网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which additional configuration must be completed when setting up role restrictions using certificates? ()
A

Set up a certificate authentication server.

B

Configure the authentication realm to remember certificate information.

C

Configure the authentication realm to use a certificate server for authentication.

D

Configure a role mapping rule requiring certification information to map user to role.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which additional configuration must be completed when setting up role restrictions using certificates? ()A Set up a certificate authentication server.B Configure the authentication realm to remember certificate information.C Configure the authentication realm to use a certificate server for authentication.D Configure a role mapping rule requiring certification information to map user to role.” 相关考题
考题 It has been over a century _______ the railway was completed. (A)when(B) once(C) which(D) since

考题 Which two statements are true about variable extent size support for large ASM files?() A. The metadata used to track extents in SGA is reduced.B. Rebalance operations are completed faster than with a fixed extent sizeC. An ASM Instance automatically allocates an appropriate extent size.D. Resync operations are completed faster when a disk comes online after being taken offline.E. Performance improves in a stretch cluster configuration by reading from a local copy of an extent.

考题 Which two statements are true about the rescue configuration file?() A. It must include a root password.B. It is rollback file number 50, and you can recover it by issuing rollback 50.C. It is created by issuing request system configuration rescue save.D. It is updated automatically when you commit.

考题 Click the Exhibit button.In the exhibit, which statement is correct? () A. Three physical interfaces are redundant.B. You must define an additional Redundancy Group.C. node 0 will immediately become primary in the cluster.D. You must issue an operational command and reboot the system for the above configuration to take effect.

考题 Which two statements are true regarding rescue configurations?() A. Once saved, a rescue configuration is loaded using the rollback 0 command.B. The rescue configuration must contain the minimal elements necessary to restore network connectivity.C. A minimal rescue configuration is defined by default.D. A rescue configuration must include a root password.

考题 Which additional configuration must be completed when setting up role restrictions using certificates? () A. Set up a certificate authentication server.B. Configure the authentication realm to remember certificate information.C. Configure the authentication realm to use a certificate server for authentication.D. Configure a role mapping rule requiring certification information to map user to role.

考题 When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? () A. IPsec RoutingB. Access ControlC. IP Address PoolD. Source Interface

考题 Which cfgmgr flag will display additional information during device configuration?() A.cfgmgr -aB.cfgmgr -vC.cfgmgr -xD.cfgmgr -o

考题 Which two statements are true when using the configure exclusive CLI command?()A、Multiple users can enter configuration mode and have their own private configuration.B、When a user commits, only the user's changes are committed.C、A message indicates which other users are in configuration mode and what portion of the configuration they are editing.D、Only a single user can edit the configuration.

考题 Which Cisco CRS 4.0 server configuration task enables the Cisco CRS server to fail over to a secondary Cisco Unified CallManager when the primary Cisco Unified CallManager fails?()A、The LDAP directory must have a secondary profile configured.  B、No special configuration is required. Cisco Unified CallManager maintains the failover.  C、The JTAPI provider on the Cisco CRS server must be configured with the secondary Cisco Unified CallManager IP address following the primary Cisco Unified CallManager IP address.  D、There must be a second JTAPI user configured with an alternate range of CTI ports.

考题 Which cfgmgr flag will display additional information during device configuration?()A、cfgmgr -aB、cfgmgr -vC、cfgmgr -xD、cfgmgr -o

考题 When recovering from a disaster, the backup and restore operation you use is similar to the export/import configuration procedure, with one additional step. Which additional step must you take when recovering from a disaster?()A、A new WebSphere profile is required to restore the configuration.B、The restored system requires the IBM Tivoli Access Manager for e-business (TAMeb) JRTE to be manually configured against the WebSphere’s Java Runtime to allow the IBM Tivoli Federated Identity Manager (ITFIM) Runtime to function properly.C、The ITFIM Domain needs to be created manually within the Integrated Solution Console.D、The ITFIM Runtime instance needs to be re-registered with the TAMeb policy server by running the SvrSslCfg command.

