internetworks.B、you can control logging messages.C、they allow packets to be filtered based on upper-layer session information.D、you can set a time-based security policy.E、they provide a level of security against spoofing.F、they are used to authenticate individual users
考题
Each machine in the internet is assigned a unique network address,called(),that is used to identify the machine for communication purposesA、MAC addressB、IP addressC、host addressD、domain name address
考题
What is a method by which an IP interface can be assigned to a virtual router in a PPP over ATM environment?()A、policy listB、RADIUS VSAC、classifier ACLD、LCP negotiation
考题
Choose the two correct statements regarding Oracle WebLogic Server()A、 a server instance can be associated with multiple machinesB、 a machine can be associated with multiple server instance C、 a server instance can be associated with only a single machine D、 a machine can be associated with only one server instance
考题
Which three options are supported as address allocation mechanisms for DHCP on Cisco routers?()A、The IP address can be automatically assigned to a host.B、The IP address can be assigned as a random hash value of the burned - in - address of the lowest - numbered LAN interface on the router.C、The network administrator can assign a speci fic IP address to a specific host MAC address.D、The IP address can be assigned from configured pools in a reverse lexicographical order.E、The IP address can be assigned to a host for a limited time or until the host explicitly releases the address.F、The IP address can be assigned to a host until the host usurps the assigned value using its own dynamic override mechanism.
考题
Machine policy templates can be assigned based on certain attributes of a machine. A customer organizes their machines based on the following requirements: The machines are all placed in specific Organizational Units in the Active Directory. The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines. The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()A、HostnamesB、IP AddressesC、Machine Group TagD、Active Directory Groups
考题
You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()A、activating a JUNOS Software commit scriptB、configuring an IDP groups statementC、setting up a chassis clusterD、downloading the IDP policy templatesE、installing the policy templates
考题
Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A、A route-based VPN generally uses less resources than a policy-based VPN.B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
考题
You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()A、 DBMS_RLS.STATICB、 DBMS_RLS.DYNAMICC、 DBMS_RLS.SHARED_STATICD、 DBMS_RLS.CONTEXT_SENSITIVEE、 DBMS_RLS.SHARED_CONTEXT_SENSITIVE
考题
You want to enforce a company’s business policy on several objects by using a singlepolicy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective?()A、DBMS_RLS.STATICB、DBMS_RLS.DYNAMICC、DBMS_RLS.SHARED_STATICD、DBMS_RLS.CONTEXT_SENSITIVEE、DBMS_RLS.SHARED_CONTEXT_SENSITIVE
考题
Your network contains a Virtualization environment that includes the following: - 10 hosts that run VMware ESX Server 4.0 - Microsoft System Center Virtual Machine Manager - 50 Hyper-V hosts that run Windows Server 2008 R2 Each Virtualization host contains a minimum of 15 virtual machines (VMs). You need to recommend a solution to ensure that users can create and deploy VMs to any of the virtualization hosts. The VMs must be based on templates created by an administrator. What should you include in the recommendation?()A、Microsoft System Center Data Protection ManagerB、Microsoft Enterprise Desktop Virtualization (MED-V) Workspace PackagerC、VMM Self-service PortalD、System Center Virtual Machine Manager physical-to-virtual machine (P2V) conversionE、Virtual Machine Servicing Tool (VSMT)F、Authorization ManagerG、Microsoft Application Virtualization (App-V) SequencerH、Microsoft System Center Operations ManagerI、System Center Virtual Machine Manager virtual-to-virtual machine (V2V) conversionJ、Active Directory Rights Management Services (AD RMS)
考题
Your network contains an Active Directory Rights Management Services (AD RMS) cluster. You have several custom policy templates. The custom policy templates are updated frequently. Some users report that it takes as many as 30 days to receive the updated policy templates. You need to ensure that users receive the updated custom policy templates within seven days. What should you do()A、Modify the registry on the AD RMS servers.B、Modify the registry on the users computers.C、Change the schedule of the AD RMS Rights Policy Template Management (Manual) scheduled task.D、Change the schedule of the AD RMS Rights Policy Template Management (Automated) scheduled task.
考题
You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.
