网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()
A

set content-filtering profile permit-command block-mime

B

set content-filtering profile block-mime

C

set content-filtering block-content-type block-mime

D

set content-filtering notifications block-mime


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()A set content-filtering profile permit-command block-mimeB set content-filtering profile block-mimeC set content-filtering block-content-type block-mimeD set content-filtering notifications block-mime” 相关考题
考题 You create a Web site that stores users‘ active themes in user profile objects. You need to apply users‘ preferred themes when they log on to the Web site.What should you do? () A. In the InitComplete event handler, set the Theme property of the Page object based on the user profile.B. In the PreLoad event handler, set the Theme property of the Page object based on the user profile.C. In the OnLoad event handler, set the Theme property of the Page object based on the user profile.D. In the PreInit event handler, set the Theme property of the Page object based on the user profile.

考题 You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?() A. set security zones management interfaces ge-0/0/0.0B. set zones functional-zone management interfaces ge-0/0/0.0C. set security zones functional-zone management interfaces ge-0/0/0.0D. set security zones functional-zone out-of-band interfaces ge-0/0/0.0

考题 Which two content-filtering features does FTP support?() (Choose two.) A. block extension listB. block MIME typeC. protocol command listD. notifications-options

考题 Which CLI command provides a summary of what the content-filtering engine has blocked?() A. show security utm content-filtering statisticsB. show security flow sessionC. show security flow statisticsD. show security utm content-filtering summary

考题 Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?() A. set content-filtering profilepermit-command block-mimeB. set content-filtering profileblock-mimeC. set content-filtering block-content-typeblock-mimeD. set content-filtering notifications block-mime

考题 Referring to the exhibit, you are unable to commit the configuration for the ge-0/0/1 interface. What must you do to commit the configuration?() A. You must set the vlan-tagging parameter under the [edit interfaces ge-0/0/1] hierarchy.B. You must use the rename command to change unit 100 to unit 0.C. You must set the encapsulation flexible-ethernet-services parameter under the [edit interfaces ge-0/0/1] hierarchy.D. You must set the encapsulation vlan-ccc parameter under the [edit interfaces ge-0/0/1 unit 100] hierarchy.

考题 Which command is used to enable access to J-Web using HTTPS?()A、set system remote-access provle httpsB、set services remote-access profile j-web-httpsC、set system services web-management httpsD、set services web-management j-web-https

考题 Which two content-filtering features does FTP support?() (Choose two.)A、block extension listB、block MIME typeC、protocol command listD、notifications-options

考题 You established access to menu modules using roles. While testing the application, you need access to all the menus in the SALES form module for all the roles. Which method will override the Menu Module Roles property to allow you to access all the menu items?()A、Disable the values for the Menu Module Roles property. B、Set the Use Security value in the form module Property Palette to 'True'. C、Set the Use Security value in the form module Property Palette to 'False'. D、Set the Use Security value in the menu module Property Palette to 'True'. E、Set the Use Security value in the menu module Property Palette to 'False'. 

考题 Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()A、Set the security type to the No authentication (Open) option.B、Configure the wired and wireless network adapters as a network bridge.C、Modify the wireless network profile type to the Use all-user profiles only (recommended) option.D、On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.

考题 Which CLI command provides a summary of what the content-filtering engine has blocked?()A、show security utm content-filtering statisticsB、show security flow sessionC、show security flow statisticsD、show security utm content-filtering summary

考题 Under which configuration hierarchy is an access profile configured for firewall user authentication?()A、[edit access]B、[edit security access]C、[edit firewall access]D、[edit firewall-authentication]

考题 Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()A、set content-filtering profile permit-command block-mimeB、set content-filtering profile block-mimeC、set content-filtering block-content-type block-mimeD、set content-filtering notifications block-mime

考题 You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A、set security zones management interfaces ge-0/0/0.0B、set zones functional-zone management interfaces ge-0/0/0.0C、set security zones functional-zone management interfaces ge-0/0/0.0D、set security zones functional-zone out-of-band interfaces ge-0/0/0.0

考题 Which set of commands allows PPPoE dynamic interfaces to use a profile called config-info?()A、profile config-info auto-configure pppB、profile config-info auto-configure anyC、profile ppp config-info auto-configure pppoeD、profile pppoe config-info auto-configure pppoe

考题 Which command is used to enable access to J-Web using HTTPS?()A、set system remote-access profile httpsB、set services remote-access profile j-web-httpsC、set system services web-management httpsD、set services web-management j-web-https

考题 Which command do you use to go from the shell prompt to the CLI prompt?()A、run cliB、cliC、start cliD、edit

考题 You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()A、set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamB、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamC、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyD、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam

考题 For the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries. You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message. Which method would you follow to achieve this?()A、 Set the CPU time per call in the users profile.B、 Set the CPU time per session in the users profile.C、 Set the CPU levels for the user’s group using Resource Manager.D、 Set the TIMED_STATISTICS parameter to TRUE in the parameter file.

考题 You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

考题 单选题You create a Web site that stores users' active themes in user profile objects. You need to apply users' preferred themes when they log on to the Web site. What should you do? ()A In the InitComplete event handler, set the Theme property of the Page object based on the user profile.B In the PreLoad event handler, set the Theme property of the Page object based on the user profile.C In the OnLoad event handler, set the Theme property of the Page object based on the user profile.D In the PreInit event handler, set the Theme property of the Page object based on the user profile.

考题 单选题Which CLI command provides a summary of what the content-filtering engine has blocked?()A show security utm content-filtering statisticsB show security flow sessionC show security flow statisticsD show security utm content-filtering summary

考题 单选题Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()A set content-filtering profile permit-command block-mimeB set content-filtering profile block-mimeC set content-filtering block-content-type block-mimeD set content-filtering notifications block-mime

考题 单选题At which command prompt would you issue the set date command?()A [edit chassis]user@router#B [edit]user@router#C [edit system] user@router#D user@router

考题 多选题Which two content-filtering features does FTP support?() (Choose two.)Ablock extension listBblock MIME typeCprotocol command listDnotifications-options

考题 单选题Which command do you use to display the status of an antivirus database update?()A show security utm anti-virus statusB show security anti-virus database statusC show security utm anti-virus databaseD show security utm anti-virus update

考题 单选题For the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries. You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message. Which method would you follow to achieve this?()A  Set the CPU time per call in the users profile.B  Set the CPU time per session in the users profile.C  Set the CPU levels for the user’s group using Resource Manager.D  Set the TIMED_STATISTICS parameter to TRUE in the parameter file.

考题 单选题Under which configuration hierarchy is an access profile configured for firewall user authentication?()A [edit access]B [edit security access]C [edit firewall access]D [edit firewall-authentication]