niusouti.com
更多“多选题Which two policy actions are considered flow control actions?()ArejectBcommunity addCnext termDnext policy”相关问题
  • 第1题:

    You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()

    • A、 Delegate the password management controls to the help desk staff.
    • B、 Delegate the password management controls to the Domain Users group.
    • C、 Configure the Default Domain Policy to enforce password expiration settings.
    • D、 Configure the Default Domain Controller Policy to enforce password expiration settings.

    正确答案:B,D

  • 第2题:

    Which two policy actions are considered flow control actions?()

    • A、reject
    • B、community add
    • C、next term
    • D、next policy

    正确答案:C,D

  • 第3题:

    What are two valid actions for a routing policy?()

    • A、discard
    • B、next policy
    • C、accept
    • D、ignore

    正确答案:B,C

  • 第4题:

    You need to configure the security settings for the new app servers. Which two actions should you perform?()

    • A、Create a Group policy object (GPO) for the web servers.
    • B、Create a Group policy object (GPO) for the database servers.
    • C、Modify the Default Domain Policy.
    • D、Modify the Default Domain Controllers Policy.

    正确答案:A,B

  • 第5题:

    You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()

    • A、Place all infrastructure servers in subnets that cannot exchange information with the Internet
    • B、Establish a custom security template that contains unique required settings for each combination of services that run on the infrastructure servers
    • C、Use Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure servers
    • D、Edit the local policy settings to configure each individual server

    正确答案:C,D

  • 第6题:

    多选题
    An RMAN backup job fails, displaying the following error:  ORA/x7f19809: limit exceeded for recovery files  Your analysis shows that the Flash Recovery area is full. Which two actions could you take to resolve the error and avoid this error in future?()
    A

    take the backup of the flash recovery area less frequently

    B

    increase the value of the UNDO_RETENTION initialization parameter

    C

    change the value of the WORKAREA_SIZE_POLICY initialization parameter to AUTO

    D

    change the backup retention policy to retain the backups for a smaller period of time

    E

    increase the value of the DB_RECOVERY_FILE_DEST_SIZE initialization parameter

    F

    increase the value of the CONTROL_FILE_RECORD_KEEP_TIME initialization parameter


    正确答案: C,F
    解析: 暂无解析

  • 第7题:

    多选题
    Which two actions, when taken in combination, will result in an effective network security solution?()
    A

    develop a policy for securing the network

    B

    monitor and test network activities for vulnerabilities

    C

    implement reflexive access lists

    D

    implement dynamic access lists

    E

    select and implement a single comprehensive virus protection program


    正确答案: A,B
    解析: 暂无解析

  • 第8题:

    多选题
    Which two security policy actions are valid?()
    A

    deny

    B

    discard

    C

    reject

    D

    close


    正确答案: A,D
    解析: 暂无解析

  • 第9题:

    多选题
    You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()
    A

    Delegate the password management controls to the help desk staff.

    B

    Delegate the password management controls to the Domain Users group.

    C

    Configure the Default Domain Policy to enforce password expiration settings.

    D

    Configure the Default Domain Controller Policy to enforce password expiration settings.


    正确答案: A,C
    解析: 暂无解析

  • 第10题:

    多选题
    Users can define policy to control traffic flow between which two components?()
    A

    from a zone to the device itself

    B

    from a zone to the same zone

    C

    from a zone to a different zone

    D

    from one interface to another interface


    正确答案: C,D
    解析: 暂无解析

  • 第11题:

    多选题
    Your company acquires a new Internet domain name.You need to ensure that all users can receive e-mail messages sent to the new domain name.Which two actions should you perform?()
    A

    Create a sharing policy.

    B

    Create a remote domain.

    C

    Create an accepted domain.

    D

    Create an e-mail address policy.

    E

    Modify the properties of the default Receive connector.


