网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Using a policy with the policy-rematch flag enabled, what happens to the existing and new sessions when you change the policy action from permit to deny?()
A

The new sessions matching the policy are denied. The existing sessions are dropped.

B

The new sessions matching the policy are denied. The existingsessions, not being allowed tocarry any traffic, simply timeout.

C

The new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.

D

The new sessions matching the policy are denied. The existing sessions continue until they are completed or their time.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Using a policy with the policy-rematch flag enabled, what happens to the existing and new sessions when you change the policy action from permit to deny?()A The new sessions matching the policy are denied. The existing sessions are dropped.B The new sessions matching the policy are denied. The existingsessions, not being allowed tocarry any traffic, simply timeout.C The new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.D The new sessions matching the policy are denied. The existing sessions continue until they are completed or their time.” 相关考题
考题 Your company has deployed Network Access Protection (NAP) enforcement for VPNs.You need to ensure that the health of all clients can be monitored and reported. What should you do?() A. Create a Group Policy object (GPO) that enables Security Center and link the policy to the domain.B. Create a Group Policy object (GPO) that enables Security Center and link the policy to the Domain Controllers organizational unit (OU).C. Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the domain.D. Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the Domain Controllers organizational unit (OU).

考题 Using a policy with the policy-rematch flag enabled, what happens to the existing and new sessions when you change the policy action from permit to deny?() A. The new sessions matching the policy are denied. The existing sessions are dropped.B. The new sessions matching the policy are denied. The existingsessions, not being allowed tocarry any traffic, simply timeout.C. The new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.D. The new sessions matching the policy are denied. The existing sessions continue until they are completed or their time.

考题 下列程序的运行结果为()。include using namespace std;namespace m {int flag = 10;} 下列程序的运行结果为( )。 #include <iostream> using namespace std; namespace m { int flag = 10; } namespace n { flag = 100; } void mian( ) { int flag = 0; using namespace n; cout<<flag<<","<<m:: flag; }A.100,10B.100,0C.0,100D.0,10

考题 After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()A、The Junos OS drops any flow that does not match the source address or destination address.B、All traffic is dropped.C、All existing sessions continue.D、The Junos OS does a policy re-evaluation.

考题 The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()A、 show asp dropB、 show counters dropC、 show security-policyD、 show policy-map

考题 You are not able to telnet to the interface IP address of your device from a PC on the same subnet. What iscausing the problem?()A、Telnet is not being permitted by self policy.B、Telnet is not being permitted by security policy.C、Telnet is not allowed because it is not considered secure.D、Telnet is not enabled as a host-inbound service on the zone

考题 You administer a Windows 2000 network at Company's main office.  You have purchased 15 new Windows 2000 Professional computers that will be used in the finance department. The new computers are equipped with a fax modem. You install the Fax service with the default values and settings on each computer. You want to prevent users from using the Control Panel to remove the fax printer. What should you do?()A、Remove the users’ account from the DACL for the fax printer.B、Edit the local Computer Policy to prevent users from using Printers in Control Panel.C、Edit the local Computer Policy. Configure the Prevent deletion of printers setting to enabled.D、Edit the local Computer Policy. Configure the Prevent addition of printers setting to disabled

考题 Your company has deployed Network Access Protection (NAP) enforcement for VPNs. You need to ensure that the health of all clients can be monitored and reported. What should you do?()A、Create a Group Policy object (GPO) that enabled Security Center and link the policy to the domain.B、Create a Group Policy object (GPO) that enabled Security Center and link the policy to the Domain controllers organizational unit (OU)C、Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to eabled. Link the Policy to the domain.D、Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to eabled. Link the Policy to the Domain Controllers organizational unit (OU)

考题 Your corporate network has a member server named RAS1 that runs Windows Server 2008. You configure RAS1 to use the Routing and Remote Access Service (RRAS) The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、 Install the Network Policy Server (NPS) on the RAS1 serverB、 Create a remote access policy that requires users to authenticate by using SPAPC、 Create a remote access policy that requires users to authenticate by using EAP-TLSD、 Create a remote access policy that requires users to authenticate by using MS-CHAP v2

考题 You are the administrator of an Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Filesrv1 contains confidential data that is only available to users in the human resources (HR) department.  You want all computers in the HR department to connect to Filesrv1 by using an IPSec policy. You assign the Server (Request Security) IPSec policy to Filesrv1. Using Network Monitor, you notice that some computers in the HR department connect to Filesrv1 without using the IPSec policy.   You need to configure Filesrv1 to ensure that all computers connect to it by using the IPSec policy.   What should you do?()A、Assign the Secure Server(Require Security) IPSec policy.B、Assign the Client (Respond Only)IPSec policy.C、Unassign the Server(Request Security IPSec policy.D、Restart the IPSec Services service.

