网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()

  • A、The intranet-auth authentication option
  • B、The redirect-portal application service
  • C、The uac-policy application service
  • D、The ipsec-vpn tunnel

参考答案

更多 “ You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()A、The intranet-auth authentication optionB、The redirect-portal application serviceC、The uac-policy application serviceD、The ipsec-vpn tunnel” 相关考题
考题 While designing your database, you have created the EMPLOYEES table as an index/x7forganized table (IOT). You want to create a bitmap index on the JOB_ID column to make queries faster. Which task must have been completed so that you are able to create the bitmap index?()A、A primary key must have been created.B、A mapping table must have been created.C、An overflow tablespace must have been specified.D、The PCTTHRESHOLD option must have been specified.

考题 Regarding zone types, which statement is true?()A、You cannot assign an interface to a functional zone.B、You can specifiy a functional zone in a security policy.C、Security zones must have a scheduler applied.D、You can use a security zone for traffic destined for the device itself.

考题 While designing your database, you have created the EMPLOYEEStable as an index-organized (IOT). You want to create a bitmap index on the JOD_IDcolumn to make queries faster. Which task must have been completed so that you are able to create the bitmap index?()A、 A primary key must have been created.B、 A mapping table must have been created.C、 An overflow tablespace must have been specified.D、 The PCTTHRESHOLD option must have been specified.

考题 Using Oracle Scheduler you have scheduled two jobs, JOB_A and JOB_B, to run at 9:00 p.m. every Friday. You want both the jobs to use a single resource plan, WEEKEND_PLAN. Which task must have already been performed to enable you to achieve this objective?()A、 A window must have been created with the WEEKEND_PLAN resource plan.B、 A program must have been created with the WEEKEND_PLAN resource plan.C、 A job class must have been created with the WEEKEND_PLAN resource plan.D、 A windows group must have been created with the WEEKEND_PLAN resource plan.

考题 Your company has an Active Directory Domain Services (AD DS) domain. Al l client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that each user is authenticated to the RD Session Host server before a session is created. What should you do?()A、Set the security layer op tion to RDP Security Layer.B、Set the encryption level option to FIPS Compliant.C、Set the log on option to Always prompt for password.D、Set the security option to Allow connections only from computers running Remote Desktop with Network Level Authenticat ion.

考题 You have a single Active Directory directory service forest with one domain. You have an existing  top-level organizational unit (OU) named Sales. You are planning to create a new top-level OU named  Training. The Sales and Training OUs must have the same security and auditing settings. You need to  identify the security permissions and audit settings for the Sales OU so that you can delegate the same  permissions for the Training OU.  What should you do first?()A、 Use the Delegation of Control Wizard.B、 Use the Security Configuration Wizard.C、 Run the dsacls command.D、 Run the xcacls command.

考题 You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to compare the current security settings of the server to a security template. Which tool should you use?()A、Security Templates snap-in B、Group Policy Management Console C、Security Configuration and Analysis snap-in D、Microsoft Baseline Security Analyzer (MBSA)

考题 You have two stand-alone servers named Server1 and Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2).On Server1, you save the local security policy as a template. You need to import the template to Server2. What should you run on Server2?()A、the Security Templates snap-inB、the Security Configuration WizardC、the Microsoft Baseline Security AnalyzerD、the Security Configuration and Analysis snap-in

考题 单选题You have a disk group, DGROUP1, with three disks and NORMAL redundancy. You execute the following command to create a template for the disk group:  ALTER DISKGROUP dgroup1  ADD TEMPLATE my_temp  ATTRIBUTES (MIRROR FINE);  Which statement is true?()A When a file is created in DGROUP1 with the template, it would have three­way mirroring. B When a file is created in DGROUP1, the MY_TEMP template becomes the default template.C When a file is created in DGROUP1 with the template, it would have two­way mirroring and file striping.D When a file is created in DGROUP1 with the template, it would have three­way mirroring and file striping.E When a file is created in DGROUP1 with the template, it would have two­way mirroring but no file striping.

