网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Where do you configure SCREEN options?()
A

zones on which an attack might arrive

B

zones you want to protect from attack

C

interfaces on which an attack might arrive

D

interfaces you want to protect from attack


参考答案

参考解析
解析: 暂无解析
更多 “单选题Where do you configure SCREEN options?()A zones on which an attack might arriveB zones you want to protect from attackC interfaces on which an attack might arriveD interfaces you want to protect from attack” 相关考题
考题 He __ of a city is the fight to protect it from those who attack itA、commandB、captureC、destroyD、defense

考题 Personal firewall is a technology that helps(66)intruders from accessing data on your PC via the Internet or another network, by keeping(67)data from entering or exiting your system.Hackers do not just target national security organizations for(68): They want your tax returns, network passwords, or bank account numbers. And you do not want the FBI kicking in your door because someone hijacked your PC to(69)in the latest denial-of-service attack on the Internet. Now that "always-on" broadband connections such as cable modems and digital subscriber line are becoming more popular, home users are at risk. Fortunately, you can protect your data. Firewalls can block(70)attacks and protect your PC from outside threats.A.allowB.preventC.inviteD.get

考题 You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?() A. set security zones management interfaces ge-0/0/0.0B. set zones functional-zone management interfaces ge-0/0/0.0C. set security zones functional-zone management interfaces ge-0/0/0.0D. set security zones functional-zone out-of-band interfaces ge-0/0/0.0

考题 Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.Which firewall filter configuration do you use?() A.B.C.D.

考题 You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A. then rejectB. then discardC. then next filterD. then silent-drop

考题 You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A. from source-portB. from source-addressC. from destination-addressD. from destination-port

考题 You will want two trees about ten feet apart, 选择 Youwillwanttwotreesabouttenfeetapart,from_____tosuspendyourtent.(A)there(C)which(B)them(D)where

考题 You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A、from source-portB、from source-addressC、from destination-addressD、from destination-port

考题 You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()A、ExecutableB、TrojanC、VirusD、Worm

考题 You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A、then rejectB、then discardC、then next filterD、then silent-drop

考题 You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()A、[edit interfaces]B、[edit security zones]C、[edit system services]D、[edit security interfaces]

考题 You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()A、Source TCP portB、Source IP addressC、Destination TCP portD、Destination IP address

考题 You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A、set security zones management interfaces ge-0/0/0.0B、set zones functional-zone management interfaces ge-0/0/0.0C、set security zones functional-zone management interfaces ge-0/0/0.0D、set security zones functional-zone out-of-band interfaces ge-0/0/0.0

考题 Where do you configure SCREEN options?()A、zones on which an attack might arriveB、zones you want to protect from attackC、interfaces on which an attack might arriveD、interfaces you want to protect from attack

考题 Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A、the log option for the particular SCREEN optionB、the permit option for the particular SCREEN optionC、the SCREEN option, because it does not drop traffic by defaultD、the alarm-without-drop option for the particular SCREEN option

考题 In which case would you use a FULL OUTER JOIN?()A、Both tables have NULL values.B、You want all unmatched data from one table.C、You want all matched data from both tables.D、You want all unmatched data from both tables.E、One of the tables has more data than the other.F、You want all matched and unmatched data from only one table.

考题 In which scenario will you use the Flashback Version Query feature?()A、 when you want to restore a table that has been dropped from the Recycle BinB、 when you want to identify the transaction ID of the transaction that deleted some important records from a tableC、 when you want to recover the schema of a dropped userD、when you want to restore a dropped tablespace

考题 You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure Tom’s computer to run the Magnifier each time he logs on to his computer. Which two interfaces can you use?()A、Utility ManagerB、Accessibility WizardC、Accessibility Options icon in Control PanelD、Users and Passwords icon in Control Panel

考题 单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A from source-portB from source-addressC from destination-addressD from destination-port

考题 单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()A Source TCP portB Source IP addressC Destination TCP portD Destination IP address

考题 单选题You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A then rejectB then discardC then next filterD then silent-drop

考题 单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A the log option for the particular SCREEN optionB the permit option for the particular SCREEN optionC the SCREEN option, because it does not drop traffic by defaultD the alarm-without-drop option for the particular SCREEN option

考题 单选题You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A set security zones management interfaces ge-0/0/0.0B set zones functional-zone management interfaces ge-0/0/0.0C set security zones functional-zone management interfaces ge-0/0/0.0D set security zones functional-zone out-of-band interfaces ge-0/0/0.0

考题 单选题You want to administer your PROD database from a remote host machine using a Web-enabled interface. Which Oracle tool would you use to accomplish this task efficiently without using command-line interfaces?()A SQL*PlusB iSQL*PlusC Management ServerD Management RepositoryE Oracle Enterprise Manager 10g Database Control

考题 单选题You must configure a SCREEN option that would protect your device from a session table flood.Which configuration meets this requirement?()A AB BC CD D

考题 单选题In which scenario will you use the Flashback Version Query feature?()A  when you want to restore a table that has been dropped from the Recycle BinB  when you want to identify the transaction ID of the transaction that deleted some important records from a tableC  when you want to recover the schema of a dropped userD when you want to restore a dropped tablespace

考题 单选题You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()A [edit interfaces]B [edit security zones]C [edit system services]D [edit security interfaces]