网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two statements apply when a user has entered private configuration mode by typing configure private?()
A

All users have their own active configuration.

B

All users have their own private candidate configuration.

C

When a user commits, all nonconflicting changes made by all users are committed.

D

When a user commits, only the user's own changes are committed.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configuration.BAll users have their own private candidate configuration.CWhen a user commits, all nonconflicting changes made by all users are committed.DWhen a user commits, only the user's own changes are committed.” 相关考题
考题 When configuring private VLANs, which configuration task must you do first?()A、Configure the private VLAN port parameters.B、Configure and map the secondary VLAN to the primary VLAN.C、Disable IGMP snooping.D、Set the VTP mode to transparent.

考题 A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()A、the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor groupB、the user can see all the users except those in the Admin group, but can only modify the user’s own accountC、the user can see only the user’s own account, and cannot modify itD、the user can see only the user’s own account, and can change the password only

考题 Which two statements are true when using the configure exclusive CLI command?()A、Multiple users can enter configuration mode and have their own private configuration.B、When a user commits, only the user's changes are committed.C、A message indicates which other users are in configuration mode and what portion of the configuration they are editing.D、Only a single user can edit the configuration.

考题 In the admin GUI, you navigate to "System" "Status" "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()A、To forcibly sign out a single user, you should select the check box next to that user's login name, then select "Delete Session".B、If you select "Delete All Sessions", all users are forcibly signed out and are unable to sign in again until "Enable All Users" is selected.C、Selecting "Disable All Users" prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.D、Selecting "Refresh Roles" re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.

考题 You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()A、Apply the new license to the passive node of the cluster.B、Configure an external load balancer to hold the V IP.C、Disable the active node in the cluster.D、Remove the IF-MAP server configuration.

考题 Which three statements are true regarding the candidate configuration?()A、The candidate configuration is a temporary configuration that might become the active configuration.B、A candidate configuration is initially populated with the configuration currently active on the system.C、Changes to the candidate configuration take effect immediately.D、The candidate configuration becomes the active configuration after a system reboot.E、The configure private command allows concurrent editing of a candidate configuration by multiple users.

考题 Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configuration.B、All users have their own private candidate configuration.C、When a user commits, all nonconflicting changes made by all users are committed.D、When a user commits, only the user's own changes are committed.

考题 Which two statements apply when a user has entered private configuration mode by typing configure private? ()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all nonconflicting changes made by all users are commitedD、When a user commits, only the user's own changes are commited

考题 Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all non conflicting changes made by all users are commitedD、When a users commits, only the user's own changes are commited

考题 Which two statements are true about the configure exclusive command?()A、It allows users to retain all uncommitted changes when exiting exclusive configuration mode.B、It allows multiple users to edit private copies of the configuration concurrently.C、It causes the loss of all uncommitted changes when exiting exclusive configuration mode.D、It excludes other users from editing the configuration.

考题 In which mode are users allowed to configure the device, including interfaces, protocols, user access, and system hardware properties?()A、priviledged modeB、configuration modeC、monitoring modeD、operational mode

考题 Examine the command: SQL ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()A、The SKD user cannot log in to the database instance.B、The objects owned by the SKD user are not accessible to any user.C、The other users can access the objects owned by the SKD user, on which they have access.D、The password for the SKD user expires and the user is forced to change the password at the next log in

考题 Which two statements accurately describe a role?()A、A role can be given to a maximum of 1000 users.B、A user can have access to a maximum of 10 roles.C、A role can have a maximum of 100 privileges contained in it.D、Privileges are given to a role by using the CREATE ROLE statement.E、A role is a named group of related privileges that can be granted to the user.F、A user can have access to several roles, and several users can be assigned the same role.

