网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command "ip access-group 101 in" to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()

A. Telnet sessions from host A to host 5.1.1.10

B. Telnet sessions from host A to host 5.1.3.10

C. Telnet sessions from host B to host 5.1.2.10

D. Telnet sessions from host B to host 5.1.3.8

E. Telnet sessions from host C to host 5.1.3.10

F. Telnet sessions from host F to host 5.1.1.10


参考答案

更多 “ You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10 ” 相关考题
考题 You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()A. Delete the default auth table mapping policyB. Create auth table mapping policies that route users to specific resourcesC. Create Resource Access policies that permit access to specific resourcesD. Create Source Interface policies that route users to specific resources

考题 You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role.Which configuration method should you use to satisfy this scenario?()A. Create a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.B. Configure a wired adapter and assign the required SSID under User Roles Agent Odyssey Settings.C. Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.D. Create a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.

考题 You issue this statement:ALTER DATABASE BACKUP CONTROLFILE TO TRACE;  What does the statement generate?()A、A text copy of the control file.B、A binary copy of the control file.C、A file containing a SQL statement which will re-create the database.D、A file containing a SQL statement which will re-create the control file.

考题 You are a Database Administrator with WonderWeb. You use a password file to establish connections to the Sales database located on the server. You created the password file using the following command:        ORAPWD file=d:/oracle/ora9i/orapwU01 password=admin entries=4   You erroneously deleted the password file while the database was running. You re-create the password file using the following command:   ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=4   However, when you try to connect as the SYS user, you receive the following error:        ORA-01031: insufficient privileges   What should you do to resolve this error?()A、 Delete the newly created password file and re-create another password file with the password admin, without shutting down the database.B、 Enable the operating system authentication, shut down the database, disable the operating system authentication, and restart the database using the password file.C、 Enable the operating system authentication, shut down the database, re-create the password file using the same ORAPWD command, and restart the database using the password file.D、 Delete the newly created password file, enable operating system authentication and shut down the database. Then, re-create another password file using the same ORAPWD command and restart the database using this password file.

考题 You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to design a control for the application.You need to ensure that the control meets the following requirements:    (1)Contains the DataGridView, BindingSource, and BindingNavigator controls.  (2)Exposes the properties of the BindingSource control.   (3)Protects the properties of the DataGridView and BindingNavigator controls.    What sholud you do?()A、Extend the Control class.B、Extend the ContainerControl class.C、Create protected accesses for each control property.D、Create public accesses for the properties of the BindingSource control.

考题 You create a Web Form for the acceptance of donations. Users type donation amounts by using a TextBox control named txtAmount. The donation amount must be between 10 dollars and 10,000 dollars. You add the following RequiredFieldValidator and RangeValidator. During testing you learn that when users fail to enter values before submitting the Web Form to the server, the message "Please enter a value" appears, as shown below. You need to ensure that the message appears immediately following the txtAmount TextBox control without extra spaces. What should you do? ()A、In the RangeValidator, set the Display property to Dynamic.B、In the RangeValidator, set the Display property to Static.C、In the RequiredFieldValidator, set the Display property to Dynamic.D、In the RequiredFieldValidator, set the Display property to Static.

考题 You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()A、Delete the default auth table mapping policyB、Create auth table mapping policies that route users to specific resourcesC、Create Resource Access policies that permit access to specific resourcesD、Create Source Interface policies that route users to specific resources

考题 You executed the following command to back up the control file: ALTER DATABASE BACKUP CONTROLFILE TO TRACE; What do you find in the trace file?()A、Image of the control fileB、Location of the control fileC、Contents of the control file in text formatD、SQL command to re-create the databaseE、SQL command to re-create the control fileF、Contents of the control file in binary format

考题 You work as a database administrator for Supportcenter.cn. You added atablespaceto your database. Because of the changes to the physical structure of your database, you performed a backup of the control file to trace. After this, you lost only the control files and the instance aborted due to a hardware failure. How would you proceed to recover the database?()A、Start the instance and open the database, instance recovery automatically recoverscontrol filesB、Create a file based on the contents of the trace file and save it to the control file locations and start the databaseC、Re-create the database (The recovery of the control file is not possible because you have lost all the control files.)D、Start the instance, in the NOMOUNTstate,re-create the control file using the CREATE CONTROLFILE command stored in the trace file.E、Start the instance and MOUNT the database, then re-create the control file using the CREATE CONTROLFILE command stored in the trace file.

