网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which command is used to enable access to J-Web using HTTPS?()

  • A、set system remote-access profile https
  • B、set services remote-access profile j-web-https
  • C、set system services web-management https
  • D、set services web-management j-web-https

参考答案

更多 “Which command is used to enable access to J-Web using HTTPS?()A、set system remote-access profile httpsB、set services remote-access profile j-web-httpsC、set system services web-management httpsD、set services web-management j-web-https” 相关考题
考题 Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?() A. set content-filtering profilepermit-command block-mimeB. set content-filtering profileblock-mimeC. set content-filtering block-content-typeblock-mimeD. set content-filtering notifications block-mime

考题 Which operational mode command can be used to synchronize the local system time with an NTP server?() A. set ntp time 64.32.129.3B. set clock ntp 64.32.129.3C. set time 64.32.129.3D. set date ntp 64.32.129.3

考题 Which of the following best defines the Cisco Lifecycle Services approach()A、the minimum set of services that are needed to successfully deploy and manage technology solutionB、system design to help ensure selection of the most appropriate productsC、business requirements and investments as they pertain to asset lifecycle managementD、technology strategies and related product lifecycles that are required to ensure minimal risks and maximum return of investment

考题 Which command is used to enable access to J-Web using HTTPS?()A、set system remote-access provle httpsB、set services remote-access profile j-web-httpsC、set system services web-management httpsD、set services web-management j-web-https

考题 You need to enable hibernation support for a computer that runs Windows XP Professional. What should you do?()A、From Control Panel, configure the Power Options. B、From the System properties, configure the Data Execution Prevention settings. C、From the Services console, set the Startup type for the Human Interface Devices service to Automatic. D、From the Services console, set the Startup type for the Uninterruptable Power Supply service to Automatic. 

考题 Which JUNOS software command establishes a connection to a RADIUS server with an IP addressof 10.100.200.1?()A、set system radius-server 10.100.200.1B、set radius-server address 10.100.200.1C、set authentication radius-server 10.100.200.1D、set system authentication radius-server 10.100.200.1

考题 You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

考题 A system has a critical need for network services on a small network with a limited number of hosts. System overhead is not a concern. Which of the following should the system administrator do to help ensure connectivity in the event of a gateway failure?()A、Use the ifconfig command to enable dead gate detectionB、Use the no command to set active dead gateway detectionC、Use the route command to set active dead gateway detectionD、Add the line active_dgd=1 to the /etc/gated.conf command and refresh the gated daemon

考题 A machine has just been installed with AIX, and no system parameters have been changed. In order to enable routing function, which of the following "no" options should be changed?()A、 set bcastping to 1 B、 set ipforwarding to 1 C、 set rfc1323 to 1 D、 set directed_broadcast to 1

考题 Which operational mode command can be used to synchronize the local system time with an NTP server?()A、set ntp time 64.32.129.3B、set clock ntp 64.32.129.3C、set time 64.32.129.3D、set date ntp 64.32.129.3

考题 Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()A、set content-filtering profile permit-command block-mimeB、set content-filtering profile block-mimeC、set content-filtering block-content-type block-mimeD、set content-filtering notifications block-mime

考题 Which operational mode command can be used to synchronize the local system with an NTP server?()A、set ntp time 64.32.129.3B、set clock ntp 64.32.129.3C、set time 64.32.129.3D、set date ntp 64.32.129.3

考题 Which configuration command is used to make the ERX Edge Router an NTP server?()A、 set ntp-serverB、 set ntp serverC、 ntp-server enableD、 ntp server enable

考题 You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()A、set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamB、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamC、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyD、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam

考题 You issued the following command at the UNIX environment:   % setenv ORA_SDTZ ’OZ_TZ’   What will be the impact of issuing the above command?()  A、 The operating system local time zone will be set for a user session using the operating system environment variable.B、 The database local time zone will be set for a user session using the operating system environment variable.C、 The operating system local time zone will be set for the database using the operating system environmentD、 The database local time zone will be set for the database using the operating system environment variable.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runsTerminal Services. You have the head office printer configured as the default printer on the TerminalServer. According to the requirements of the company policy, all remote client computers must meet thefollowing requirements: Users must be able to access their local printers during a terminal session. The head office printer must bethe default printer of the client computers. A Group Policy object (GPO) needs to be created by using theTerminal Services Printer Redirection template to meet the company policy. What action should you perform?()A、The Do not set default client printer should be set to be default printer in a session option to Enabled.The GPO should be applied to all the client computers.B、The Easy Print driver first option should be set to Disabled. The GPO should be applied to the Terminal Server.C、The Use Terminal Services Easy Print driver first option should be set to Disabled. The GPO should be applied to all the client computers.D、The Do not set default client printer should be set to be default printer in a session option to Enabled.The GPO should be applied to the Terminal Server.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You have a Terminal Services farm that contains several Terminal Servers. One of the Terminal Serversshould be configured as a dedicated redirector. After you configure the appropriate DNS records,what action should you perform next?()A、The server should be configured to deny new user logons from Terminal Services Configuration.B、The licensing mode should be set to per user from Terminal Services Configuration.C、The licensing mode should be set to per device from Terminal Services Configuration.D、The relative weight of the server should be changed to 50 from Terminal Services Configuration.