考题 单选题You have a disk group, DGROUP1, with three disk and NORMAL redundancy. You execute the following command to create a template for the disk group: ALTER DISKGROUP dgroup1 ADD TEMPLATE my_temp ATTRIBUTES (MIRROR FINE);Which statement is true?()A  When a file is created in DGROUP1 with the template, it would have three-way mirroring.B  When a file is created in DGROUP1, the MY_TEMP template becomes the default template.C  When a file is created in DGROUP1 with the template, it would have two-way mirroring and file striping.D  When a file is created in DGROUP1 with the template, it would have three-way mirroring and file striping.E  When a file is created in DGROUP1 with the template, it would have two-way mirroring but no file striping.

考题 单选题Your company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that each user is authenticated to the RD Session Host server before a session is created. What should you do?()A Set the security layer option to RDP Security Layer.B Set the encryption level option to FIPS Compliant.C Set the log on option to Always prompt for password.D Set the security option to Allow connections only from computers running Remote Desktop with Network Level Authentication.

考题 单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You need to compare the current security settings of the server to a security template. Which tool should you use?()A Security Templates snap-inB Group Policy Management ConsoleC Security Configuration and Analysis snap-inD Microsoft Baseline Security Analyzer (MBSA)

考题 多选题You have a single Active Directory directory service forest named contoso.com. You create baseline  security settings for a group of computers, and you store the settings in a database. You deploy thebaseline security settings. You need to confirm that the security settings on one of the computers are  applied correctly.  What are two possible commands that you can run to achieve this goal?()AseceditBgpupdateCnetdomDscwcmd

考题 单选题While designing your database, you have created the EMPLOYEES table as an index/x7forganized table (IOT). You want to create a bitmap index on the JOB_ID column to make queries faster. Which task must have been completed so that you are able to create the bitmap index?()A A primary key must have been created.B A mapping table must have been created.C An overflow tablespace must have been specified.D The PCTTHRESHOLD option must have been specified.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The TS Gateway roleservice is installed on this server. You have to provide a security group access to the TS Gateway server. So what action should you perform?()A A Terminal Services Resource Authorization Policy should be created and configured.B A Terminal Services Connection Authorization Policy should be created and configured.C The security group should be added to the Remote Desktop Users group.D The security group should be added to the TS Web Access Computers group.

考题 单选题While designing your database, you have created the EMPLOYEEStable as an index-organized (IOT). You want to create a bitmap index on the JOD_IDcolumn to make queries faster. Which task must have been completed so that you are able to create the bitmap index?()A  A primary key must have been created.B  A mapping table must have been created.C  An overflow tablespace must have been specified.D  The PCTTHRESHOLD option must have been specified.

考题 单选题You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()A The intranet-auth authentication optionB The redirect-portal application serviceC The uac-policy application serviceD The ipsec-vpn tunnel

考题 单选题Using Oracle Scheduler you have scheduled two jobs, JOB_A and JOB_B, to run at 9:00 p.m. every Friday. You want both the jobs to use a single resource plan, WEEKEND_PLAN. Which task must have already been performed to enable you to achieve this objective?()A  A window must have been created with the WEEKEND_PLAN resource plan.B  A program must have been created with the WEEKEND_PLAN resource plan.C  A job class must have been created with the WEEKEND_PLAN resource plan.D  A windows group must have been created with the WEEKEND_PLAN resource plan.

考题 单选题You have two stand-alone servers named Server1 and Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2).On Server1, you save the local security policy as a template. You need to import the template to Server2. What should you run on Server2?()A the Security Templates snap-inB the Security Configuration WizardC the Microsoft Baseline Security AnalyzerD the Security Configuration and Analysis snap-in

考题 单选题You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()A Verify that different native VLANs exist between two switches for security purposes.B Verify that the switch is configured to allow for trunking on the switch ports.C Verify that each switch port has the proper IP address space assigned to it for the new VLAN. D Verify that the VLAN virtual interface has been correctly created and enabled.