考题 Which two statements are true about the rescue configuration file?()A、It must include a root passwordB、It is roll back file number 50, and you can recover it by issuing rollback 50C、It is created by issuing request system configuration rescue saveD、It is updated automatically when you commit

考题 单选题Which additional configuration must be completed when setting up role restrictions using certificates? ()A Set up a certificate authentication server.B Configure the authentication realm to remember certificate information.C Configure the authentication realm to use a certificate server for authentication.D Configure a role mapping rule requiring certification information to map user to role.

考题 单选题When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()A IPsec RoutingB Access ControlC IP Address PoolD Source Interface

考题 单选题When applying the configuration in the exhibit and initializing a chassis cluster, which statement is correct?() [edit chassis] user@host# show cluster { reth-count 3; redundancy-group 1 { node 0 priority 1; node 1 priority 100; } }A Three physical interfaces are redundant.B You must define an additional redundancy group.C node 0 will immediately become primary for redundancy group 1.D You must issue an operational command and reboot the system for the above configuration to take effect.

考题 多选题Which two statements are true regarding rescue configurations?()AOnce saved, a rescue configuration is loaded using the rollback 0 command.BThe rescue configuration must contain the minimal elements necessary to restore network connectivity.CA minimal rescue configuration is defined by default.DA rescue configuration must include a root password.

考题 单选题When recovering from a disaster, the backup and restore operation you use is similar to the export/import configuration procedure, with one additional step. Which additional step must you take when recovering from a disaster?()A A new WebSphere profile is required to restore the configuration.B The restored system requires the IBM Tivoli Access Manager for e-business (TAMeb) JRTE to be manually configured against the WebSphere’s Java Runtime to allow the IBM Tivoli Federated Identity Manager (ITFIM) Runtime to function properly.C The ITFIM Domain needs to be created manually within the Integrated Solution Console.D The ITFIM Runtime instance needs to be re-registered with the TAMeb policy server by running the SvrSslCfg command.

考题 多选题Which two statements are true about the rescue configuration file?()AIt must include a root passwordBIt is roll back file number 50, and you can recover it by issuing rollback 50CIt is created by issuing request system configuration rescue saveDIt is updated automatically when you commit

考题 单选题Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()A Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.B Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.C On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.D On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.

考题 多选题Which two statements are true about the rescue configuration file?()AIt must include a root password.BIt is roll back file number 50, and you can recover it by issuing rollback 50.CIt is created by issuing request system configuration rescue save.DIt is updated automatically when you commit

考题 单选题An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()A Logical network diagramB History logsC Baseline configurationsD Wiring schematics

考题 多选题Which three configuration steps must be completed for a Cisco router in order to enable local AAA login authentication?() (Choose three.)AApply the method list to an interfaceBSpecify the default method list and apply it to the interfaceCEnable AAADDefine a method list

考题 单选题When configuring private VLANs, which configuration task must you do first?()A Configure the private VLAN port parameters.B Configure and map the secondary VLAN to the primary VLAN.C Disable IGMP snooping.D Set the VTP mode to transparent.

考题 多选题Which two statements are true about variable extent size support for large ASM files?()AThe metadata used to track extents in SGA is reduced.BRebalance operations are completed faster than with a fixed extent sizeCAn ASM Instance automatically allocates an appropriate extent size.DResync operations are completed faster when a disk comes online after being taken offline.EPerformance improves in a stretch cluster configuration by reading from a local copy of an extent.

考题 单选题Which Cisco CRS 4.0 server configuration task enables the Cisco CRS server to fail over to a secondary Cisco Unified CallManager when the primary Cisco Unified CallManager fails?()A The LDAP directory must have a secondary profile configured.  B No special configuration is required. Cisco Unified CallManager maintains the failover.  C The JTAPI provider on the Cisco CRS server must be configured with the secondary Cisco Unified CallManager IP address following the primary Cisco Unified CallManager IP address.  D There must be a second JTAPI user configured with an alternate range of CTI ports.

考题 单选题After editing to your device’s configuration, which command must you enter to activate the configuration changes?()A setB copy candidate activeC apply-configD commit

考题 单选题Click the Exhibit button. In the exhibit, which statement is correct? ()A Three physical interfaces are redundant.B You must define an additional Redundancy Group.C node 0 will immediately become primary in the cluster.D You must issue an operational command and reboot the system for the above configuration to take effect.