考题 You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()A、Configure the terminal server so that users log on by using local user accountsB、Configure the terminal server so that users log on by using domain accountsC、Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal serverD、Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal serverE、Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal serverF、Use Appsec.exe to restrict applications on the terminal server

考题 Certkiller.com has a server with Active Directory Rights Management Services (AD RMS) server installed. Users have computers with Windows Vista installed on them with an Active Directory domain installed at Windows Server 2003 functional level. As an administrator at Certkiller.com, you discover that the users are unable to benefit from AD RMS to protect their documents. You need to configure AD RMS to enable users to use it and protect their documents. What should you do to achieve this functionality()A、Configure an email account in Active Directory Domain Services (AD DS) for each user.B、Add and configure ADRMSADMIN account in local administrators group on the user computersC、Add and configure the ADRMSSRVC account in AD RMS server’s local administrator groupD、Reinstall the Active Directory domain on user computersE、All of the above

考题 多选题Which two statements are true about the configure exclusive command?()AIt allows users to retain all uncommitted changes when exiting exclusive configuration mode.BIt allows multiple users to edit private copies of the configuration concurrently.CIt causes the loss of all uncommitted changes when exiting exclusive configuration mode.DIt excludes other users from editing the configuration.

考题 多选题Examine the command: SQL ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()AThe SKD user cannot log in to the database instance.BThe objects owned by the SKD user are not accessible to any user.CThe other users can access the objects owned by the SKD user, on which they have access.DThe password for the SKD user expires and the user is forced to change the password at the next log in

考题 多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configuration.BAll users have their own private candidate configuration.CWhen a user commits, all nonconflicting changes made by all users are committed.DWhen a user commits, only the user's own changes are committed.

考题 多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configurationBAll users have their own private candidate configurationCWhen a user commits, all non conflicting changes made by all users are commitedDWhen a users commits, only the user's own changes are commited

考题 多选题You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()AConfigure the terminal server so that users log on by using local user accountsBConfigure the terminal server so that users log on by using domain accountsCConfigure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal serverDConfigure the server to allow each user to have a Windows desktop when the user logs on to the terminal serverEUse software restriction polices in Group Policy objects (GPOs) that apply to the terminal serverFUse Appsec.exe to restrict applications on the terminal server

考题 多选题Which two statements are true when using the configure exclusive CLI command?()AMultiple users can enter configuration mode and have their own private configuration.BWhen a user commits, only the user's changes are committed.CA message indicates which other users are in configuration mode and what portion of the configuration they are editing.DOnly a single user can edit the configuration.

考题 多选题In the admin GUI, you navigate to "System" "Status" "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()ATo forcibly sign out a single user, you should select the check box next to that user's login name, then select Delete Session.BIf you select Delete All Sessions, all users are forcibly signed out and are unable to sign in again until Enable All Users is selected.CSelecting Disable All Users prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.DSelecting Refresh Roles re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.

考题 多选题A user would like to have a roaming profile configured. Which of the following is necessary when setting up a roaming profile? ()(Select TWO).AThe user must configure the settings.BRoaming profile must be stored on every client.CThe user must be on a domain.DRoaming profile has to be stored on a network server.EThe user must have an IP address on their client.

考题 多选题Which two statements accurately describe a role?()AA role can be given to a maximum of 1000 users.BA user can have access to a maximum of 10 roles.CA role can have a maximum of 100 privileges contained in it.DPrivileges are given to a role by using the CREATE ROLE statement.EA role is a named group of related privileges that can be granted to the user.FA user can have access to several roles, and several users can be assigned the same role.

考题 多选题Which two statements apply when a user has entered private configuration mode by typing configure private? ()AAll users have their own active configurationBAll users have their own private candidate configurationCWhen a user commits, all nonconflicting changes made by all users are commitedDWhen a user commits, only the user's own changes are commited

考题 多选题Which three statements are true regarding the candidate configuration?()AThe candidate configuration is a temporary configuration that might become the active configuration.BA candidate configuration is initially populated with the configuration currently active on the system.CChanges to the candidate configuration take effect immediately.DThe candidate configuration becomes the active configuration after a system reboot.EThe configure private command allows concurrent editing of a candidate configuration by multiple users.

考题 单选题A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()A the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor groupB the user can see all the users except those in the Admin group, but can only modify the user’s own accountC the user can see only the user’s own account, and cannot modify itD the user can see only the user’s own account, and can change the password only

考题 单选题Which of the following statements can not be used to describe universities in Britain?A All universities are private institutions.B All students have got high marks in “A” Level.C They have their own governing councilsD They now derive nearly all of their funds from state grants.