niusouti.com

单选题By default, which condition would cause a session to be removed from the session table?()A Route entry for the session changed.B Security policy for the session changed.C The ARP table entry for the source IP address timed out.D No traffic matched the 

题目
单选题
By default, which condition would cause a session to be removed from the session table?()
A

Route entry for the session changed.

B

Security policy for the session changed.

C

The ARP table entry for the source IP address timed out.

D

No traffic matched the session during the timeout period.


相似考题
更多“单选题By default, which condition would cause a session to be removed from the session table?()A Route entry for the session changed.B Security policy for the session changed.C The ARP table entry for the source IP address timed out.D No traffic matched the ”相关问题
  • 第1题:

    Which two statements about RPF checks in Multicast Source Discovery Protocol (MSDP) are true?()

    • A、It prevents message looping, Session Advertisement (SA)messages must be RPF checked
    • B、RPF check should be done against the route to the source S of the corresponding PIM-SM domain
    • C、RPF check should be done against the route to the Rendez-vous Point of the corresponding PIM-SM domain,which originated the SA
    • D、RPF checking Session Advertisement (SA) messages will cause message looping

    正确答案:A,C

  • 第2题:

    DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()

    • A、 validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP servers
    • B、 intercepts all ARP requests and responses on untrusted ports
    • C、 builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses
    • D、 uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts
    • E、 limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry

    正确答案:A,C,D

  • 第3题:

    Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()

    • A、[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts;destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } log { session-init; } } }
    • B、[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } count { session-close; } } }
    • C、[edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN;} } log { session-close; } } }
    • D、[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; log; count session-close; } } } }

    正确答案:C

  • 第4题:

    You execute the following command to audit database activities: SQL> AUDIT DROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL; What is the effect of this command()

    • A、One audit record is created for every successful DROP TABLE command executed in the session of SCOTT.
    • B、One audit record is generated for the session when SCOTT grants the DROP ANY TABLE privilege to otherusers.
    • C、One audit record is created for the whole session if user SCOTT successfully drops one or more tables inhis session.
    • D、One audit record is created for every session of any other user in which a table owned by SCOTT isdropped successfully.
    • E、One audit record is created for every successful DROP TABLE command executed by any user to drop Tables owned by SCOTT

    正确答案:C

  • 第5题:

    You execute the following command to audit the database activities:   SQL> AUDIT DROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL;  What is the effect of this command?()

    • A、One audit record is created for the whole session if user SCOTT successfully drops one or more tables in his session.
    • B、One audit record is created for every session when any user successfully drops a table owned by SCOTT.
    • C、One audit record is created for each successful DROP TABLE command executed by any user to drop tables owned by SCOTT.
    • D、One audit record is generated for the session when SCOTT grants the DROP ANY TABLE privilege to other users in his session.
    • E、One audit record is created for each successful DROP TABLE command executed in the session of SCOTT.

    正确答案:A

  • 第6题:

    You execute the following command toauditdatabase activities:  SQL>AUDITDROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL;  What is the effect of this command()

    • A、Oneauditrecord is created for every successful DROP TABLE command executed in the session ofSCOTT.
    • B、Oneauditrecord is generated for the session when SCOTT grants the DROP ANY TABLE privilege toother users.
    • C、One audit record is created for the whole session if user SCOTT successfully drops one or more tablesin his session.
    • D、One audit record is created for every session of any other user in which a table owned by SCOTT isdropped successfully.
    • E、One audit record is created for every successful DROP TABLE command executed by any user to droptables owned by SCOTT.

    正确答案:C

  • 第7题:

    单选题
    You execute the following command toauditdatabase activities:  SQL>AUDITDROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL;  What is the effect of this command()
    A

    Oneauditrecord is created for every successful DROP TABLE command executed in the session ofSCOTT.

    B

    Oneauditrecord is generated for the session when SCOTT grants the DROP ANY TABLE privilege toother users.

