网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()

  • A、The — ssl level was not specified
  • B、The server was not started with the – enable–ssl-plugin option
  • C、— ssl is not a valid server option
  • D、The mysqld binary was not compiled with SSL support
  • E、The server's SSL certificate was invalid

参考答案

更多 “ You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()A、The — ssl level was not specifiedB、The server was not started with the – enable–ssl-plugin optionC、— ssl is not a valid server optionD、The mysqld binary was not compiled with SSL supportE、The server's SSL certificate was invalid” 相关考题
考题 The packing of goods offered does not meet our standards. Could you use packing which is secure ()breakage?A、uponB、ofC、atD、from

考题 After attempting to telnet into a router, you are denied and you receive the error message "password required, but none set." What configuration changes will allow telnet access into this router?() A.B.C.D.

考题 If you are unable to stop a diesel engine by any other means,you should ______.A.Discharge a CO2 extinguisher in the air inletB.Pull off the distributor capC.Secure the jacket waterD.Secure the starting air supply valve

考题 Before using a fixed CO2 system to fight an engine room fire, you must ______.A.secure the engine room ventilationB.secure the machinery in the engine roomC.evacuate all engine room personnelD.All of the above

考题 If you saw flames aboard a vessel but could see the vessel was not on fire, you would known that the ______.A.crew was trying to get warmB.vessel required immediate assistanceC.vessel was attempting to attract the attention of a pilot boatD.vessel was being illuminated for identification by aircraft

考题 What can you do to ensure that you will stay healthy?A:be assured B:insist C:prove D:secure

考题 This letter will ensure you an interview.A:guarantee B:offer C:prove D:secure

考题 This recommendation letter will ensure you an interview.A:guarantee B:offer C:prove D:secure

考题 You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.

考题 When configuring more than one archival site, which statement is true?()A、The system will first attempt the transfer using the URL configured lastB、The system will transfer the configuration to each archival siteC、The system will not transfer to a secondary site unless the previous site failsD、The system will transfer using secure copy protocl (SCP) before attempting FTP

考题 Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A、 Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B、 Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C、 Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D、 Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.

考题 You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition toimplementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actionsshould you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.

考题 You have a single Active Directory directory service domain. All client computers run either Windows Vista or Windows XP. You create and configure a Group Policy object (GPO) named Secure Client  Computer. You need to ensure that the Secure Client Computer GPO is automatically applied to current  and future Windows XP client computers.  What should you do?()A、 Create a WMI filter that limits the scope of the Secure Client Computer GPO to the Windows XP operating system. Link the WMI filter to the GPO. Link the GPO to the domain.B、 Create a global security group that contains all of the Windows XP client computers. Edit the permissions of the Secure Client Computer GPO to allow the global security group the Read and Apply Group Policy permissions. Link the Secure Client Computer GPO to the domain.C、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Planning) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.D、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Logging) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.

考题 Which protocols would you want to use for secure VPN ?()A、EAPB、ChapC、Ms-ChapD、PPTPE、PAPF、SPAP

考题 You have two stand-alone servers that run Windows Server 2003 Service Pack 2 (SP2). You assign the Secure Server (Require security) IPSec policy to both servers. From Server1, you notice that you cannot access resources on Server2. You need to ensure that you can access resources on Server2. All communications between Server1 and Server2 must be encrypted.  What should you do?()A、On Server1, assign the Client (Respond only) IPSec policy.B、On Server2, assign the Server (Request Security) IPSec Policy.C、On Server1 and Server2, modify the authentication settings in the Secure Server (Require security) IPSec Policy.D、On Server1 and Server2, enable Master Key perfect forward secrecy (PFS) in the Secure Server (Require security) IPSec Policy.

考题 单选题What is the main consideration when deciding to invest in shares?A how much you pay for the sharesB how quickly you can make a profitC how willing you are to take risksD how financially secure you are

考题 单选题You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()A The — ssl level was not specifiedB The server was not started with the – enable–ssl-plugin optionC — ssl is not a valid server optionD The mysqld binary was not compiled with SSL supportE The server's SSL certificate was invalid

考题 单选题If you saw flames aboard a vessel but could see the vessel was not on fire,you would know that the().A crew was trying to get warmB vessel required immediate assistanceC vessel was attempting to attract the attention of a pilot boatD vessel was being illuminated for identification by aircraft

考题 单选题What is the main consideration when deciding to invest in shares?A How much you pay for the shares.B How quickly you can make a profit.C How willing you are to take risks.D How financially secure you are.

考题 单选题Which protocols would you want to use for secure VPN ?()A EAPB ChapC Ms-ChapD PPTPE PAPF SPAP

考题 单选题Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A  Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B  Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C  Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D  Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.

考题 单选题You have two stand-alone servers that run Windows Server 2003 Service Pack 2 (SP2). You assign the Secure Server (Require security) IPSec policy to both servers. From Server1, you notice that you cannot access resources on Server2.You need to ensure that you can access resources on Server2. All communications between Server1 and Server2 must be encrypted. What should you do?()A On Server1, assign the Client (Respond only) IPSec policy. B On Server2, assign the Server (Request Security) IPSec Policy. C On Server1 and Server2, modify the authentication settings in the Secure Server (Require security) IPSec Policy. D On Server1 and Server2, enable Master Key perfect forward secrecy (PFS) in the Secure Server (Require security) IPSec Policy. 

考题 单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()A Run ipconfig /flushdns at the command prompt. B Reset the password for the local administrator user account. C From the Internet Options in Internet Explorer, clear the AutoComplete history.D From the Internet Options in Internet Explorer, delete the Temporary Internet Files. 

考题 单选题You are docking a vessel starboard side to with the assistance of two tugs.You are attempting to hold the vessel off by operating both tugs at right angles to the vessel and at full power.You must ensure that().A steerageway is not taken offB the bow doesn't close the dock firstC the bow closes the dock firstD the ship has no headway at the time

考题 单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B You must then zeroize the keys to reset secure shell before configuring other parameters.C All vty ports are automatically enabled for SSH to provide secure management.D The SSH protocol is automatically enabled.

考题 单选题How do you treat someone suffering from electrical shock after you secure the source?()A check for respirationB check for pulseC treat for shockD All of the above

考题 单选题You should make()your house or flat is secure.A sureB certainC understandingD knowledge