niusouti.com
参考答案和解析
正确答案: C,A
解析: 暂无解析
更多“多选题Which three functions are available under the "Maintain" tab of J-Web?()Adownload and delete log filesBview real-time statics of interfacesCreboot the systemDview and add licensesEedit security settings”相关问题
  • 第1题:

    When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()

    • A、Duplex mode selections
    • B、Auto MDIX selections
    • C、Status Selections
    • D、Group mode selections
    • E、Port security selections

    正确答案:A,B,C

  • 第2题:

    The RMAN BACKUP command using the DELETE INPUT option can be used with which three types of files? ()

    • A、data files
    • B、backup sets
    • C、control files
    • D、archived redo log files

    正确答案:A,B,D

  • 第3题:

    To force a user to use Ctrl-Alt-Delete to log into the computer, a technician can go to Control Panel then:()

    • A、Accessibility options.
    • B、Security Center.
    • C、User accounts and the Advanced tab.
    • D、Windows Firewall.

    正确答案:C

  • 第4题:

    Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()

    • A、REVOKE ADD, DELETE FROM USER tom ON TABLE tab1
    • B、REVOKE ADD, DELETE ON TABLE tab1 FROM USER tom
    • C、REVOKE INSERT, DELETE FROM USER tom ON TABLE tab1
    • D、REVOKE INSERT, DELETE ON TABLE tab1 FROM USER tom

    正确答案:D

  • 第5题:

    Which J-Web lab do you use lo add licenses to the device?()

    • A、"Configure"
    • B、"Troubleshoot"
    • C、"Monitor"
    • D、"Maintain"

    正确答案:D

  • 第6题:

    Which three functions are provided by the Junos OS for security platforms?()(Choose three.)

    • A、VPN establishment
    • B、stateful ARP lookups
    • C、Dynamic ARP inspection
    • D、Network Address Translation
    • E、inspection of packets at higher levels (Layer 4 and above)

    正确答案:A,D,E

  • 第7题:

    Which three functions are available under the "Maintain" tab of J-Web?()

    • A、download and delete log files
    • B、view real-time statics of interfaces
    • C、reboot the system
    • D、view and add licenses
    • E、edit security settings

    正确答案:A,C,D

  • 第8题:

    You are an administrator at Certkiller .com. Certkiller has a RODC (read-only domain controller) server at a remote location. The remote location doesn’t have proper physical security. You need to activate non- administrative accounts passwords on that RODC server. Which of the following action should be considered to populate the RODC server with non-administrative accounts passwords()

    • A、Delete all administrative accounts from the RODC’s group
    • B、Configure the permission to Deny on Receive for administrative accounts on the security tab for Group Policy Object (GPO)
    • C、Configure the administrative accounts to be added in the Domain RODC Password Replication Denied group
    • D、Add a new GPO and enable Account Lockout settings. Link it to the remote RODC server and on the security tab on GPO, check the Read Allow and the Apply group policy permissions for the administrators.
    • E、None of the above

    正确答案:C

  • 第9题:

    多选题
    Which three functions are provided by JUNOS Software for security platforms?()
    A

    VPN establishment

    B

    stateful ARP lookups

    C

    Dynamic ARP inspection

    D

    Network Address Translation

    E

    inspection of packets at higher levels (Layer 4 and above)


    正确答案: E,C
    解析: 暂无解析

  • 第10题:

    多选题
    The RMAN BACKUP command using the DELETE INPUT option can be used with which three types of files? ()
    A

    data files

    B

    backup sets

    C

    control files

    D

    archived redo log files


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    单选题
    Which J-Web tab do you use to add licences to the device?()
    A

    Configure

    B

    Troubleshoot

    C

    Monitor

    D

    Maintain


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()
    A

    Duplex mode selections

    B

    Auto MDIX selections

    C

    Status Selections

    D

    Group mode selections

    E

    Port security selections


    正确答案: D,E
    解析: 暂无解析

  • 第13题:

    Which three parameters are configured in the IKE policy?()

    • A、mode
    • B、preshared key
    • C、external interface
    • D、security proposals
    • E、dead peer detection settings

    正确答案:A,B,D

  • 第14题:

    What are three functions of the Cisco wireless LAN controller,  which is being used in the Company  Centralized WLAN solution network? ()