    C

    One audit record is created for the whole session if user SCOTT successfully drops one or more tablesin his session.

    D

    One audit record is created for every session of any other user in which a table owned by SCOTT isdropped successfully.

    E

    One audit record is created for every successful DROP TABLE command executed by any user to droptables owned by SCOTT.


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    You want to create a security policy allowing traffic from any host in the Trust zone to hostb.example.com (172.19.1.1) in the Untrust zone. How do you create this policy?()
    A

    Specify the IP address (172.19.1.1/32) as the destination address in the policy.

    B

    Specify the DNS entry (hostb.example.com) as the destination address in the policy.

    C

    Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.

    D

    Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    By default, which condition would cause a session to be removed from the session table?()
    A

    Route entry for the session changed.

    B

    Security policy for the session changed.

    C

    The ARP table entry for the source IP address timed out.

    D

    No traffic matched the session during the timeout period.


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Your Cisco network currently runs OSPF and you have a need to policy-route some specific traffic,regardless of what the routing table shows. Which one of these options would enable you to policy-route the traffic?()
    A

    source IP address and the protocol (such as SSL,HTTPS,SSH)

    B

    the packet Time to Live and the source IP address

    C

    type of service header and DSCP value

    D

    destination IP address


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
    A

    It enables an attacker to perform an IP sweep of devices.

    B

    It enables a hacker to know which operating system the system is running.

    C

    It can overflow the session table to its limit, which can result in rejection of legitimate traffic.

    D

    It creates a ping of death and can cause the entire network to be infected with a virus.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You execute the following command to audit the database activities:  SQL> AUDIT DROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL;  What is the effect of this command?()
    A

    One audit record is created for the whole session if user SCOTT successfully drops one or more tables in his session.

    B

    One audit record is created for every session when any user successfully drops a table owned by SCOTT.

    C

    One audit record is created for each successful DROP TABLE command executed by any user to drop tables owned by SCOTT.

    D

    One audit record is generated for the session when SCOTT grants the DROP ANY TABLE privilege to other users in his session.

    E

    One audit record is created for each successful DROP TABLE command executed in the session of SCOTT.


    正确答案: E
    解析: 暂无解析

  • 第13题:

    Which information is stored in the stateful session flow table while using a stateful firewall?()

    • A、the inside private IP address and the translated inside global IP address
    • B、the source and destination IP addresses, port numbers,TCP sequencing information, and additional flags for each TCP or UDP connection associated with a particular session
    • C、the outbound and inbound access rules (ACL entries)
    • D、all TCP and UDP header information only

    正确答案:B

  • 第14题:

    Your Cisco network currently runs OSPF and you have a need to policy-route some specific traffic,regardless of what the routing table shows. Which one of these options would enable you to policy-route the traffic?()

    • A、source IP address and the protocol (such as SSL,HTTPS,SSH)
    • B、the packet Time to Live and the source IP address
    • C、type of service header and DSCP value
    • D、destination IP address

    正确答案:A

  • 第15题:

    You want to create a security policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in the Untrust zone. How do you create this policy?()

    • A、Specify the IP address (172.19.1.1/32) as the destination address in the policy.
    • B、Specify the DNS entry (hostb.example.com.) as the destination address in the policy.
    • C、Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.
    • D、Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy

    正确答案:D

  • 第16题:

    Examine the following commands executed in your database: SQL> ALTER SESSION RECYCLEBIN=ON; Session altered  SQL> CREATE TABLE emp TABLESPACE tbsfd AS SELECT * FROM hr.employees;  Table created.  Further, you executed the following command to drop the table:  SQL> DROP TABLE emp; Table dropped.  What happens in this scenario? ()

    • A、The table is moved to the SYSAUX tablespace.
    • B、The table is moved to the SYSTEM tablespace.
    • C、The table is removed from the database permanently.
    • D、The table is renamed and remains in the TBSFD tablespace.

