An individual policy can have only one scheduler applied.
You must manually configure system-time updates.
Multiple policies can use the same scheduler.
Policies that do not have schedulers are not active.
第1题:
A. An individual policy can have only one scheduler applied.
B. You must manually configure system-time updates.
C. Multiple policies can use the same scheduler.
D. Policies that do not have schedulers are not active.
第2题:
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()
A. Ignore
B. Replace users role
C. Terminate user session
D. Disable user account
第3题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第4题:
Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()
第5题:
Users can define policy to control traffic flow between which two components? ()(Choose two.)
第6题:
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
第7题:
Which two statements regarding the Policy Framework in Enterprise Manager (EM) are correct?()
第8题:
Which two statements are true about a job chain?()
第9题:
A job chain can contain a nested chain of jobs
The jobs in a job chain cannot have more than one dependency
A job of the CHAIN type can be run using event-based or time-based schedules
The jobs in a job chain can be executed only by using the events generated by the Scheduler
第10题:
Every
A
A given tag can apply to only one
A given
It is possible to construct a valid
第11题:
A client group is a list of clients associated with a group.
A client group is a list of groups associated with a client.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第12题:
Traffic is permitted from the trust zone to the untrust zone.
Intrazone traffic in the trust zone is permitted.
All traffic through the device is denied.
The policy is matched only when no other matching policies are found.
第13题:
A. Traffic is permitted from the trust zone to the untrust zone.
B. Intrazone traffic in the trust zone is permitted.
C. All traffic through the device is denied.
D. The policy is matched only when no other matching policies are found.
第14题:
A. from a zone to the router itself
B. from a zone to the same zone
C. from a zone to a different zone
D. from one interface to another interface
第15题:
Which two statements apply to policy scheduling?() (Choose two.)
第16题:
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()
第17题:
Which two statements are true with regard to policy ordering? ()(Choose two.)
第18题:
Regarding zone types, which statement is true?()
第19题:
Which two statements are true about a job chain? ()(Choose two.)
第20题:
A job chain can contain a nested chain of jobs.
The jobs in a job chain cannot have more than one dependency.
A job of the CHAIN type can be run using event-based or time-based schedules.
The jobs in a job chain can be executed only by using the events generated by the Scheduler
第21题:
The last policy is the default policy, which allows all traffic.
The order of policies is not important.
New policies are placed at the end of the policy list.
The insert command can be used to change the order.
第22题:
An individual policy can have only one scheduler applied.
You must manually configure system-time updates.
Multiple policies can use the same scheduler.
Policies that do not have schedulers are not active.
第23题:
An extent cannot spread across data files.
A segment cannot spread across data files.
A data file can belong to only one tablespace.
A data file can have only one segment created in it.
A data block can spread across multiple data files as it can consist of multiple operating system (OS)blocks
第24题:
from a zone to the router itself
from a zone to the same zone
from a zone to a different zone
from one interface to another interface