    正确答案: A,C
    解析: 暂无解析

  • 第12题:

    多选题
    Users can define policy to control traffic flow between which two components? ()(Choose two.)
    A

    from a zone to the router itself

    B

    from a zone to the same zone

    C

    from a zone to a different zone

    D

    from one interface to another interface


    正确答案: D,C
    解析: 暂无解析

  • 第13题:

    Which two security policy actions are valid?()

    • A、deny
    • B、discard
    • C、reject
    • D、close

    正确答案:A,C

  • 第14题:

    Users can define policy to control traffic flow between which two components?()

    • A、from a zone to the device itself
    • B、from a zone to the same zone
    • C、from a zone to a different zone
    • D、from one interface to another interface

    正确答案:B,C

  • 第15题:

    Users can define policy to control traffic flow between which two components? ()(Choose two.)

    • A、from a zone to the router itself
    • B、from a zone to the same zone
    • C、from a zone to a different zone
    • D、from one interface to another interface

    正确答案:B,C

  • 第16题:

    Your company acquires a new Internet domain name.You need to ensure that all users can receive e-mail messages sent to the new domain name.Which two actions should you perform?()

    • A、Create a sharing policy.
    • B、Create a remote domain.
    • C、Create an accepted domain.
    • D、Create an e-mail address policy.
    • E、Modify the properties of the default Receive connector.

    正确答案:C,D

  • 第17题:

    多选题
    You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()
    A

    Place all infrastructure servers in subnets that cannot exchange information with the Internet

    B

    Establish a custom security template that contains unique required settings for each combination of services that run on the infrastructure servers

    C

    Use Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure servers

    D

    Edit the local policy settings to configure each individual server


    正确答案: B,A
    解析: 暂无解析

  • 第18题:

    多选题
    An RMAN backup job fails, displaying the following error:  ORA-19809: limit exceeded for recovery files  Your analysis shows that the Flash Recovery area is full.  Which two actions could you take to resolve the error and avoid this error in the future? ()
    A

    take the backup of the flash recovery area less frequently

    B

    increase the value of the UNDO_RETENTION initialization parameter

    C

    change the value of the WORKAREA_SIZE_POLICY initialization parameter to AUTO

    D

    change the backup retention policy to retain the backups for a smaller period of time

    E

    increase the value of the DB_RECOVERY_FILE_DEST_SIZE initialization parameter

    F

    increase the value of the CONTROL_FILE_RECORD_KEEP_TIME initialization parameter


    正确答案: C,B
    解析: 暂无解析

  • 第19题:

    多选题
    Which two policy actions are considered flow control actions?()
    A

    reject

    B

    community add

    C

    next term

    D

    next policy


    正确答案: B,A
    解析: 暂无解析

  • 第20题:

    多选题
    What are two steps needed to define a QoS policy for a traffic class?()
    A

    Determine a minimum bandwidth guarantee.

    B

    Determine interfaces to which to apply policy.

    C

    Assign priorities to the class.

    D

    Configure access control lists.


    正确答案: C,D
    解析: 暂无解析

  • 第21题:

    多选题
    What are two valid actions for a routing policy?()
    A

    discard

    B

    next policy

    C

    accept

    D

    ignore


    正确答案: A,C
    解析: 暂无解析

  • 第22题:

    多选题
    You need to configure the security settings for the new app servers.  Which two actions should you perform?()
    A

    Create a Group policy object (GPO) for the web servers.

    B

    Create a Group policy object (GPO) for the database servers.

    C

    Modify the Default Domain Policy.

    D

    Modify the Default Domain Controllers Policy.


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    多选题
    You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()
    A

    Disable all unnecessary services on each DHCP server

    B

    Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP servers

    C

    Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP server

    D

    Install a digital certificate for SSL on each DHCP server


    正确答案: A,B
    解析: 暂无解析

  • 第24题:

    多选题
    You need to design desktop and security settings for the client computers in the Seattle call center. Your solution must be implemented by using the minimum amount of administrative effort.Which two actions should you perform?()
    A

    On each client computer in the call center, configure a local policy that lists only authorized programs in the Allowed Windows Programs list

    B

    Using NTFS permissions, assign the Deny – Read permission for all unauthorized executable files to the client computer domain accounts

    C

    Design a Group Policy object (GPO) that enforces a software restriction policy on all client computers in the call center

    D

    Design a Group Policy object (GPO) that implements an IPSec policy on all client computers in the call center. Ensure that the IPSec policy rejects connections to any Web servers that the company does not operate


    正确答案: C,D
    解析: 暂无解析