考题 One of the tablespaces is read/x7fonly in your database. The loss of all control files forced you to re/x7fcreate the control file.  Which operation do you need to perform after re/x7fcreating the control file and opening the database?()A、drop and re­create the read­only tablespacesB、rename the read­only data files to their correct file namesC、change the tablespace status from read/write to read­onlyD、re­create the read­only tablespace because it is automatically removed

考题 You work as a database administrator for Certkiller .com. You added atablespaceto your database. Because of the changes to the physical structure of your database, you performed a backup of the control file to trace. After this, you lost only the control files and the instance aborted due to a hardware failure.  How would you proceed to recover the database?()A、Start the instance and open the database, instance recovery automatically recovers control files B、Create a file based on the contents of the trace file and save it to the control file locations and start the database C、Re-create the database (The recovery of the control file is not possible because you have lost all the control files.) D、Start the instance, in the NOMOUNTstate,re-create the control file using the CREATE CONTROLFILE command stored in the trace file. E、Start the instance and MOUNT the database, then re-create the control file using the CREATE CONTROLFILE command stored in the trace file.

考题 You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact.  Which of the following is true regarding your recovery?()  A、 You will need to open the database with the resetlogs command.B、 All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.C、 You will use the resetlogs version of the create controlfile command.D、 You will use the noresetlogs version of the create controlfile command.E、 You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command

考题 You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to design a new control that will be used on multiple forms in the app.You need to ensure that the control meets the following requirement  (1)It retrieves data from a MSSQL Server 2008 database instance. (2)It uses WPF classes to display data.  (3)It uses user-customizable actions when the control is first painted on the form.   What should you do?()A、Create a new custom class for the control that is derived from the Control class.B、Create a new custom class for the control that is derived from the UserControl class.C、Create a new custom class for the control that is derived from the ContentControl class.D、Create a new custom class for the control that is derived from the ContentPresenter class.

考题 You have a computer that runs Windows 7. The computer is a member of a domain. You share D:/data asData. You assign Everyone Full control share permissions to the folder. No other share permissions areassigned to the folder. From another computer, you attempt to create a file in the Data share by using a domain account named User1. You receive the following error message: Destination Folder Access Denied.You need to ensure that you can create files in the Data share by using the User1 account.  What should you do?()A、Create a local user named User1.B、Add User1 to the local Power Users group.C、Assign User1 Write NTFS permission on the D:///data folder.D、Assign User1 Full control share permissions to the Data share.

考题 You are an administrator of ETECHSOL.COM domain.  You want to install Win2000 Professional on 20 new PXE compliant computers that do not have any operating systems installed on them.  You create a RIS image and load the image onto the RIS server and then start the new computers. You find that the new computers cannot connect to the RIS server. You verify that existing client computers on the network can connect to network servers also.  What should you do? ()A、 Create an Active Directory on a server.B、 Setup a server to act as a DHCP server.C、 Install a Remote Access Server.D、 Enable TCP/IP on the client computers.

考题 You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You need to ensure that the application meets the following requirements: Displays a menu that is specific to the control selected by the user. Displays the menu next to the control. Which control should you use? ()A、MenuB、PopUpC、ListBoxD、ContextMenu

考题 You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  You create a Web page to display photos and captions. The caption of each photo in the database can be modified by using the application.  You write the following code fragment.      ’ runat="server"/  | English | Chinese | Japan | Korean | - 124 - Test Information Co., Ltd. All rights reserved.         ’ runat="server" /        When you access the Web page, the application throws an error.  You need to ensure that the application successfully updates each caption and stores it in the database.  What should you do?()A、Add the ID attribute to the Label control.B、Add the ID attribute to the TextBox control.C、Use the Bind function for the Label control instead of the Eval function.D、Use the Eval function for the TextBox control instead of the Bind function.

考题 You create a Web site that you must copy from a development server to a testing server, along with all source files. You do not have terminal access to the testing server. You need to create the virtual directory. Then you must copy the Web site to the virtual directory on the testing server without precompiling the site. What should you do? ()A、Use the Publish Web tool.B、Use the Copy Web tool.C、Use the command line to XCOPY the files.D、Create a Web Setup project.

