更多"What can be done&"的相关试题:
[单项选择]International consultants who want to secure definite projects at lucrative fees are finding it harder and harder. ( )
A. luxurious
B. lubricative
C. penetrative
D. profitable
[多项选择]Which two secure remote access methods are available on the WX platforms?() (Choose two.)
A. SSL
B. SSH
C. Telnet
D. HTTP
[单项选择]Which of the following describes a secure connection over the Internet between two sites?()
A. FTP
B. VLAN
C. VPN
D. HTTP
[多项选择]Which three mechanisms are used to secure management traffic from outside IPS sensors?()
A. secure tunnels
B. a separate management VLAN
C. secure VLANs to isolate sensors
D. an out-of-band path around the firewall
E. asymmetric traffic flows to isolate sensors
F. private VLANs to put all sensors on isolated ports
[单项选择]You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()
A. The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication
B. The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.
C. The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,
D. The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.
[单项选择]Which encryption type is used to secure user data in an IPsec tunnel?()
A. symmetric key encryption
B. asymmetric key encryption
C. RSA
D. digital certificates
[多项选择]Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()
A. DMVPN
B. MPLS VPN
C. Virtual Tunnel Interface (VTI)
D. SSL VPN
E. PPPoE
[单项选择]Which of the following should be changed to secure access to a WAPs configuration management interface?()
A. SSID
B. WPA2
C. DHCP
D. Password
[多项选择]A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker?() (Select TWO).
A. Disable TPM in the system BIOS
B. Run the BitLocker wizard and any necessary partitions
C. Enable TPM in the system BIOS
D. Enable TPM in the Windows 7 OS files
E. Set up the OS and the system files on the same partition
[单项选择]The enable secret command is used to secure access to which CLI mode?()
A. user EXEC mode
B. global configuration mode
C. privileged EXEC mode
D. auxiliary setup mode
[单项选择]Which material should NOT be used to secure cargo on deck for a voyage().
A. Steel chain
B. Wire rope
C. Steel strapping
D. Fiber rope
[单项选择]How can you choose a password that is both secure and simple to remember
A. Taking the title of your favorite book or film.
B. Taking a line from a song or poem you like best.
C. Making up a nonsensical word which cannot be found in any dictionary.
D. Using two short words linked with a punctuation character.
[单项选择]To secure the smoothness of the traffic, the transportation is constantly ___________ by computers.
A. monitored
B. intrigued
C. safeguarded
D. nurtured
[单项选择]Which of the following is a secure method of remote access via command line?()
A. RCP
B. Telnet
C. RSH
D. SSH
[单项选择]Which of the following is the MOST common secure web server port?()
A. 22
B. 80
C. 110
D. 443
[单项选择]Which of the following tools can be used to securely connect to a remote system?()
A. RCMD
B. SSH
C. TELNET
D. HTTP
[单项选择] You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()
A. The — ssl level was not specified
B. The server was not started with the – enable–ssl-plugin option
C. — ssl is not a valid server option
D. The mysqld binary was not compiled with SSL support
E. The server's SSL certificate was invalid
[单项选择]Which of the following is the MOST secure method to authenticate users?()
A. User ID, a strong password, and a fingerprint scanner
B. User ID, a strong password, and a token based device
C. User ID and two levels of strong password requirements
D. User ID, a strong password, and a smart card