考题 Your network consists of a single Active Directory domain. The network contains a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has an application that runs as a service. The application uses a domain service account to access other servers in the domain. Security policies require that users reset their passwords every 30 days. After the application runs for a month, the application fails.You need to ensure that the application starts and can access the remote servers. What should you do?()A、In the Services snap-in, set the service to log on as the Local System account and start the service.B、In the Services snap-in, set the service to log on as the Local Administrator account and start the service.C、In Active Directory Users and Computers, reset the server’s computer account. In the Services snap-in, start the service.D、In Active Directory Users and Computers, set the Account Expires option to Never. In the Services snap-in, start the service. 

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server which runs Windows Server 2008. The Terminal Services serverrole has been installed on the server. Microsoft Windows System Resource Manager (WSRM) is installedon the server. Now you receive report from users saying about performance degradation on the TerminalServer. You monitor the server and notice that one user is consuming 100 percent of the processor time.You create a resource-allocation policy named Policy1 that limits each user to 30 percent of the totalprocessor time. But you do not see any performance improvement. WSRM needs to be configured toenforce Policy1. What action should you perform?()A、The Terminal Services Configuration service should be restarted.B、Use the user context of the Terminal Server System account to launch the WSRM application.C、Set Policy1 should be set as the Profiling Policy.D、Set Policy1 should be set as the Managing Policy.

考题 You are creating an ASP.NET web application that hosts several Windows Communication Foundation (WCF) services. The services have ASP.NET Compatibility Mode enabled. Users authenticate with the Web application by using a cookie-based ASP.NET Forms Authentication model. You add a service file named Authentication.svc that contains the following code segment: %@ ServiceHost Service="System.Web.ApplicationServices.AuthenticationService" Factory="System.Web.ApplicationServices.ApplicationServicesHostFactory" % You need to ensure that users can access the WCF services without having to re-authenticate. Which two configuration settings should you add? (Each is part of a complete solution. Choose two.)()A、In the system web. Extensions scripting/webServices/authenticationService element, set the enabled attribute to true.B、In the system web. Extensions scripting/webServices/profileService element, set the enabled attribute to true.C、Add a service endpoint with basicHttpBinding for the contract System.Web.ApplicationServices.AuthenticationService.D、Add a custom service behavior named AuthenticationService Type Behaviors with a service AuthenticationManager element that has service AuthenticationManagerType set to System.Web.Security.SQL Membership Provider

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The TerminalServices server role is installed on the server. A Terminal Services application runs on the server. Now youreceive report from users saying that that the application stops responding. You monitor the memory usageon the server for a week and find that the application has a memory leak. A patch is not currently available.You create a new resource-allocation policy in Microsoft Windows System Resource Manager (WSRM).You configure a Process Matching Criteria named TrackShip and choose the application. You have toterminate the application when the application consumes more than half of the available memory on theserver. What action should you perform?()A、The resource-allocation policy and the maximum working set limit option should be set to half the available memory on the server. The new policy should be set as a Managing Policy.B、The resource-allocation policy and the maximum committed memory option should be set to half the available memory on the server. The new policy should be set as a Profiling Policy.C、The resource-allocation policy and the maximum committed memory option should be set to half the available memory on the server. The new policy should be set as a Managing Policy.D、The resource-allocation policy should be configured and the maximum working set limit option should be set to half the available memory on the server. The new policy should be set as a Profiling Policy.

考题 多选题You are creating an ASP.NET web application that hosts several Windows Communication Foundation (WCF) services. The services have ASP.NET Compatibility Mode enabled. Users authenticate with the Web application by using a cookie-based ASP.NET Forms Authentication model. You add a service file named Authentication.svc that contains the following code segment: You need to ensure that users can access the WCF services without having to re-authenticate. Which two configuration settings should you add? (Each is part of a complete solution. Choose two.)()AIn the system web. Extensions scripting/webServices/authenticationService element, set the enabled attribute to true.BIn the system web. Extensions scripting/webServices/profileService element, set the enabled attribute to true.CAdd a service endpoint with basicHttpBinding for the contract System.Web.ApplicationServices.AuthenticationService.DAdd a custom service behavior named AuthenticationService Type Behaviors with a service AuthenticationManager element that has service AuthenticationManagerType set to System.Web.Security.SQL Membership Provider

考题 单选题You issued the following command at the UNIX environment:   % setenv ORA_SDTZ ’OZ_TZ’   What will be the impact of issuing the above command?()A  The operating system local time zone will be set for a user session using the operating system environment variable.B  The database local time zone will be set for a user session using the operating system environment variable.C  The operating system local time zone will be set for the database using the operating system environmentD  The database local time zone will be set for the database using the operating system environment variable.

考题 多选题You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()AIn ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.BIn Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.CIn Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).DIn Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.EIn ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.FIn ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

考题 单选题Which command is used to enable access to J-Web using HTTPS?()A set system remote-access provle httpsB set services remote-access profile j-web-httpsC set system services web-management httpsD set services web-management j-web-https

考题 单选题Which command is used to enable access to J-Web using HTTPS?()A set system remote-access profile httpsB set services remote-access profile j-web-httpsC set system services web-management httpsD set services web-management j-web-https

考题 单选题Which configuration command is used to make the ERX Edge Router an NTP server?()A  set ntp-serverB  set ntp serverC  ntp-server enableD  ntp server enable