Route entry for the session changed.
Security policy for the session changed.
The ARP table entry for the source IP address timed out.
No traffic matched the session during the timeout period.
第1题:
Which two statements about RPF checks in Multicast Source Discovery Protocol (MSDP) are true?()
第2题:
DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()
第3题:
Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()
第4题:
You execute the following command to audit database activities: SQL> AUDIT DROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL; What is the effect of this command()
第5题:
You execute the following command to audit the database activities: SQL> AUDIT DROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL; What is the effect of this command?()
第6题:
You execute the following command toauditdatabase activities: SQL>AUDITDROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL; What is the effect of this command()
第7题:
Oneauditrecord is created for every successful DROP TABLE command executed in the session ofSCOTT.
Oneauditrecord is generated for the session when SCOTT grants the DROP ANY TABLE privilege toother users.
One audit record is created for the whole session if user SCOTT successfully drops one or more tablesin his session.
One audit record is created for every session of any other user in which a table owned by SCOTT isdropped successfully.
One audit record is created for every successful DROP TABLE command executed by any user to droptables owned by SCOTT.
第8题:
Specify the IP address (172.19.1.1/32) as the destination address in the policy.
Specify the DNS entry (hostb.example.com) as the destination address in the policy.
Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.
Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.
第9题:
Route entry for the session changed.
Security policy for the session changed.
The ARP table entry for the source IP address timed out.
No traffic matched the session during the timeout period.
第10题:
source IP address and the protocol (such as SSL,HTTPS,SSH)
the packet Time to Live and the source IP address
type of service header and DSCP value
destination IP address
第11题:
It enables an attacker to perform an IP sweep of devices.
It enables a hacker to know which operating system the system is running.
It can overflow the session table to its limit, which can result in rejection of legitimate traffic.
It creates a ping of death and can cause the entire network to be infected with a virus.
第12题:
One audit record is created for the whole session if user SCOTT successfully drops one or more tables in his session.
One audit record is created for every session when any user successfully drops a table owned by SCOTT.
One audit record is created for each successful DROP TABLE command executed by any user to drop tables owned by SCOTT.
One audit record is generated for the session when SCOTT grants the DROP ANY TABLE privilege to other users in his session.
One audit record is created for each successful DROP TABLE command executed in the session of SCOTT.
第13题:
Which information is stored in the stateful session flow table while using a stateful firewall?()
第14题:
Your Cisco network currently runs OSPF and you have a need to policy-route some specific traffic,regardless of what the routing table shows. Which one of these options would enable you to policy-route the traffic?()
第15题:
You want to create a security policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in the Untrust zone. How do you create this policy?()
第16题:
Examine the following commands executed in your database: SQL> ALTER SESSION RECYCLEBIN=ON; Session altered SQL> CREATE TABLE emp TABLESPACE tbsfd AS SELECT * FROM hr.employees; Table created. Further, you executed the following command to drop the table: SQL> DROP TABLE emp; Table dropped. What happens in this scenario? ()
第17题:
One of the users in the PROD database, Adams, complains that his update on the table, TRANS, is taking an unusually long time to complete. You find that the table gets locked by another database user before Adams starts his transactions, and you are unable to contact the user holding the table lock. As Adams is updating some crucial rows in the table, he should get the highest priority. Which method would you use to overcome this problem?()
第18题:
One audit record is created for every successful DROP TABLE command executed in the session of SCOTT.
One audit record is generated for the session when SCOTT grants the DROP ANY TABLE privilege to otherusers.
One audit record is created for the whole session if user SCOTT successfully drops one or more tables inhis session.
One audit record is created for every session of any other user in which a table owned by SCOTT isdropped successfully.
One audit record is created for every successful DROP TABLE command executed by any user to drop Tables owned by SCOTT
第19题:
The bypass-routing parameter is ignored when using private IP addressing.
The telnet session will have the source IP address 10.10.10.1.
The telnet session will connect to the neighboring device's interface ge-1/1/0.
Return traffic for the telnet session might not arrive at interface ge-1/1/0.
第20题:
The table is moved to the SYSAUX tablespace.
The table is moved to the SYSTEM tablespace.
The table is removed from the database permanently.
The table is renamed and remains in the TBSFD tablespace.
第21题:
execute the command, ALTER SESSION KILL .., to kill the blocking session
execute the DBMS_SESSION.KILL_SESSION procedure to kill the blocking session
execute the command, ALTER SYSTEM KILL SESSION .., to kill the blocking session
execute the command, ALTER SESSION UNLOCK .., to release the lock for the blocking session
execute the command, ALTER SYSTEM UNLOCK SESSION .., to release the lock for the blocking session
第22题:
A
B
C
D
第23题:
Enable the Do not allow client printer redirection Group Policy setting.
Disable the Do not allow client printer redirection Group Policy setting.
Enable the Do not set default client printer to be default printer in a session Group Policy setting.
Disable the Do not set default client printer to be default printer in a session Group Policy setting.
第24题:
[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts;destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } log { session-init; } } }
[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } count { session-close; } } }
[edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN;} } log { session-close; } } }
[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; log; count session-close; } } } }