题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2024-01-06 06:56:32

[单项选择]Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()
A. Ignore
B. Replace users role
C. Terminate user session
D. Disable user account

更多"Your corporate security policy requ"的相关试题:

[单项选择]Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
A. Source IP and browser
B. Source IP and certificate
C. Certificate and Host Checker
D. Host Checker and source IP
[多项选择]The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。
A. Switch1(config-if)# switchport port-security maximum 1
B. Switch1(config)# mac-address-table secure
C. Switch1(config)# access-list 10 permit ip host
D. Switch1(config-if)# switchport port-security violation shutdown
E. Switch1(config-if)# ip access-group 10
[单项选择]In order to withdraw money the bank requires your ______.
[单项选择]Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()
A. Acct-Session-Id
B. Acct-Status-Type
C. Class
D. NAS-Identifier
[单项选择]I regret to say that your thesis requires more thinking than ______ for the problem is exceedingly complex.
A. to be put in
B. has been put in
C. being put in
D. have been put in
[单项选择]Your network contains a Network Policy Server (NPS) named Server1. Server1 is configured to use SQL logging.You add a second NPS server named Server2.You need to ensure that Server2 has the same RADIUS authentication and logging settings as Server1.You export the NPS settings from Server1, and then import the settings to Server2.What should you do next on Server2?()
A. Create a new ODBC data source.
B. Run netsh.exe nps reset config.
C. Manually configure the SQL logging settings.
D. Restart the Network Policy Server (NPS) role service.
[多项选择] Your web application requires the ability to load and remove web files dynamically to the web container’s filesystem. Which two HTTP methods are used to perform these actions?()
A. PUT
B. POST
C. SEND
D. DELETE
E. REMOVE
[单项选择]If you want to use your Business Telecard International, you have to
A. use a card phone
B. phone on Sunday
C. make a direct dialing call
D. pay extra
[单项选择]In your project, you use product analysis to translating project objectives into tangible deliverables and requirements. All the following tools are used for product analysis EXCEPT ______ .
A. value engineering
B. value analysis
C. product breakdown
D. benefit/cost analysis
[多项选择]Your application requires that you programmatically manipulate a nonquery record group. Which three built-ins can you use?()
A. CREATE_GROUP 
B. ADD_GROUP_NOW 
C. POPULATE_GROUP 
D. ADD_GROUP_COLUMN 
E. CREATE_GROUP_FROM_QUERY
[单项选择] Your customer requires you to supply a configuration or proposal in xl format.  What tool is available? ()
A. IBM Standalone Solutions Configuration Tool (SSCT )
B. Server Proven
C. Configuration Options Guide (COG)
D. xREF (System X reference)
[多项选择]You use a recovery catalog for maintaining your database backups.You execute the following command:$rman TARGET / CATALOG rman / cat@catdbRMAN > BACKUP VALIDATE DATABASE ARCHIVELOG ALL;Which two statements are true?()
A. Corrupted blocks, if any, are repaired.
B. Checks are performed for physical corruptions.
C. Checks are performed for logical corruptions.
D. Checks are performed to confirm whether all database files exist in correct locations
E. Backup sets containing both data files and archive logs are created.
[单项选择]Student A:May I use your computer this afternoon Student B:I'm sorry,but I have to finish typing this term paper today. Student A:().
A. Do as you please
B. It doesn't matter
C. Thank you just the same
D. Never mind

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码