niusouti.com

In Mandatory Access Control, sensitivity labels contain what information?在强制访问控制中,敏感性标识包含什么信息?()A、the item's classification对象的分类B、the item's classification and category set对象的分类和类别设置C、the item's classification, category set and compartment set对象的分类、 分类设置和

题目

In Mandatory Access Control, sensitivity labels contain what information?在强制访问控制中,敏感性标识包含什么信息?()

  • A、the item's classification对象的分类
  • B、the item's classification and category set对象的分类和类别设置
  • C、the item's classification, category set and compartment set对象的分类、 分类设置和隔间设置
  • D、the item's classification and its compartment对象的分类以及它的间隔

相似考题

3.In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.A.cooperatesB.coordinatesC.connectsD.mediates

更多“In Mandatory Access Control, sen”相关问题
  • 第1题:

    You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()

    A. show access-list

    B. show ip access-list

    C. show ip interface

    D. show interface

    E. show interface list


    参考答案:C

  • 第2题:

    System and application access control is to prevent( )access to systems and applications.Access to information and application system functions shall be restricted in accordance with the access control policy.

    A.physical
    B.special
    C.authorized
    D.unauthorized

    答案:D
    解析:
    系统和应用程序访问控制是为了防止未经授权的访问系统和应用程序。访问信息和应用系统的功能应根据访问控制策略对信息和应用系统的访问进行限制。

  • 第3题:

    A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()

    • A、are optional
    • B、are used to protect data beans
    • C、provide coarse-grained access control
    • D、never specify a relationship

    正确答案:A,B

  • 第4题:

    A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()

    • A、are mandatory
    • B、specify action group ExecuteCommandActionGroup for Controller commands
    • C、specify action group ViewCommandActionGroup for View commands
    • D、specify resource group ControllerCommandResourceGroup for Controller commands
    • E、specify resource group ViewCommandResourceGroup for View commands

    正确答案:A,B,E

  • 第5题:

    单选题
    You are validating the configuration of your SRX Series device and see the output shown below. What does this indicate?()
    A

    The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service.

    B

    The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device.

    C

    The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service.

    D

    Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.


    正确答案: The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service., The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device., The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service., Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.
    解析: 暂无解析

  • 第6题:

    单选题
    Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()
    A

    Sensitivity Labels for subjects & objects and a system high evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价

    B

    Security Clearances for subjects & Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制

    C

    Sensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制

    D

    Sensitivity Labels for subjects & objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制


    正确答案: D
    解析: 暂无解析

  • 第7题:

    多选题
    You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()
    A

    Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.

    B

    Configure a security policy that references the unified-access-control captive-portal service.

    C

    Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.

    D

    Configure a security policy that references the unified-access-control intranet-controller service.


    正确答案: D,C
    解析: 暂无解析

  • 第8题:

    多选题
    A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()
    A

    Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.

    B

    Add the switch to the Junos Pulse Access Control Service using the Any make/model.

    C

    Add the switch as a firewall enforcer.

    D

    Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.


    正确答案: B,D
    解析: 暂无解析

  • 第9题:

    多选题
    A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()
    A

    are optional

    B

    are used to protect data beans

    C

    provide coarse-grained access control

    D

    never specify a relationship


    正确答案: B,D
    解析: 暂无解析

  • 第10题:

    单选题
    You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()
    A

    show services unified-access-control authentication-table

    B

    show auth table

    C

    show services unified-access-control policies

    D

    show services unified-access-control captive-portal


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()
    A

    to specify the destination addresses to which access is permitted

    B

    to specify the source address permitted to access the resource

    C

    to specify the services to which access is permitted

    D

    to inform the enforcer to expect policy information from the Junos Pulse Access Control Service


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()
    A

    Odyssey Access Client

    B

    Junos Pulse

    C

    Java agent

    D

    Agent less access


    正确答案: C
    解析: 暂无解析

  • 第13题:

    在通信专业中,MAC 的英文全称是(),调制的英文通常翻译为()。

    A、Media access control B、media access concect C、medtiple access control D、multiple access connect A、adjust B、medies C、modulation D、modulator


    正确答案:A,C

  • 第14题:

    You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()

    • A、show access-list
    • B、show ip access-list
    • C、show ip interface
    • D、show interface
    • E、show interface list

    正确答案:C

  • 第15题:

    SDCCH全拼是()

    • A、Traffic Channel
    • B、Broadcast Control Channel
    • C、Stand-Alone Dedicated Control Channel
    • D、Access Granted Channel

    正确答案:C

  • 第16题:

    In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()

    • A、to specify the destination addresses to which access is permitted
    • B、to specify the source address permitted to access the resource
    • C、to specify the services to which access is permitted
    • D、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

    正确答案:D

  • 第17题:

    多选题
    A customer has purchased a new Junos Pulse Access Control Service and wants to install it in an existing cluster.After initial configuration, the customer finds that the firmware version running on the Junos Pulse Access Control Service is 4.1 r5, but the existing cluster is running firmware version 4.1 r3. Which two actions must be performed to allow the new Junos Pulse Access Control Service to load the older version of firmware?()
    A

    Install a valid license on the new Junos Pulse Access Control Service.

    B

    When loading the older firmware, delete all the existing data on the Junos Pulse Access Control Service.

    C

    Add the new Junos Pulse Access Control Service to the existing cluster.

    D

    Download the 4.1 r3 version firmware from the Juniper support website.


    正确答案: C,A
    解析: 暂无解析

  • 第18题:

    单选题
    Which is NOT a mandatory part of the shipboard Oil Pollution Emergency Plan?()
    A

    Reporting requirements

    B

    Diagrams

    C

    Steps to control a discharge

    D

    National and local coordination


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()
    A

    Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.

    B

    Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.

    C

    Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.

    D

    Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.


    正确答案: A
    解析: 暂无解析

  • 第20题:

    多选题
    Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
    A

    Session-Export policies on the Junos Pulse Secure Access Service

    B

    Session-Export policies on the Junos Pulse Access Control Service

    C

    Session-Import policies on the Junos Pulse Secure Access Service

    D

    Session-Import policies on the Junos Pulse Access Control Service

    E

    Resource access policies on the Junos Pulse Access Control Service


    正确答案: B,A
    解析: 暂无解析

  • 第21题:

    多选题
    What are two use cases enabled by IF-MAP Federation?()
    A

    Users authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.

    B

    Users authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.

    C

    Remote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.

    D

    Remote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.


    正确答案: D,C
    解析: 暂无解析

  • 第22题:

    多选题
    You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()
    A

    Create a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.

    B

    Configure a wired adapter and assign the required SSID under User Roles > Agent > Odyssey Settings.

    C

    Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.

    D

    Create a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.


    正确答案: C,A
    解析: 暂无解析

  • 第23题:

    单选题
    You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()
    A

    show access-list

    B

    show ip access-list

    C

    show ip interface

    D

    show interface

    E

    show interface list


    正确答案: C
    解析: 暂无解析