考题
单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()A
The command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledB
Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upC
Backup optimization is permanently disabledD
Backup optimization is temporarily disabled because a redundancy-based retention policy is specified
考题
单选题Machine policy templates can be assigned based on certain attributes of a machine. A customer organizes their machines based on the following requirements: The machines are all placed in specific Organizational Units in the Active Directory. The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines. The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()A
HostnamesB
IP AddressesC
Machine Group TagD
Active Directory Groups
考题
单选题Your network contains a Virtualization environment that includes the following: - 10 hosts that run VMware ESX Server 4.0 - Microsoft System Center Virtual Machine Manager - 50 Hyper-V hosts that run Windows Server 2008 R2 Each Virtualization host contains a minimum of 15 virtual machines (VMs). You need to recommend a solution to ensure that users can create and deploy VMs to any of the virtualization hosts. The VMs must be based on templates created by an administrator. What should you include in the recommendation?()A
Microsoft System Center Data Protection ManagerB
Microsoft Enterprise Desktop Virtualization (MED-V) Workspace PackagerC
VMM Self-service PortalD
System Center Virtual Machine Manager physical-to-virtual machine (P2V) conversionE
Virtual Machine Servicing Tool (VSMT)F
Authorization ManagerG
Microsoft Application Virtualization (App-V) SequencerH
Microsoft System Center Operations ManagerI
System Center Virtual Machine Manager virtual-to-virtual machine (V2V) conversionJ
Active Directory Rights Management Services (AD RMS)
考题
单选题Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A
A route-based VPN generally uses less resources than a policy-based VPN.B
A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C
A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D
A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
考题
单选题Your network contains the following servers: - A two-node Hyper-V failover cluster that runs Windows Server 2008 R2 - A server that has Microsoft System Center Operations Manager 2007 R2 installed - A server that has Microsoft System Center Virtual Machine Manager 2008 R2 installed You need to provide certain users with the ability to create their own virtual machines (VMs). The solution must minimize the number of permissions assigned to the users. What should you do?()A
Deploy the VMM Self Service Portal. Create VM templates. Create a self-service user roleB
Deploy the VMM Self-Service Portal. Add the users to the Power Users group. Deploy the VMM Administrator Console to the usersC
Deploy Windows Deployment Services (WDS). Create VM templates. Create a self-service user roleD
Deploy Windows Deployment Services (WDS). Add the users to the Power Users group. Deploy the VMM Administrator Console to the users
考题
多选题Which two statements apply to dynamic access lists?()Athey offer simpler management in large internetworks.Byou can control logging messages.Cthey allow packets to be filtered based on upper-layer session information.Dyou can set a time-based security policy.Ethey provide a level of security against spoofing.Fthey are used to authenticate individual users
考题
多选题Which two statements apply to dynamic access lists?()Athey offer simpler management in large internetworks.Byou can control logging messages.Cthey allow packets to be filtered based on upper-layer session information.Dyou can set a time-based security policy.Ethey provide a level of security against spoofing.Fthey are used to authenticate individual users.
考题
多选题You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()AThe endpoints can use agentless access.BEncrypted traffic flows between the endpoint and the enforcer.CEncrypted traffic flows between the endpoint and the protected resourceDThe endpoints can use the Odyssey Access Client.
考题
多选题You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()ADBMS_RLS.STATICBDBMS_RLS.DYNAMICCDBMS_RLS.SHARED_STATICDDBMS_RLS.CONTEXT_SENSITIVEEDBMS_RLS.SHARED_CONTEXT_SENSITIVE
考题
多选题You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()Aactivating a JUNOS Software commit scriptBconfiguring an IDP groups statementCsetting up a chassis clusterDdownloading the IDP policy templatesEinstalling the policy templates
考题
单选题Which statement regarding the implementation of an IDP policy template is true?()A
IDP policy templates are automatically installed as the active IDP policy.B
IDP policy templates are enabled using a commit script.C
IDP policy templates can be downloaded without an IDP license.D
IDP policy templates are included in the factory-default configuration.
考题
多选题You want to enforce a company’s business policy on several objects by using a singlepolicy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective?()ADBMS_RLS.STATICBDBMS_RLS.DYNAMICCDBMS_RLS.SHARED_STATICDDBMS_RLS.CONTEXT_SENSITIVEEDBMS_RLS.SHARED_CONTEXT_SENSITIVE
热门标签
最新试卷