Users can define policy to control traffic flow between which two components? ()(Choose two.)A、from a zone to the router itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

题目

Users can define policy to control traffic flow between which two components? ()(Choose two.)

  • A、from a zone to the router itself
  • B、from a zone to the same zone
  • C、from a zone to a different zone
  • D、from one interface to another interface

相似考题
更多“Users can define policy to contr”相关问题
  • 第1题:

    When configuring a DHCP server, which of the following can the administrator define for DHCP users?()

    A. Database server

    B. NTP server

    C. DHCP server

    D. SQLServer

    E. DNS server

    F. Domain name


    参考答案:C, E, F

  • 第2题:

    Which two statements are true of login classes?()

    • A、Users can be members of multiple login classes.
    • B、Login classes define authorization parameters for a user.
    • C、There are five system-defined login classes.
    • D、Login class permission flags can be overridden for certain commands.

    正确答案:B,D

  • 第3题:

    What is the primary purpose of creating a Location Group Policy? ()

    • A、to associate more than one realm with an authentication server
    • B、to logically group network access devices and associate them with specific sign-in policies
    • C、to allow or prevent users from accessing resources in specific locations on the network
    • D、to define the URL that users of network access devices can use to access the Infranet Controller

    正确答案:B

  • 第4题:

    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()

    • A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.
    • B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.
    • C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.
    • D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

    正确答案:A

  • 第5题:

    Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()

    • A、Create an IPsec Enforcement Network policy.
    • B、Create an 802.1X Enforcement Network policy.
    • C、Create a Wired Network (IEEE 802.3) Group policy.
    • D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

    正确答案:A

  • 第6题:

    You have an Exchange Server 2010 organization.You need to ensure that all users in the organization can view the availability of a company projector.What should you create for the projector?()

    • A、a distribution group
    • B、a mailbox
    • C、a mail-enabled contact
    • D、a sharing policy

    正确答案:B

  • 第7题:

    多选题
    When configuring a DHCP server, which of the following can the administrator define for DHCP users?()
    A

    Database server

    B

    NTP server

    C

    DHCP server

    D

    SQLServer

    E

    DNS server

    F

    Domain name


    正确答案: F,B
    解析: 暂无解析

  • 第8题:

    单选题
    Your company has an Active Directory domain. The company runs Terminal Services.  Standard users who connect to the Terminal Server are in the TSUsers organizational unit (OU). Administrative users are in the TSAdmins OU. No other users connect to the Terminal Server.  You need to ensure that only members of the TSAdmins OU can run the Remote Desktop Protocol files. What should you do?()
    A

    Create a Group Policy object (GPO) that configures the Allow .rdp files from unknown publishers policy setting in the Remote Desktop Client Connection template to Disabled. Apply the GPO to the TSUsers OU.

    B

    Create a Group Policy object (GPO) that configures the Allow .rdp files from valid publishers and users default .rdp settings policy setting in the Remote Desktop Client Connection template to Disabled. Apply the GPO to the TSUsers OU.

    C

    Create a Group Policy object (GPO) that configures the Allow .rdp files from valid publishers and users default .rdp settings policy setting in the Remote Desktop Client Connection template to Enabled. Apply the GPO to the TSAdmins OU.

    D

    Create a Group Policy object (GPO) that configures the Specify SHA1 thumbprints of certificates representing trusted .rdp publishers policy setting in the Remote Desktop Client Connection template to Enabled. Apply the GPO to the TSAdmins OU.


    正确答案: B
    解析: 暂无解析

  • 第9题:

    多选题
    You are the senior systems engineer for your company. The network consists of a single Active Directory domain.  All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops.   Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network.   You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers.   You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources.   Which two actions should you take?()
    A

    Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.

    B

    Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.

    C

    Create a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.

    D

    Create a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.

    E

    Use System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.


    正确答案: E,A
    解析: 暂无解析

  • 第10题:

    多选题
    You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
    A

    The endpoints can use agentless access.

    B

    Encrypted traffic flows between the endpoint and the enforcer.

    C

    Encrypted traffic flows between the endpoint and the protected resource

    D

    The endpoints can use the Odyssey Access Client.


