题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2024-02-05 07:45:05

[多项选择]What can be done to secure the virtual terminal interfaces on a router?()
A. Administratively shut down the interface.
B. Physically secure the interface.
C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D. Configure a virtual terminal password and login process.
E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

更多"What can be done&"的相关试题:

[单项选择]International consultants who want to secure definite projects at lucrative fees are finding it harder and harder. ( )
A. luxurious
B. lubricative
C. penetrative
D. profitable
[多项选择]Which two secure remote access methods are available on the WX platforms?() (Choose two.)
A. SSL
B. SSH
C. Telnet
D. HTTP
[单项选择]Which of the following describes a secure connection over the Internet between two sites?()
A. FTP
B. VLAN
C. VPN
D. HTTP
[多项选择]Which three mechanisms are used to secure management traffic from outside IPS sensors?()
A. secure tunnels
B. a separate management VLAN
C. secure VLANs to isolate sensors
D. an out-of-band path around the firewall
E. asymmetric traffic flows to isolate sensors
F. private VLANs to put all sensors on isolated ports
[单项选择]You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()
A. The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication
B. The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.
C. The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,
D. The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.
[单项选择]Which encryption type is used to secure user data in an IPsec tunnel?()
A. symmetric key encryption
B. asymmetric key encryption
C. RSA
D. digital certificates
[多项选择]Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()
A. DMVPN
B. MPLS VPN
C. Virtual Tunnel Interface (VTI)
D. SSL VPN
E. PPPoE
[单项选择]Which of the following should be changed to secure access to a WAPs configuration management interface?()
A. SSID
B. WPA2
C. DHCP
D. Password
[多项选择]A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker?() (Select TWO).
A. Disable TPM in the system BIOS
B. Run the BitLocker wizard and any necessary partitions
C. Enable TPM in the system BIOS
D. Enable TPM in the Windows 7 OS files
E. Set up the OS and the system files on the same partition
[单项选择]The enable secret command is used to secure access to which CLI mode?()
A. user EXEC mode
B. global configuration mode
C. privileged EXEC mode
D. auxiliary setup mode
[单项选择]Which material should NOT be used to secure cargo on deck for a voyage().
A. Steel chain
B. Wire rope
C. Steel strapping
D. Fiber rope
[单项选择]How can you choose a password that is both secure and simple to remember
A. Taking the title of your favorite book or film.
B. Taking a line from a song or poem you like best.
C. Making up a nonsensical word which cannot be found in any dictionary.
D. Using two short words linked with a punctuation character.
[单项选择]To secure the smoothness of the traffic, the transportation is constantly ___________ by computers.
A. monitored
B. intrigued
C. safeguarded
D. nurtured
[单项选择]Which of the following is a secure method of remote access via command line?()
A. RCP
B. Telnet
C. RSH
D. SSH
[单项选择]Which of the following is the MOST common secure web server port?()
A. 22
B. 80
C. 110
D. 443
[单项选择]Which of the following tools can be used to securely connect to a remote system?()
A. RCMD
B. SSH
C. TELNET
D. HTTP
[单项选择] You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()
A. The — ssl level was not specified
B. The server was not started with the – enable–ssl-plugin option
C. — ssl is not a valid server option
D. The mysqld binary was not compiled with SSL support
E. The server's SSL certificate was invalid
[单项选择]Which of the following is the MOST secure method to authenticate users?()
A. User ID, a strong password, and a fingerprint scanner
B. User ID, a strong password, and a token based device
C. User ID and two levels of strong password requirements
D. User ID, a strong password, and a smart card

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码