    • A、 Authentication  
    • B、 Mobility
    • C、 Security management
    • D、 Transmission of beacon frames
    • E、 Real-time portions of MAC management
    • F、 Real-time aspects of the 802.11 prtocol management
    • G、 SNMP collection

    正确答案:A,B,C

  • 第15题:

    Which of the following sequences of steps can be used to increase the amount of virtual memory (page memory) available to Windows?()

    • A、Start > Control Panel > System > Advanced tab > Startup and Recovery > Advanced tab > Settings > Advanced tab
    • B、Start > Control Panel > System > General tab > Under Performance > Settings > Advanced tab  
    • C、Start > Control Panel > System > Advanced tab > Under Performance > Settings > Advanced tab  
    • D、Start > Control Panel > System > Performance tab > Under Performance > Settings > Advanced tab

    正确答案:C

  • 第16题:

    Which J-Web tab do you use to add licences to the device?()

    • A、"Configure"
    • B、"Troubleshoot"
    • C、"Monitor"
    • D、"Maintain"

    正确答案:D

  • 第17题:

    Which three parameters are configured in the IKE policy? ()(Choose three.)

    • A、mode
    • B、preshared key
    • C、external interface
    • D、security proposals
    • E、dead peer detection settings

    正确答案:A,B,D

  • 第18题:

    Which three functions are available under the "Maintain" tab of J-Web?()

    • A、download and delete log files
    • B、view real-time statistics of interfaces
    • C、reboot the system
    • D、view and add licenses
    • E、edit security settings

    正确答案:A,C,D

  • 第19题:

    Certkiller .com boosts a main office and 20 branch offices. Configured as a separate site, each branch office has a Read-Only Domain Controller (RODC) server installed.  Users in remote offices complain that they are unable to log on to their accounts.  What should you do to make sure that the cached credentials for user accounts are only stored in their local branch office RODC server()

    • A、Open the RODC computer account security tab and set Allow on the Receive as permission only for the users that are unable to log on to their accounts
    • B、Add a password replication policy to the main Domain RODC and add user accounts in the security group
    • C、Configure a unique security group for each branch office and add user accounts to the respective security group. Add the security groups to the password replication allowed group on the main RODC server
    • D、Configure and add a separate password replication policy on each RODC computer account

    正确答案:D

  • 第20题:

    You are the network administrator for the Berlin office of The company network consists of a single Active Directory domain named The Berlin office contains 15 file servers that contain confidential files. All the file servers run either Windows Server 2003 or Windows 2000 Server. All the file servers are in the BerlinFilePrint organizational unit (OU). TestKing's security department sets a rule that specifies the size and retention settings for the Security event log of all file servers. The rule also specified that local administrators on servers cannot override the changes you make to the settings for the Security event log. You need to define a method to modify the Security event log settings on each file server in the Berlin office in order to meet the states requirements. What should you do?()

    • A、Modify the local security policy on each file server.Define the size and retention settings for the Security event log.
    • B、Create a security template on one of the file servers by using the Security Configuration and Analysis tool. Define the size and retention settings for the Security event log in the template. Import the security template into the local security policy of the other 14 file servers.
    • C、Use Event Viewer to modify the event log properties on each file server. Define the size and retention settings for the Security event log.
    • D、Create a new Group Policy object (GPO) and link it to the BerlinFilePrint OU. In the GPO, define the size and retention settings for the Security event log.

    正确答案:D

  • 第21题:

    多选题
    Which three functions are available under the "Maintain" tab of J-Web?()
    A

    download and delete log files

    B

    view real-time statistics of interfaces

    C

    reboot the system

    D

    view and add licenses

    E

    edit security settings


    正确答案: E,B
    解析: 暂无解析

  • 第22题:

    多选题
    Which three functions are provided by the Junos OS for security platforms?()(Choose three.)
    A

    VPN establishment

    B

    stateful ARP lookups

    C

    Dynamic ARP inspection

    D

    Network Address Translation

    E

    inspection of packets at higher levels (Layer 4 and above)


    正确答案: C,E
    解析: 暂无解析

  • 第23题:

    多选题
    Which four are types of functions available in SQL? ()
    A

    string

    B

    character

    C

    integer

    D

    calendar

    E

    numeric

    F

    translation

    G

    date

    H

    conversion


    正确答案: H,G
    解析: 暂无解析