It is a list of remote database links stored in the XML file that are available to the users of the database.
It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.
第1题:
You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()
第2题:
Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()
第3题:
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
第4题:
Evaluate the following block of code: BEGIN DBMS_NETWORK_ACL_ADMIN.CREATE_ACL ( acl => ’mycompany-com-permissions.xml’, principal => ’ACCT_MGR’, is_grant => TRUE, privilege => ’connect’); DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL ( acl => ’mycompany-com-permissions.xml’, host => ’*.mycompany.com’); END; What is the outcome of the above code?()
第5题:
You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact. Which of the following is true regarding your recovery?()
第6题:
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()
第7题:
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
第8题:
The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.
The ACL is applied to the Telnet port with the ip access-group command.
The ACL must be applied to each vty line individually.
The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.
第9题:
It is a list of remote database links stored in the XML file that are available to the users of the database.
It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.
第10题:
show access-list
show ip access-list
show ip interface
show interface
show interface list
第11题:
permit access-list 101 out
ip access-group 101 out
apply access-list 101 out
access-class 101 out
ip access-list e0 out
第12题:
an incoming external trust
an incoming realm trust
an outgoing external trust
an outgoing realm trust
第13题:
ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()
第14题:
With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()
第15题:
You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()
第16题:
You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()
第17题:
Your network contains an Active Directory forest. The forest contains a single domain. You want to access resources in a domain that is located in another forest. You need to configure a trust between the domain in your forest and the domain in the other forest. What should you create()
第18题:
You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
第19题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The domain includes an organizational unit (OU) named Processing. There are 100 computer accounts in the Processing OU. You create a Group Policy object (GPO) named NetworkSecurity and link it to the domain. You configure NetworkSecurity to enable security settings through the Computer Configuration section of the Group Policy settings. You need to ensure that NetworkSecurity will apply only to the computers in the Processing OU. You need to minimize the number of GPO links. What should you do?()
第20题:
Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks
第21题:
IETF
PFC
TCAM
ASIC
第22题:
Link NetworkSecurity to the Processing OU. Disable the User Configuration section of NetworkSecurity.
Link NetworkSecurity to the Processing OU. Remove the link from NetworkSecurity to the domain.
Modify the discretionary access control list (DACL) for NetworkSecurity to assign all computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.
Modify the discretionary access control list (DACL) for NetworkSecurity to assign the Authenticated Users group the Deny - Apply Group Policy permission and to assign all of the computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.
第23题:
It produces an error because a fully qualified host name needs to be specified.
It produces an error because the range of ports associated with the hosts has not been specified.
It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and RESOLVE privileges.
It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.