考题 Your company has deployed network access protection (NAP) enforcement for VPNs. You need to ensure that the health of all clients can be monitored and reported. What should you do?()A、Create a group policy object (GPO) that enabled security center and link the policy to the domain.B、Create a group policy object (GPO) that enabled security center and link the policy to the domain controllers organizational unit (OU).C、Create a group policy object (GPO) and set the require trusted path for credential entry option to enabled. Link the policy to the domain.D、Create a group policy object (GPO) and set the require trusted path for credential entry option to Enabled. Link the policy to the domain controllers organizational unit (OU).

考题 You need to recommend a solution for deploying and managing App2. What should you recommend?() A、Publish App2 as a RemoteApp program.B、Deploy App2 by using a Group Policy logon script.C、Assign App2 by using Group Policy software distribution.D、Publish App2 by using Group Policy software distribution.

考题 You need to recommend a solution for managing administrative rights for the branch office client computers. The solution must meet the companys technical requirements.What should you recommend configuring?()A、Account Policies by using GPOsB、Local Users and Groups by using Group Policy preferencesC、Restricted Groups by using GPOsD、Security Options by using Group Policy preferences

考题 多选题What are two requirements when using AppFlow?() (Choose two.)AQuality of service must be enabled.BNSC compression must be enabled.CPFA's TCP Acceleration (AFP) must be enabled.DAppFlow must be configured on the client-side device first.

考题 多选题What are two requirements when using AppFlow? ()(Choose two.)AQuality of service must be enabled.BNSC compression must be enabled.CPFA's TCP Acceleration (AFP) must be enabled.DAppFlow must be configured on the client-side device first

考题 单选题Evaluate the following SQL statements that are issued in the given order:  What would be the status of the foreign key EMP_MGR_FK?()A  It would be automatically enabled and deferred.B  It would be automatically enabled and immediate.C  It would remain disabled and has to be enabled manually using the ALTER TABLE command.D  It would remain disabled and can be enabled only by dropping the foreign key constraint and re-creating it.

考题 单选题You need to recommend a deployment strategy for App1. What should you recommend?()A Assign App1 to users by using a Group Policy.B Publish App1 to users by using a Group Policy.C Deploy App1 as a RemoteApp program by using an MSI file.D Deploy App1 as a RemoteApp program by using an RDP file.

考题 单选题Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The  deployment must meet the following requirements:   èUsers must access the application from an icon on their desktops.   èUsers must have access to the application when they are not connected to the network. What should you do?()A Publish the application as a RemoteApp.B Publish the application by using Remote Desktop Web Access (RD Web Access).C Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).D Assign the application to all client computers by using a Group Policy object (GPO).

考题 单选题After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()A The Junos OS drops any flow that does not match the source address or destination address.B All traffic is dropped.C All existing sessions continue.D The Junos OS does a policy re-evaluation.

考题 单选题Using a policy with the policy-rematch flag enabled, what happens to the existing and new sessionswhen you change the policy action from permit to deny? ()A The new sessions matching the policy are denied. The existing sessions are dropped.B The new sessions matching the policy are denied. The existing sessions, not being allowed to carry any traffic, simply timeout.C The new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.D The new sessions matching the policy are denied. The existing sessions continue until they are completed or their timeout is reached.

考题 单选题Which statement regarding the implementation of an IDP policy template is true?()A IDP policy templates are automatically installed as the active IDP policy.B IDP policy templates are enabled using a commit script.C IDP policy templates can be downloaded without an IDP license.D IDP policy templates are included in the factory-default configuration.

考题 单选题The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()A  show asp dropB  show counters dropC  show security-policyD  show policy-map

考题 多选题What are two requirements when using Packet Flow Acceleration? ()(Choose two.)ATraffic needs be compressed.BQuality of service must be enabled.CA service tunnel must exist in at least one direction.DPFA must be enabled on the client-side WX device.