Which policy determines what happens to local data and to the BIOS settings on a server during the discovery process and when the server is disassociated from a service profile?()A、 boot policy and BIOS policyB、 disk scrub and boot policyC、 BIOS setting s

题目

Which policy determines what happens to local data and to the BIOS settings on a server during the discovery process and when the server is disassociated from a service profile?()

  • A、 boot policy and BIOS policy
  • B、 disk scrub and boot policy
  • C、 BIOS setting scrub, boot policy, and BIOS policy
  • D、 disk scrub and BIOS setting scrub

相似考题
更多“Which policy determi”相关问题
  • 第1题:

    Which two commands are needed to create and apply an export policy that advertises static routes to OSPF neighbors?()

    A.edit policy-options policy-statement policy-name set term 1 from protocol static set term 1 then accept

    B.edit ospf policy set from protocol static set 1 then accept

    C.set protocols OSPF export policy-name

    D.set protocols OSPF policy policy-name


    参考答案:A, C

  • 第2题:

    Which QoS mechanism will allow a single policy to be applied to multiple interfaces?()

    • A、policy map
    • B、class map
    • C、ACL
    • D、service policy

    正确答案:D

  • 第3题:

    If the policies shown below evaluate as described, which action will occur for the listed policy expression?() Policy A=True Policy B=True Policy C=True Policy D=False Policy Expression: !(A&&B)||C

    • A、The policy evaluates to True (a&&n).
    • B、The policy evaluates to True because of c.
    • C、The policy evaluates to False because of c.
    • D、The policy evaluates to False because of !(a&&b).

    正确答案:B

  • 第4题:

    Which of the following logical volume placement policies is likely to give the best performance in most cases, all other factors being equal?()

    • A、 INTRA-POLICY set to ’edge’, INTER-POLICY set to maximum
    • B、 INTRA-POLICY set to ’center’, INTER-POLICY set to maximum
    • C、 INTRA-POLICY set to ’middle’, INTER-POLICY set to minimum
    • D、 INTRA-POLICY set to ’center’, INTER-POLICY set to minimum

    正确答案:B

  • 第5题:

    Which two statements are true regarding routing policy processing?()

    • A、The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.
    • B、Policies are evaluated from right to left as displayed in the Junos OS configuration file.
    • C、Polices are evaluated based on the order in which they are applied to a routing protocol.
    • D、Policy processing stops once the last statement in the policy is evaluated.

    正确答案:A,C

  • 第6题:

    单选题
    If the policies shown below evaluate as described, which action will occur for the listed policy expression?() Policy A=True Policy B=True Policy C=True Policy D=False Policy Expression: !(A&&B)||C
    A

    The policy evaluates to True (a&&n).

    B

    The policy evaluates to True because of c.

    C

    The policy evaluates to False because of c.

    D

    The policy evaluates to False because of !(a&&b).


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    Your routing table contains four static routes which you need to redistribute to your OSPF peers. Which method would accomplish this?()
    A

    Apply an import policy to OSPF; this will import the static routes into OSPF

    B

    Apply an export policy to protocol static; this will export the routes to other protocols.

    C

    Apply an import policy to the forwarding table; this will import the routes, allowing them to be forwarded to OSPF neighbors.

    D

    Apply an export policy to OSPF; this will export the static routes to your OSPF neighbors.


    正确答案: A
    解析: 暂无解析

  • 第8题:

    多选题
    Which two policy actions are considered flow control actions?()
    A

    reject

    B

    community add

    C

    next term

    D

    next policy


    正确答案: B,A
    解析: 暂无解析

  • 第9题:

    多选题
    You enabled an audit policy by issuing the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM; For which database users and for which executions is the audit policy now active? ()
    A

    SYS, SYSTEM

    B

    SCOTT

    C

    Only for successful executions

    D

    Only for failed executions

    E

    Both successful and failed executions


    正确答案: C,A
    解析: 暂无解析

  • 第10题:

    多选题
    A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years.  Which of the following locations should an administrator configure when complying with the new policy?()
    A

    Local workstations

    B

    Backup tapes

    C

    Domain controllers

    D

    Email server

    E

    SMTP gateway

    F

    Proxy server


    正确答案: F,A
    解析: 暂无解析

  • 第11题:

    单选题
    You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()
    A

    Dynamic auth table mapping is not enabled.