考题 单选题You work as a database administrator for Certkiller .com. You added atablespaceto your database. Because of the changes to the physical structure of your database, you performed a backup of the control file to trace. After this, you lost only the control files and the instance aborted due to a hardware failure.  How would you proceed to recover the database?()A Start the instance and open the database, instance recovery automatically recovers control files B Create a file based on the contents of the trace file and save it to the control file locations and start the database C Re-create the database (The recovery of the control file is not possible because you have lost all the control files.) D Start the instance, in the NOMOUNTstate,re-create the control file using the CREATE CONTROLFILE command stored in the trace file. E Start the instance and MOUNT the database, then re-create the control file using the CREATE CONTROLFILE command stored in the trace file.

考题 单选题You create a Web site that you must copy from a development server to a testing server, along with all source files. You do not have terminal access to the testing server. You need to create the virtual directory. Then you must copy the Web site to the virtual directory on the testing server without precompiling the site. What should you do? ()A Use the Publish Web tool.B Use the Copy Web tool.C Use the command line to XCOPY the files.D Create a Web Setup project.

考题 单选题You are the network administrator for Your network consists of two Active Directory domains in a single forest. All network servers run Windows Server 2003. Currently, you use more than 1,000 security groups. A member server named TK1 contains a folder named Testing. This folder contains resources required by users in the engineering department. A written security policy states that engineering users must have the approval of the management group before they can be assigned the Full Control NTFS permission on Testing. You need to discover whether any engineering users currently have the Full Control NTFS permission on Testing. You must complete this task by using the minimum amount of administrative effort. What should you do?()A Use Active Directory Users and Computers to view the access level available to engineering users.B Use the Find Users, Contacts, and Groups utility to view the membership of each group that has access to Testing.C In the properties of Testing, view the Effective Permissions tab.D Write an ADSI script to search for members of all groups that have access to testing

考题 单选题One of the tablespaces is read-only in your database. The loss of all control files forced you to re-create the control file. Which operation do you need to perform after re-creating the control file and opening the database?()A  drop and re-create the read-only tablespacesB  rename the read-only data files to their correct file namesC  change the tablespace status from read/write to read-onlyD  re-create the read-only tablespace because it is automatically removed

考题 单选题You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. You create a Web page to display photos and captions. The caption of each photo in the database can be modified by using the application. You write the following code fragment:         ’ runat="server"/             ’ runat="server" /             When you access the Web page, the application throws an error.  You need to ensure that the application successfully updates each caption and stores it in the database.  What should you do?()A Add the ID attribute to the Label control. B Add the ID attribute to the TextBox control. C Use the Bind function for the Label control instead of the Eval function. D Use the Eval function for the TextBox control instead of the Bind function.

考题 单选题You work as a database administrator for Supportcenter.cn. You added atablespaceto your database. Because of the changes to the physical structure of your database, you performed a backup of the control file to trace. After this, you lost only the control files and the instance aborted due to a hardware failure. How would you proceed to recover the database?()A Start the instance and open the database, instance recovery automatically recoverscontrol filesB Create a file based on the contents of the trace file and save it to the control file locations and start the databaseC Re-create the database (The recovery of the control file is not possible because you have lost all the control files.)D Start the instance, in the NOMOUNTstate,re-create the control file using the CREATE CONTROLFILE command stored in the trace file.E Start the instance and MOUNT the database, then re-create the control file using the CREATE CONTROLFILE command stored in the trace file.

考题 多选题You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()ACreate a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.BConfigure a wired adapter and assign the required SSID under User Roles Agent Odyssey Settings.CCreate a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.DCreate a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.

考题 单选题One of the tablespaces is read/x7fonly in your database. The loss of all control files forced you to re/x7fcreate the control file.  Which operation do you need to perform after re/x7fcreating the control file and opening the database?()A drop and re­create the read­only tablespacesB rename the read­only data files to their correct file namesC change the tablespace status from read/write to read­onlyD re­create the read­only tablespace because it is automatically removed

考题 单选题You executed the following command to back up the control file: ALTER DATABASE BACKUP CONTROLFILE TO TRACE; What do you find in the trace file?()A Image of the control fileB Location of the control fileC Contents of the control file in text formatD SQL command to re-create the databaseE SQL command to re-create the control fileF Contents of the control file in binary format