网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In Mandatory Access Control, sensitivity labels contain what information? 在强制访问控制中,敏感标记包含什么信息?()
A

the item’s classification,category set and compartment set对象的分级、分类设置以及区间设置

B

the item’s classification and its compartment对象的分级和区间设置

C

the item’s classification and category set对象的分级、分类设置

D

the item’s classification对象的分级设置


参考答案

参考解析
解析: 暂无解析
更多 “单选题In Mandatory Access Control, sensitivity labels contain what information? 在强制访问控制中,敏感标记包含什么信息?()A the item’s classification,category set and compartment set对象的分级、分类设置以及区间设置B the item’s classification and its compartment对象的分级和区间设置C the item’s classification and category set对象的分级、分类设置D the item’s classification对象的分级设置” 相关考题
考题 (d) Corporate annual reports contain both mandatory and voluntary disclosures.Required:(i) Distinguish, using examples, between mandatory and voluntary disclosures in the annual reports ofpublic listed companies. (6 marks)

考题 You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()A. Delete the default auth table mapping policyB. Create auth table mapping policies that route users to specific resourcesC. Create Resource Access policies that permit access to specific resourcesD. Create Source Interface policies that route users to specific resources

考题 What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?() A. sign-in policyB. authentication realmsC. role restrictionsD. policy realmsE. routing policy

考题 In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.A.cooperatesB.coordinatesC.connectsD.mediates

考题 What is necessary for a subject to have read access to an object in a Multi-Level Security Policy?什么对于主体在多层安全策略中拥有对一个客体的访问权限是必要的?()A、The subject's sensitivity label must dominate the object's sensitivity label.主体的敏感性标识必须支配客体的敏感性标识B、The subject's sensitivity label subordinates the object's sensitivity label.主体的敏感性标识从属于客体的敏感性标识C、The subject's sensitivity label is subordinated by the object's sensitivity label.主体的敏感性标识被客体的敏感性标识从属D、The subject's sensitivity label is dominated by the object's sensitivity label.主体的敏感性标识以客体的敏感性标识为主体

考题 In Mandatory Access Control, sensitivity labels contain what information?在强制访问控制中,敏感性标识包含什么信息?()A、the item's classification对象的分类B、the item's classification and category set对象的分类和类别设置C、the item's classification, category set and compartment set对象的分类、 分类设置和隔间设置D、the item's classification and its compartment对象的分类以及它的间隔

考题 Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()A、Sensitivity Labels for subjects objects and a "system high" evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价B、Security Clearances for subjects Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制C、Sensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制D、Sensitivity Labels for subjects objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制

考题 What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions

考题 What feature on the WSA provides Day Zero Revocation of access to third party sites such as Salesforce?()A、 Day Zero Revocation engineB、 SaaS Access ControlC、 Dynamic Vectoring and Streaming engineD、 Application Visibility and Control

考题 What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router  B、to control broadcast traffic through a router  C、to filter traffic as it passes through a router  D、to filter traffic that originates from the router  E、to replace passwords as a line of defense against security incursions 

考题 Mandatory Access requires that sensitivity labels be attached to all objects. Which of the following would be designated as objects on a MAC system?强制访问控制需要敏感性标识被标识在所有客体,以下哪一个将在访问控制系统上标识为一个客体?()A、users, windows, and programs.用户,窗口,以及程序B、files, directories, and print queue文件、 目录和打印队列C、devices, processes, I/O pipe, and sockets.设备,进程,输入输出通道以及接口D、files, directories, processes, and sockets.文件、目录,进程,以及接口

考题 In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()A、to specify the destination addresses to which access is permittedB、to specify the source address permitted to access the resourceC、to specify the services to which access is permittedD、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

考题 You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()A、The user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.B、The user will be mapped to all realms available to the user.C、The Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.D、The endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.

考题 What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()A、sign-in policyB、authentication realmsC、role restrictionsD、policy realmsE、routing policy

考题 Which two statements are true about terms in a routing policy?()A、A then statement is mandatory in a termB、If a term does not contain a from statement, all routers matchC、If a term does not contain a from statement, the Junos OS will not commitD、A then statement is not mandatory in a term

考题 A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer configured an OAMAuthenticator, but was not sure what to select for the Control Flag. What Control Flag should the customer choose?() A、OPTIONALB、REQUISITEC、REQUIREDD、SUFFICIENTE、MANDATORY

考题 You need to design a permission structure for registry objects that enables the legacy application at the resorts to run. Your solution must comply with the written security policy.  What should you do?()A、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application, Use the GPO to give the Domain Users security group full control on the partitions of the registry that the legacy application usesB、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application. Use the GPO to give the Domain Users security group full control on the HKEY_USERS partition of the registryC、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to make all users who require access to the application members of Local Administrators group on each computerD、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to give all users who require access to the application full control for the Ntuser.dat file

考题 单选题In Mandatory Access Control, sensitivity labels contain what information?在强制访问控制中,敏感性标识包含什么信息?()A the item's classification对象的分类B the item's classification and category set对象的分类和类别设置C the item's classification, category set and compartment set对象的分类、 分类设置和隔间设置D the item's classification and its compartment对象的分类以及它的间隔

考题 单选题You are validating the configuration of your SRX Series device and see the output shown below. What does this indicate?()A The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service.B The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device.C The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service.D Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.

考题 单选题Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()A Sensitivity Labels for subjects objects and a system high evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价B Security Clearances for subjects Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制C Sensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制D Sensitivity Labels for subjects objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制

考题 多选题Which two statements are true about terms in a routing policy?()AA then statement is mandatory in a termBIf a term does not contain a from statement, all routers matchCIf a term does not contain a from statement, the Junos OS will not commitDA then statement is not mandatory in a term

考题 多选题What are two use cases enabled by IF-MAP Federation?()AUsers authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.BUsers authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.CRemote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.DRemote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.

考题 单选题You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()A Delete the default auth table mapping policyB Create auth table mapping policies that route users to specific resourcesC Create Resource Access policies that permit access to specific resourcesD Create Source Interface policies that route users to specific resources

考题 单选题What is a type of firewall enforcer supported by the Junos Pulse Access Control Service?()A Checkpoint firewallB SRX Series deviceC DP sensorD MX Series device

考题 单选题In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()A to specify the destination addresses to which access is permittedB to specify the source address permitted to access the resourceC to specify the services to which access is permittedD to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

考题 单选题What feature on the WSA provides Day Zero Revocation of access to third party sites such as Salesforce?()A  Day Zero Revocation engineB  SaaS Access ControlC  Dynamic Vectoring and Streaming engineD  Application Visibility and Control

考题 单选题Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a member server named Server1. Server1 has the File Server server role installed. On Server1, you create a share named Documents. The Documents share will contain the files and folders of all users. You need to ensure that when the users connect to Documents, they only see the files to which they have access. What should you do?()A Modify the NTFS permissionsB Modify the Share permissionsC Enable access-based enumerationD Configure Dynamic Access Control

考题 多选题What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()Asign-in policyBauthentication realmsCrole restrictionsDpolicy realmsErouting policy