reject
community add
next term
next policy
第1题:
You are designing a password management solution to meet the business and technical requirements. Which two actions should you perform?hich two actions should you perform?()
第2题:
Which two policy actions are considered flow control actions?()
第3题:
What are two valid actions for a routing policy?()
第4题:
You need to configure the security settings for the new app servers. Which two actions should you perform?()
第5题:
You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()
第6题:
take the backup of the flash recovery area less frequently
increase the value of the UNDO_RETENTION initialization parameter
change the value of the WORKAREA_SIZE_POLICY initialization parameter to AUTO
change the backup retention policy to retain the backups for a smaller period of time
increase the value of the DB_RECOVERY_FILE_DEST_SIZE initialization parameter
increase the value of the CONTROL_FILE_RECORD_KEEP_TIME initialization parameter
第7题:
develop a policy for securing the network
monitor and test network activities for vulnerabilities
implement reflexive access lists
implement dynamic access lists
select and implement a single comprehensive virus protection program
第8题:
deny
discard
reject
close
第9题:
Delegate the password management controls to the help desk staff.
Delegate the password management controls to the Domain Users group.
Configure the Default Domain Policy to enforce password expiration settings.
Configure the Default Domain Controller Policy to enforce password expiration settings.
第10题:
from a zone to the device itself
from a zone to the same zone
from a zone to a different zone
from one interface to another interface
第11题:
Create a sharing policy.
Create a remote domain.
Create an accepted domain.
Create an e-mail address policy.
Modify the properties of the default Receive connector.
第12题:
from a zone to the router itself
from a zone to the same zone
from a zone to a different zone
from one interface to another interface
第13题:
Which two security policy actions are valid?()
第14题:
Users can define policy to control traffic flow between which two components?()
第15题:
Users can define policy to control traffic flow between which two components? ()(Choose two.)
第16题:
Your company acquires a new Internet domain name.You need to ensure that all users can receive e-mail messages sent to the new domain name.Which two actions should you perform?()
第17题:
Place all infrastructure servers in subnets that cannot exchange information with the Internet
Establish a custom security template that contains unique required settings for each combination of services that run on the infrastructure servers
Use Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure servers
Edit the local policy settings to configure each individual server
第18题:
take the backup of the flash recovery area less frequently
increase the value of the UNDO_RETENTION initialization parameter
change the value of the WORKAREA_SIZE_POLICY initialization parameter to AUTO
change the backup retention policy to retain the backups for a smaller period of time
increase the value of the DB_RECOVERY_FILE_DEST_SIZE initialization parameter
increase the value of the CONTROL_FILE_RECORD_KEEP_TIME initialization parameter
第19题:
reject
community add
next term
next policy
第20题:
Determine a minimum bandwidth guarantee.
Determine interfaces to which to apply policy.
Assign priorities to the class.
Configure access control lists.
第21题:
discard
next policy
accept
ignore
第22题:
Create a Group policy object (GPO) for the web servers.
Create a Group policy object (GPO) for the database servers.
Modify the Default Domain Policy.
Modify the Default Domain Controllers Policy.
第23题:
Disable all unnecessary services on each DHCP server
Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP servers
Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP server
Install a digital certificate for SSL on each DHCP server
第24题:
On each client computer in the call center, configure a local policy that lists only authorized programs in the Allowed Windows Programs list
Using NTFS permissions, assign the Deny – Read permission for all unauthorized executable files to the client computer domain accounts
Design a Group Policy object (GPO) that enforces a software restriction policy on all client computers in the call center
Design a Group Policy object (GPO) that implements an IPSec policy on all client computers in the call center. Ensure that the IPSec policy rejects connections to any Web servers that the company does not operate