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    单选题
    An administrator needs to implement a security patch policy on the network that adheres to aninternal SLA.  Which of the following actions BEST achieves this task?()
    A

     Define a test server group, install the patches and if successful schedule installation on production servers.

    B

     Define a test server group, schedule installation on production servers and then install all updates and patches.

    C

     Install the patches during a non-working hour.

    D

     Send an email to all company users and request the best time for installation.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()
    A

     Create an IPsec Enforcement Network policy

    B

     Create an 802.1X enforcement network policy

    C

     Create a wired network (IEEE 802.3) Group Policy

    D

     Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy


    正确答案: A
    解析: 暂无解析

  • 第13题:

    When configuring a DHCP server, which of the following can the administrator define for DHCP users?()

    • A、Database server
    • B、NTP server
    • C、DHCP server
    • D、SQLServer
    • E、DNS server
    • F、Domain name

    正确答案:C,E,F

  • 第14题:

    An administrator needs to implement a security patch policy on the network that adheres to an internal SLA. Which of the following actions BEST achieves this task?()

    • A、Define a test server group, install the patches and if successful schedule installation on production servers.
    • B、Define a test server group, schedule installation on production servers and then install all updates and patches.
    • C、Install the patches during a non-working hour.
    • D、Send an email to all company users and request the best time for installation.

    正确答案:A

  • 第15题:

    You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()

    • A、All users except SYS
    • B、All users except SCOTT
    • C、All users except sys and SCOTT
    • D、All users except sys, system, and SCOTT

    正确答案:B

  • 第16题:

    You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A new management directive states that users can log to the domain only during business hours. Users who remain logged on after business hours must be automatically disconnected from network resources. You need to enforce this directive by using the minimum amount of administrative effort. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two)

    • A、Configure the Default Domain Policy Group Policy object (GPO) to increase scheduling priority for all users.
    • B、Configure the Default Domain Policy Group Policy object (GPO) to force users to log off when their logon hours expire.
    • C、Select all user accounts. Modify the account properties to restrict logon hours to business hours.
    • D、Create a domain user account named Temp. Configure the account properties to restrict logon hours to business hours.
    • E、Modify the DACL on the Default Domain Policy Group Policy object (GPO) to assign the Allow - Read permission to the Users group.

    正确答案:B,C

  • 第17题:

    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()

    • A、The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.
    • B、The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.
    • C、The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.
    • D、The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.

    正确答案:A

  • 第18题:

    单选题
    What is the primary purpose of creating a Location Group Policy? ()
    A

    to associate more than one realm with an authentication server

    B

    to logically group network access devices and associate them with specific sign-in policies

    C

    to allow or prevent users from accessing resources in specific locations on the network

    D

    to define the URL that users of network access devices can use to access the Infranet Controller


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()
    A

    Enable the Require domain controller to unlock policy.

    B

    Set the Number of previous logons to cache policy to 0.  

    C

    Remove all user and group accounts from the Log on locally user right. 

    D

    Remove all user and group accounts from the Access this computer from the network user right. 


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    You have an Exchange Server 2010 organization.Users access their e-mail from the Internet by using Outlook Web App.You need to prevent users from downloading ZIP files from Outlook Web App.The solution must ensure that users can download ZIP files by using Microsoft Office Outlook. What should you do?()
    A

    Configure the Content Filter agent.

    B

    Configure the Attachment Filter agent.

    C

    Create a managed folder mailbox policy.

    D

    Create an Outlook Web App Mailbox policy.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()
    A

    Ignore

    B

    Replace users role

    C

    Terminate user session

    D

    Disable user account


    正确答案: C
    解析: 暂无解析

  • 第22题:

    多选题
    Users can define policy to control traffic flow between which two components?()
    A

    from a zone to the device itself

    B

    from a zone to the same zone

    C

    from a zone to a different zone

    D

    from one interface to another interface


    正确答案: C,D
    解析: 暂无解析

  • 第23题:

    单选题
    You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer.  What should you do? ()
    A

    Configure File signature verification to block driver installation, and set driver signing as a system default.

    B

    Remove all users from the Power User group.

    C

    Create a Local Computer Policy to prevent users from installing drivers.

    D

    Create a Local Computer Policy to enable Windows File Protection.


    正确答案: C
    解析: 暂无解析