    正确答案:D

  • 第17题:

    One of the users in the PROD database, Adams, complains that his update on the table, TRANS, is taking an unusually long time to complete. You find that the table gets locked by another database user before Adams starts his transactions, and you are unable to contact the user holding the table lock. As Adams is updating some crucial rows in the table, he should get the highest priority. Which method would you use to overcome this problem?()

    • A、execute the command, ALTER SESSION KILL .., to kill the blocking session
    • B、execute the DBMS_SESSION.KILL_SESSION procedure to kill the blocking session
    • C、execute the command, ALTER SYSTEM KILL SESSION .., to kill the blocking session
    • D、execute the command, ALTER SESSION UNLOCK .., to release the lock for the blocking session
    • E、execute the command, ALTER SYSTEM UNLOCK SESSION .., to release the lock for the blocking session

    正确答案:C

  • 第18题:

    单选题
    You execute the following command to audit database activities: SQL> AUDIT DROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL; What is the effect of this command()
    A

    One audit record is created for every successful DROP TABLE command executed in the session of SCOTT.

    B

    One audit record is generated for the session when SCOTT grants the DROP ANY TABLE privilege to otherusers.

    C

    One audit record is created for the whole session if user SCOTT successfully drops one or more tables inhis session.

    D

    One audit record is created for every session of any other user in which a table owned by SCOTT isdropped successfully.

    E

    One audit record is created for every successful DROP TABLE command executed by any user to drop Tables owned by SCOTT


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    You issue the command telnet interface ge-1/1/0 10.10.10.1 source 192.168.100.1 bypass-routing. Which statement is correct?()
    A

    The bypass-routing parameter is ignored when using private IP addressing.

    B

    The telnet session will have the source IP address 10.10.10.1.

    C

    The telnet session will connect to the neighboring device's interface ge-1/1/0.

    D

    Return traffic for the telnet session might not arrive at interface ge-1/1/0.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Examine the following commands executed in your database: SQL> ALTER SESSION RECYCLEBIN=ON; Session altered  SQL > CREATE TABLE emp TABLESPACE tbsfd AS SELECT * FROM hr.employees;  Table created.  Further, you executed the following command to drop the table:  SQL> DROP TABLE emp;Table dropped.  What happens in this scenario?()
    A

    The table is moved to the SYSAUX tablespace.

    B

    The table is moved to the SYSTEM tablespace.

    C

    The table is removed from the database permanently.

    D

    The table is renamed and remains in the TBSFD tablespace.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    One of the users in the PROD database, Adams, complains that his update on the table, TRANS, is taking an unusually long time to complete. You find that the table gets locked by another database user before Adams starts his transactions, and you are unable to contact the user holding the table lock. As Adams is updating some crucial rows in the table, he should get the highest priority. Which method would you use to overcome this problem?()
    A

    execute the command, ALTER SESSION KILL .., to kill the blocking session

    B

    execute the DBMS_SESSION.KILL_SESSION procedure to kill the blocking session

    C

    execute the command, ALTER SYSTEM KILL SESSION .., to kill the blocking session

    D

    execute the command, ALTER SESSION UNLOCK .., to release the lock for the blocking session

    E

    execute the command, ALTER SYSTEM UNLOCK SESSION .., to release the lock for the blocking session


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You must configure a SCREEN option that would protect your device from a session table flood.Which configuration meets this requirement?()
    A

    A

    B

    B

    C

    C

    D

    D


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can print only to the printers that are installed on the RD Session Host server. What should you do?()
    A

    Enable the Do not allow client printer redirection Group Policy setting.

    B

    Disable the Do not allow client printer redirection Group Policy setting.

    C

    Enable the Do not set default client printer to be default printer in a session Group Policy setting.

    D

    Disable the Do not set default client printer to be default printer in a session Group Policy setting.


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()
    A

    [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts;destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } log { session-init; } } }

    B

    [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } count { session-close; } } }

    C

    [edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN;} } log { session-close; } } }

    D

    [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; log; count session-close; } } } }


    正确答案: A
    解析: 暂无解析