Which policy determines what happens to local data and to the BIOS settings on a server during the discovery process and when the server is disassociated from a service profile?()
第1题:
A.edit policy-options policy-statement policy-name set term 1 from protocol static set term 1 then accept
B.edit ospf policy set from protocol static set 1 then accept
C.set protocols OSPF export policy-name
D.set protocols OSPF policy policy-name
第2题:
Which QoS mechanism will allow a single policy to be applied to multiple interfaces?()
第3题:
If the policies shown below evaluate as described, which action will occur for the listed policy expression?() Policy A=True Policy B=True Policy C=True Policy D=False Policy Expression: !(A&&B)||C
第4题:
Which of the following logical volume placement policies is likely to give the best performance in most cases, all other factors being equal?()
第5题:
Which two statements are true regarding routing policy processing?()
第6题:
The policy evaluates to True (a&&n).
The policy evaluates to True because of c.
The policy evaluates to False because of c.
The policy evaluates to False because of !(a&&b).
第7题:
Apply an import policy to OSPF; this will import the static routes into OSPF
Apply an export policy to protocol static; this will export the routes to other protocols.
Apply an import policy to the forwarding table; this will import the routes, allowing them to be forwarded to OSPF neighbors.
Apply an export policy to OSPF; this will export the static routes to your OSPF neighbors.
第8题:
reject
community add
next term
next policy
第9题:
SYS, SYSTEM
SCOTT
Only for successful executions
Only for failed executions
Both successful and failed executions
第10题:
Local workstations
Backup tapes
Domain controllers
Email server
SMTP gateway
Proxy server
第11题:
Dynamic auth table mapping is not enabled.
A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.
To create a static auth table mapping, you must delete the default policy.
The default policy applies only to the factory-default role User.
第12题:
IDP policy templates are automatically installed as the active IDP policy.
IDP policy templates are enabled using a commit script.
IDP policy templates can be downloaded without an IDP license.
IDP policy templates are included in the factory-default configuration.
第13题:
A.reject
B.community add
C.next term
D.next policy
第14题:
Which three statements are true about terms in a policy?()
第15题:
Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?()
第16题:
You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()
第17题:
You enabled an audit policy by issuing the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM; For which database users and for which executions is the audit policy now active? ()
第18题:
The last policy is the default policy, which allows all traffic.
The order of policies is not important.
New policies are placed at the end of the policy list.
The insert command can be used to change the order.
第19题:
deny
discard
reject
close
第20题:
Select Require and Enforce for the Host Checker Policy in the realm authentication policy.
Select Evaluate Policies for the Host Checker policy in the realm authentication policy.
Configure the Host Checker policy as a role restriction for the Employee role.
Configure the Host Checker policy as a resource access policy for the Employee role.
第21题:
Apply an import policy to RIP which announces the routes to ISIS.
Apply an export policy to ISIS which announces the routes to ISIS.
Apply an export policy to RIP which announces the routes to ISIS.
Apply an import policy to ISIS which imports the routes into ISIS.
第22题:
policy map
class map
ACL
service policy
第23题:
The order of the terms in a policy is irrelevant
The action is specified in a then statement
Ters are optional in a policy
The match condition can be identified with a from statement
Every policy must contain at least one term
第24题:
IKE gateway
secure tunnel interface
security policy to permit the IKE traffic
security policy referencing the IPsec VPN tunnel