    B

    A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.

    C

    To create a static auth table mapping, you must delete the default policy.

    D

    The default policy applies only to the factory-default role User.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which statement regarding the implementation of an IDP policy template is true?()
    A

    IDP policy templates are automatically installed as the active IDP policy.

    B

    IDP policy templates are enabled using a commit script.

    C

    IDP policy templates can be downloaded without an IDP license.

    D

    IDP policy templates are included in the factory-default configuration.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which two policy actions are considered flow control actions?()

    A.reject

    B.community add

    C.next term

    D.next policy


    参考答案:C, D

  • 第14题:

    Which three statements are true about terms in a policy?()

    • A、The order of the terms in a policy is irrelevant
    • B、The action is specified in a then statement
    • C、Ters are optional in a policy
    • D、The match condition can be identified with a from statement
    • E、Every policy must contain at least one term

    正确答案:B,D,E

  • 第15题:

    Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?()

    • A、policy-rematch
    • B、policy-evaluate
    • C、rematch-policy
    • D、evaluate-policy

    正确答案:A

  • 第16题:

    You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()

    • A、Dynamic auth table mapping is not enabled.
    • B、A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.
    • C、To create a static auth table mapping, you must delete the default policy.
    • D、The default policy applies only to the factory-default role User.

    正确答案:A

  • 第17题:

    You enabled an audit policy by issuing the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM; For which database users and for which executions is the audit policy now active? ()

    • A、SYS, SYSTEM
    • B、SCOTT
    • C、Only for successful executions
    • D、Only for failed executions
    • E、Both successful and failed executions

    正确答案:A,E

  • 第18题:

    多选题
    Which two statements are true with regard to policy ordering? ()(Choose two.)
    A

    The last policy is the default policy, which allows all traffic.

    B

    The order of policies is not important.

    C

    New policies are placed at the end of the policy list.

    D

    The insert command can be used to change the order.


    正确答案: B,D
    解析: 暂无解析

  • 第19题:

    多选题
    Which two security policy actions are valid?()
    A

    deny

    B

    discard

    C

    reject

    D

    close


    正确答案: B,D
    解析: 暂无解析

  • 第20题:

    多选题
    You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()
    A

    Select Require and Enforce for the Host Checker Policy in the realm authentication policy.

    B

    Select Evaluate Policies for the Host Checker policy in the realm authentication policy.

    C

    Configure the Host Checker policy as a role restriction for the Employee role.

    D

    Configure the Host Checker policy as a resource access policy for the Employee role.


    正确答案: B,D
    解析: 暂无解析

  • 第21题:

    单选题
    What is the procedure for announcing routes leared from RIP to ISIS neighbors?()
    A

    Apply an import policy to RIP which announces the routes to ISIS.

    B

    Apply an export policy to ISIS which announces the routes to ISIS.

    C

    Apply an export policy to RIP which announces the routes to ISIS.

    D

    Apply an import policy to ISIS which imports the routes into ISIS.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Which QoS mechanism will allow a single policy to be applied to multiple interfaces?()
    A

    policy map

    B

    class map

    C

    ACL

    D

    service policy


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    Which three statements are true about terms in a policy?()
    A

    The order of the terms in a policy is irrelevant

    B

    The action is specified in a then statement

    C

    Ters are optional in a policy

    D

    The match condition can be identified with a from statement

    E

    Every policy must contain at least one term


    正确答案: E,D
    解析: 暂无解析

  • 第24题:

    多选题
    Which two configuration elements are required for a policy-based VPN?()
    A

    IKE gateway

    B

    secure tunnel interface

    C

    security policy to permit the IKE traffic

    D

    security policy referencing the IPsec VPN tunnel


    正确答案: D,B
    解析: 暂无解析